Science.gov

Sample records for additional security measures

  1. 12 CFR 619.9010 - Additional security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Additional security. 619.9010 Section 619.9010 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9010 Additional security. Supplementary collateral to the primary security taken in connection with the loan....

  2. 12 CFR 619.9010 - Additional security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Additional security. 619.9010 Section 619.9010 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9010 Additional security. Supplementary collateral to the primary security taken in connection with the loan....

  3. 12 CFR 619.9010 - Additional security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Additional security. 619.9010 Section 619.9010 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9010 Additional security. Supplementary collateral to the primary security taken in connection with the loan....

  4. Measuring Job Security.

    ERIC Educational Resources Information Center

    Nardone, Thomas; And Others

    1997-01-01

    Discusses issues in measuring job security and presents a comparison of data from the National Longitudinal Survey of Youth and the Current Population Survey on job tenure and contingent employment. (SK)

  5. Additional Security Considerations for Grid Management

    NASA Technical Reports Server (NTRS)

    Eidson, Thomas M.

    2003-01-01

    The use of Grid computing environments is growing in popularity. A Grid computing environment is primarily a wide area network that encompasses multiple local area networks, where some of the local area networks are managed by different organizations. A Grid computing environment also includes common interfaces for distributed computing software so that the heterogeneous set of machines that make up the Grid can be used more easily. The other key feature of a Grid is that the distributed computing software includes appropriate security technology. The focus of most Grid software is on the security involved with application execution, file transfers, and other remote computing procedures. However, there are other important security issues related to the management of a Grid and the users who use that Grid. This note discusses these additional security issues and makes several suggestions as how they can be managed.

  6. 49 CFR 1554.101 - Security Measures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security Measures. 1554.101 Section 1554.101 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security...

  7. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  8. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  9. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  10. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  11. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  12. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  13. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  14. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  15. Interior view of addition pharmacy showing dutch door and security ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Interior view of addition pharmacy showing dutch door and security ceiling grate, facing north. - Albrook Air Force Station, Dispensary, East side of Canfield Avenue, Balboa, Former Panama Canal Zone, CZ

  16. Economic Aspects of Airport Security Measures

    DTIC Science & Technology

    1999-06-01

    Airport security measures use very expensive equipment, and may keep passengers in line for several minutes. The time passengers spend in those lines...can add up, and must be understood as time opportunity cost. In the 1970s, several airport security measures were adopted to help stop aircraft...associated with airport security measures. He concluded that the costs of the adopted measures were very high. While Landes concentrated on the

  17. 33 CFR 104.275 - Security measures for handling cargo.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.275 Security measures for handling cargo. (a) General. The vessel owner or operator must ensure that security measures... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for...

  18. 33 CFR 104.275 - Security measures for handling cargo.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.275 Security measures for handling cargo. (a) General. The vessel owner or operator must ensure that security measures... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for...

  19. 33 CFR 105.265 - Security measures for handling cargo.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.265 Security measures for handling cargo. (a) General. The facility owner or operator must ensure that security measures... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for...

  20. 33 CFR 104.275 - Security measures for handling cargo.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.275 Security measures for handling cargo. (a) General. The vessel owner or operator must ensure that security measures... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for...

  1. Social Security income measurement in two surveys.

    PubMed

    Iams, Howard M; Purcell, Patrick J

    2013-01-01

    As a major source of income for retired persons in the United States, Social Security benefits directly influence economic well-being. That fact underscores the importance of measuring Social Security income accurately in household surveys. Using Social Security Administration (SSA) records, we examine Social Security income as reported in two Census Bureau surveys, the Survey of Income and Program Participation (SIPP) and the Current Population Survey (CPS). Although SSA usually deducts Medicare premiums from benefit payments, both the CPS and the SIPP aim to collect and record gross Social Security benefit amounts (before Medicare premium deductions). We find that the Social Security benefit recorded in the CPS closely approximates the gross benefit recorded for CPS respondents in SSA's records, but the Social Security benefit recorded in the SIPP more closely approximates SSA's record of net benefit payments (after deducting Medicare premiums).

  2. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.260 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for restricted...) Protect sensitive security areas within the facility; (6) Protect security and surveillance equipment...

  3. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  4. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  5. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  6. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.255 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  7. Measuring Human Performance within Computer Security Incident Response Teams

    SciTech Connect

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel; Forsythe, James C.

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  8. Enhancing QKD security with weak measurements

    NASA Astrophysics Data System (ADS)

    Farinholt, Jacob M.; Troupe, James E.

    2016-10-01

    Publisher's Note: This paper, originally published on 10/24/2016, was replaced with a corrected/revised version on 11/8/2016. If you downloaded the original PDF but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance. In the late 1980s, Aharonov and colleagues developed the notion of a weak measurement of a quantum observable that does not appreciably disturb the system.1, 2 The measurement results are conditioned on both the pre-selected and post-selected state of the quantum system. While any one measurement reveals very little information, by making the same measurement on a large ensemble of identically prepared pre- and post-selected (PPS) states and averaging the results, one may obtain what is known as the weak value of the observable with respect to that PPS ensemble. Recently, weak measurements have been proposed as a method of assessing the security of QKD in the well-known BB84 protocol.3 This weak value augmented QKD protocol (WV-QKD) works by additionally requiring the receiver, Bob, to make a weak measurement of a particular observable prior to his strong measurement. For the subset of measurement results in which Alice and Bob's measurement bases do not agree, the weak measurement results can be used to detect any attempt by an eavesdropper, Eve, to correlate her measurement results with Bob's. Furthermore, the well-known detector blinding attacks, which are known to perfectly correlate Eve's results with Bob's without being caught by conventional BB84 implementations, actually make the eavesdropper more visible in the new WV-QKD protocol. In this paper, we will introduce the WV-QKD protocol and discuss its generalization to the 6-state single qubit protocol. We will discuss the types of weak measurements that are optimal for this protocol, and compare the predicted performance of the 6- and 4-state WV-QKD protocols.

  9. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.270 Security... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for restricted... on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5)...

  10. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.270 Security... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for restricted... on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5)...

  11. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.270 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for restricted... on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5)...

  12. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.270 Security... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for restricted... on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5)...

  13. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.270 Security... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for restricted... on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5)...

  14. Validity and reliability of food security measures.

    PubMed

    Cafiero, Carlo; Melgar-Quiñonez, Hugo R; Ballard, Terri J; Kepple, Anne W

    2014-12-01

    This paper reviews some of the existing food security indicators, discussing the validity of the underlying concept and the expected reliability of measures under reasonably feasible conditions. The main objective of the paper is to raise awareness on existing trade-offs between different qualities of possible food security measurement tools that must be taken into account when such tools are proposed for practical application, especially for use within an international monitoring framework. The hope is to provide a timely, useful contribution to the process leading to the definition of a food security goal and the associated monitoring framework within the post-2015 Development Agenda.

  15. Portfolio analysis of layered security measures.

    PubMed

    Chatterjee, Samrat; Hora, Stephen C; Rosoff, Heather

    2015-03-01

    Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity.

  16. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for monitoring. 104.285 Section 104.285 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.285 Security measures...

  17. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for monitoring. 104.285 Section 104.285 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.285 Security measures...

  18. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for monitoring. 104.285 Section 104.285 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.285 Security measures...

  19. 33 CFR 105.265 - Security measures for handling cargo.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.265 Security measures for handling cargo. (a) General. The facility owner or operator must ensure that security measures... accepted and stored at the facility without the knowing consent of the facility owner or operator;...

  20. 33 CFR 105.275 - Security measures for monitoring.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for monitoring. 105.275 Section 105.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.275 Security...

  1. Security Measures to Protect Mobile Agents

    NASA Astrophysics Data System (ADS)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  2. Martime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security

    DTIC Science & Technology

    2010-12-01

    vessels—vessels capable of carrying 500 or more passengers. The first report focused on cruise ship and cruise ship facility security and was issued in...April 2010.4 The report found that while governmental agencies, cruise ship operators, and other maritime security stakeholders have taken...border security—should consider obtaining additional information about cruise ship passengers to enhance its screening process. This report focuses

  3. 7 CFR 1962.8 - Liens on real estate for additional security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Liens on real estate for additional security. 1962.8... Security § 1962.8 Liens on real estate for additional security. The County Supervisor may take the best lien obtainable on any real estate owned by the borrower, including any real estate which...

  4. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  5. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees....

  6. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees....

  7. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  8. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  9. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  10. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  11. Measuring Stability and Security in Iraq

    DTIC Science & Technology

    2009-11-04

    Higher Institute for Security and Administration Development, a branch of the Baghdad Police College ( BPC ) in Mosul, and underused Shurta billets...were temporarily converted to open a BPC branch college in Basrah. Additional capacity is anticipated with the completion of Phase II of the BPC ...expansion in December 2009 and a permanent facility for the Basrah branch of the BPC in 2011. The Iraqi BPC instructor cadre trains all basic

  12. Detection of Total Knee Arthroplasties at Airport Security Checkpoints: How Do Updated Security Measures Affect Patients?

    PubMed

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Goljan, Peter; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2016-10-24

    Airport security measures continue to be updated with the incorporation of the new body scanners and automatic target recognition software. The purpose of this study was analyze the incidence of: (1) triggering the security alarm; (2) extra security searches; (3) perceived inconvenience; and (4) presence of other surgical hardware in those who underwent total knee arthroplasty (TKA) and passed through airport security. A questionnaire was given to 125 consecutive patients with a TKA. Those who passed through airport security after January 2014 were considered for inclusion. A questionnaire was administered that addressed the number of encounters with airport security, metal detector activation, additional screening procedures, and perceived inconvenience. Out of the 125 patients, 53 met inclusion criteria. Out of the 53 patients, 20 (38%) reported that their prosthesis triggered a metal detector. Out of the 20 patients, 8 (40%) who reported triggering of metal detectors also reported the presence of surgical hardware elsewhere in the body. Eighteen of the 53 patients (34%) believed having a TKA was inconvenient for airplane travel. Compared with the historical cohort, alarms were triggered in 70 of 97 patients (p = 0.0001) and 50 of 97 reported inconvenience when traveling (n = 50 of 97 patients; p = 0.04). The incidences of those who underwent TKA triggering alarms and perceiving inconvenience when passing through airport security have decreased from previously published studies. This is most likely due to the recent updates and modifications to screening. As these security measures are modified and implant designs continue to evolve, this is an area of investigation that should continue.

  13. 40 CFR 412.47 - Additional measures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 28 2010-07-01 2010-07-01 true Additional measures. 412.47 Section 412.47 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS CONCENTRATED ANIMAL FEEDING OPERATIONS (CAFO) POINT SOURCE CATEGORY Swine, Poultry, and...

  14. 40 CFR 412.47 - Additional measures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 29 2014-07-01 2012-07-01 true Additional measures. 412.47 Section 412.47 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS CONCENTRATED ANIMAL FEEDING OPERATIONS (CAFO) POINT SOURCE CATEGORY Swine, Poultry, and...

  15. 40 CFR 412.47 - Additional measures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 30 2012-07-01 2012-07-01 false Additional measures. 412.47 Section 412.47 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS CONCENTRATED ANIMAL FEEDING OPERATIONS (CAFO) POINT SOURCE CATEGORY Swine, Poultry, and...

  16. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  17. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  18. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  19. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  20. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  1. Measuring Stability and Security in Iraq

    DTIC Science & Technology

    2006-02-01

    Stability and Security in Iraq 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f...National Strategy for Victory in Iraq uses measurable trends indicating progress along each of these tracks. Such metrics indicate where programs are...February 17, 2006 3 continues to help rebuild the economy. The IMF approved Iraq’s proposal for an economic reform program in the form of a Stand-By

  2. Muon Fluence Measurements for Homeland Security Applications

    SciTech Connect

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  3. Validity Evidence for the Security Scale as a Measure of Perceived Attachment Security in Adolescence

    ERIC Educational Resources Information Center

    Van Ryzin, Mark J.; Leve, Leslie D.

    2012-01-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social…

  4. Defining and Computing a Value Based Cyber-Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In past work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities\\; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper we discuss the specification and design of a system that collects, updates and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  5. Defining and Computing a Valued Based Cyber-Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2012-01-01

    In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  6. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... equivalent security measure that has been approved by the Commandant (CG-54) as meeting or exceeding the effectiveness of the required measure. The Commandant (CG-54) may require that the owner or operator...

  7. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... equivalent security measure that has been approved by the Commandant (CG-54) as meeting or exceeding the effectiveness of the required measure. The Commandant (CG-54) may require that the owner or operator...

  8. Measuring and Modeling Security and Privacy Laws

    ERIC Educational Resources Information Center

    Romanosky, Sasha

    2012-01-01

    This manuscript presents empirical and analytical analysis and discussion of security and privacy laws. The introduction, together with the three substantive chapters each represent separate research papers written as partial fulfillment of my PhD dissertation in the Heinz College, Carnegie Mellon University. Chapter 2 is an abbreviated version of…

  9. Personnel Security Clearances: Additional Guidance and Oversight Needed at DHS and DOD to Ensure Consistent Application of Revocation Process

    DTIC Science & Technology

    2014-09-01

    Application of Revocation Process Report to the Ranking Member, Committee on Homeland Security, House of Representatives September 2014 GAO-14-640...Personnel Security Clearances: Additional Guidance and Oversight Needed at DHS and DOD to Ensure Consistent Application of Revocation Process 5a. CONTRACT...2014 PERSONNEL SECURITY CLEARANCES Additional Guidance and Oversight Needed at DHS and DOD to Ensure Consistent Application of Revocation Process

  10. 24 CFR 203.343 - Partial release, addition or substitution of security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... COMMISSIONER, DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT MORTGAGE AND LOAN INSURANCE PROGRAMS UNDER NATIONAL... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Partial release, addition or substitution of security. 203.343 Section 203.343 Housing and Urban Development Regulations Relating to...

  11. 24 CFR 203.343 - Partial release, addition or substitution of security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... COMMISSIONER, DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT MORTGAGE AND LOAN INSURANCE PROGRAMS UNDER NATIONAL... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Partial release, addition or substitution of security. 203.343 Section 203.343 Housing and Urban Development Regulations Relating to...

  12. 24 CFR 203.343 - Partial release, addition or substitution of security.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... COMMISSIONER, DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT MORTGAGE AND LOAN INSURANCE PROGRAMS UNDER NATIONAL... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Partial release, addition or substitution of security. 203.343 Section 203.343 Housing and Urban Development Regulations Relating to...

  13. 24 CFR 203.343 - Partial release, addition or substitution of security.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... COMMISSIONER, DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT MORTGAGE AND LOAN INSURANCE PROGRAMS UNDER NATIONAL... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Partial release, addition or substitution of security. 203.343 Section 203.343 Housing and Urban Development Regulations Relating to...

  14. 24 CFR 203.343 - Partial release, addition or substitution of security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... COMMISSIONER, DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT MORTGAGE AND LOAN INSURANCE PROGRAMS UNDER NATIONAL... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Partial release, addition or substitution of security. 203.343 Section 203.343 Housing and Urban Development Regulations Relating to...

  15. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for monitoring. 104.285 Section 104.285 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... with the port or facility; and (iv) Lighting effects, such as glare, and its impact on...

  16. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for monitoring. 104.285 Section 104.285 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... with the port or facility; and (iv) Lighting effects, such as glare, and its impact on...

  17. Measuring the Foundation of Homeland Security

    DTIC Science & Technology

    2007-03-01

    Collaborative Capacity: An Innovative Strategy for Homeland Security Preparedness,” 15. 24 Jon R. Katzenbach and Douglas K. Smith, The Discipline of Teams (New...done.32 27 Katzenbach and Smith, The Discipline of Teams, 181. 28 Hocevar, et al., “Building...Forthcoming 2006. Katzenbach , Jon R., and Douglas K. Smith. The Discipline of Teams. New York: John Wiley & Sons, Inc., 2001. Larson, Carl E., and Frank

  18. Security Clearances: Additional Mechanisms May Aid Federal Tax-Debt Detection

    DTIC Science & Technology

    2015-03-18

    SECURITY CLEARANCES Additional Mechanisms May Aid Federal Tax -Debt Detection Statement of Seto J. Bagdoyan, Director...Additional Mechanisms May Aid Federal Tax -Debt Detection 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER...Mechanisms May Aid Federal Tax -Debt Detection Why GAO Did This Study According to ODNI, several million civilian and military federal employees

  19. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for delivery...

  20. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for delivery...

  1. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for delivery...

  2. 33 CFR 105.270 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.270 Security measures for delivery of vessel stores and bunkers. (a) General. The facility... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for delivery...

  3. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for delivery...

  4. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for delivery...

  5. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for newly-hired... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees....

  6. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for newly-hired... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees....

  7. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for newly-hired... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees....

  8. A Secure LFSR Based Random Measurement Matrix for Compressive Sensing

    NASA Astrophysics Data System (ADS)

    George, Sudhish N.; Pattathil, Deepthi P.

    2014-11-01

    In this paper, a novel approach for generating the secure measurement matrix for compressive sensing (CS) based on linear feedback shift register (LFSR) is presented. The basic idea is to select the different states of LFSR as the random entries of the measurement matrix and normalize these values to get independent and identically distributed (i.i.d.) random variables with zero mean and variance , where N is the number of input samples. The initial seed for the LFSR system act as the key to the user to provide security. Since the measurement matrix is generated from the LFSR system, and memory overload to store the measurement matrix is avoided in the proposed system. Moreover, the proposed system can provide security maintaining the robustness to noise of the CS system. The proposed system is validated through different block-based CS techniques of images. To enhance security, the different blocks of images are measured with different measurement matrices so that the proposed encryption system can withstand known plaintext attack. A modulo division circuit is used to reseed the LFSR system to generate multiple random measurement matrices, whereby after each fundamental period of LFSR, the feedback polynomial of the modulo circuit is modified in terms of a chaotic value. The proposed secure robust CS paradigm for images is subjected to several forms of attacks and is proven to be resistant against the same. From experimental analysis, it is proven that the proposed system provides better performance than its counterparts.

  9. Unconditionally secure bit commitment by transmitting measurement outcomes.

    PubMed

    Kent, Adrian

    2012-09-28

    We propose a new unconditionally secure bit commitment scheme based on Minkowski causality and the properties of quantum information. The receiving party sends a number of randomly chosen Bennett-Brassard 1984 (BB84) qubits to the committer at a given point in space-time. The committer carries out measurements in one of the two BB84 bases, depending on the committed bit value, and transmits the outcomes securely at (or near) light speed in opposite directions to remote agents. These agents unveil the bit by returning the outcomes to adjacent agents of the receiver. The protocol's security relies only on simple properties of quantum information and the impossibility of superluminal signalling.

  10. Defining and Computing a Valued Based Cyber Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In earlier works (Ben-Aissa et al. 2010; Abercrombie et al. 2008; Sheldon et al. 2009), we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  11. Measurable Control System Security through Ideal Driven Technical Metrics

    SciTech Connect

    Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

    2008-01-01

    The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based

  12. Measuring Stability and Security in Iraq

    DTIC Science & Technology

    2008-12-01

    remains unfunded at this time. These centers include a range complex, combat assault course, live fire shoot house, and outdoor classrooms . They...combined capacity is limited to 14,600 students. Additional facilities planned in 2009 include dedicated AAR and medical training classrooms and... meditated murder, manslaughter, kidnapping, stealing, aggravating circumstances, embezzlement, rape, sodomy, incest, counterfeiting, drug crimes

  13. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.267 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for newly hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  14. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.267 Security... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for newly hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  15. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.267 Security... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for newly hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  16. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.257 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for newly-hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  17. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.257 Security... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for newly-hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  18. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.257 Security... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for newly-hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  19. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.267 Security... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for newly hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  20. Low-Cost Security Measures for School Facilities

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    This paper discusses a variety of school safety and security measures that may be implemented at little or no cost and without the use of complex technology. Measures are presented according to these categories: (1) General; (2) Outside the Building; and (3) Inside the Building.

  1. Secure quantum weak oblivious transfer against individual measurements

    NASA Astrophysics Data System (ADS)

    He, Guang Ping

    2015-06-01

    In quantum weak oblivious transfer, Alice sends Bob two bits and Bob can learn one of the bits at his choice. It was found that the security of such a protocol is bounded by , where is the probability with which Alice can guess Bob's choice, and is the probability with which Bob can guess both of Alice's bits given that he learns one of the bits with certainty. Here we propose a protocol and show that as long as Alice is restricted to individual measurements, then both and can be made arbitrarily close to , so that maximal violation of the security bound can be reached. Even with some limited collective attacks, the security bound can still be violated. Therefore, although our protocol still cannot break the bound in principle when Alice has unlimited cheating power, it is sufficient for achieving secure quantum weak oblivious transfer in practice.

  2. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  3. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  4. Gamification for Measuring Cyber Security Situational Awareness

    SciTech Connect

    Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

    2013-03-01

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

  5. Development of Security Measures: Implementation Instructions for MIL-STD on Physical Security for DCS Facilities.

    DTIC Science & Technology

    1981-07-01

    Closed circuit television. e. Comunication cables. f. Fuel storage. g. Fuel lines. h. Air conditioning. The primary benefits of security measures...site charged with alarm assessment and response force dispatch. Once a intrusion is verified, the response force shall be dispatched and a verbal

  6. Punishment in School: The Role of School Security Measures

    ERIC Educational Resources Information Center

    Mowen, Thomas J.

    2014-01-01

    Although investigation of school security measures and their relationships to various outcomes including school crime rates (Gottfredson, 2001), perpetuation of social inequality (Ferguson, 2001; Nolan, 2011; Welch & Payne, 2010), and the impact on childhood experiences has seen significant growth within the last 20 years (Newman, 2004;…

  7. 33 CFR 105.270 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... (iv) Canines. (b) MARSEC Level 1. At MARSEC Level 1, the facility owner or operator must ensure the... facility at the rate specified by the approved FSP. (c) MARSEC Level 2. In addition to the security measures required for MARSEC Level 1 in this section, at MARSEC Level 2, the facility owner or...

  8. Managing Complex IT Security Processes with Value Based Measures

    SciTech Connect

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2009-01-01

    Current trends indicate that IT security measures will need to greatly expand to counter the ever increasingly sophisticated, well-funded and/or economically motivated threat space. Traditional risk management approaches provide an effective method for guiding courses of action for assessment, and mitigation investments. However, such approaches no matter how popular demand very detailed knowledge about the IT security domain and the enterprise/cyber architectural context. Typically, the critical nature and/or high stakes require careful consideration and adaptation of a balanced approach that provides reliable and consistent methods for rating vulnerabilities. As reported in earlier works, the Cyberspace Security Econometrics System provides a comprehensive measure of reliability, security and safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. This paper advocates a dependability measure that acknowledges the aggregate structure of complex system specifications, and accounts for variations by stakeholder, by specification components, and by verification and validation impact.

  9. Securely measuring the overlap between private datasets with cryptosets.

    PubMed

    Swamidass, S Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data--collected by different groups or across large collaborative networks--into a combined analysis. Unfortunately, some of the most interesting and powerful datasets--like health records, genetic data, and drug discovery data--cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset's contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach "information-theoretic" security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure.

  10. Securely Measuring the Overlap between Private Datasets with Cryptosets

    PubMed Central

    Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  11. 33 CFR 104.275 - Security measures for handling cargo.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.275 Security...) Maritime Security (MARSEC) Level 1. At MARSEC Level 1, the vessel owner or operator must ensure the..., container, or other cargo transport units are loaded; (3) Intensifying screening of vehicles to be loaded...

  12. The strategic measures for the industrial security of small and medium business.

    PubMed

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.

  13. The Strategic Measures for the Industrial Security of Small and Medium Business

    PubMed Central

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures. PMID:24955414

  14. A new measure for assessment of architectural speech security

    NASA Astrophysics Data System (ADS)

    Gover, Bradford N.; Bradley, John S.

    2003-10-01

    A new measure has been developed to indicate the audibility and intelligibility of speech transmitted through walls from adjacent rooms. The new measure is a frequency-weighted signal-to-noise ratio. It is shown to be a more accurate predictor of subjective ratings than the Articulation Index, the Speech Intelligibility Index, and simple A-weighted signal-to-noise ratios. Listening tests using English sentences were conducted to measure the fraction of words intelligible to acute-hearing, native-English-speaking listeners under a range of acoustical conditions. Each subject listened to 500 sentences, each of which had been filtered to represent passage through some type of wall construction. The level of the speech, as well as the level and spectrum of background ventilation-type noise was varied. The conditions in the test ranged from those where all subjects were able to correctly identify all the words in a sentence (i.e., very poor security), through to those where all subjects were unable to even recognize the presence of a speaking voice (i.e., excellent security). The tests, analysis, and derivation of the measure will be discussed, as will the directions of ongoing work in the area.

  15. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations

    ERIC Educational Resources Information Center

    Tanner-Smith, Emily E.; Fisher, Benjamin W.

    2015-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance,…

  16. Additives

    NASA Technical Reports Server (NTRS)

    Smalheer, C. V.

    1973-01-01

    The chemistry of lubricant additives is discussed to show what the additives are chemically and what functions they perform in the lubrication of various kinds of equipment. Current theories regarding the mode of action of lubricant additives are presented. The additive groups discussed include the following: (1) detergents and dispersants, (2) corrosion inhibitors, (3) antioxidants, (4) viscosity index improvers, (5) pour point depressants, and (6) antifouling agents.

  17. Porosity Measurements and Analysis for Metal Additive Manufacturing Process Control

    PubMed Central

    Slotwinski, John A; Garboczi, Edward J; Hebenstreit, Keith M

    2014-01-01

    Additive manufacturing techniques can produce complex, high-value metal parts, with potential applications as critical metal components such as those found in aerospace engines and as customized biomedical implants. Material porosity in these parts is undesirable for aerospace parts - since porosity could lead to premature failure - and desirable for some biomedical implants - since surface-breaking pores allows for better integration with biological tissue. Changes in a part’s porosity during an additive manufacturing build may also be an indication of an undesired change in the build process. Here, we present efforts to develop an ultrasonic sensor for monitoring changes in the porosity in metal parts during fabrication on a metal powder bed fusion system. The development of well-characterized reference samples, measurements of the porosity of these samples with multiple techniques, and correlation of ultrasonic measurements with the degree of porosity are presented. A proposed sensor design, measurement strategy, and future experimental plans on a metal powder bed fusion system are also presented. PMID:26601041

  18. Porosity Measurements and Analysis for Metal Additive Manufacturing Process Control.

    PubMed

    Slotwinski, John A; Garboczi, Edward J; Hebenstreit, Keith M

    2014-01-01

    Additive manufacturing techniques can produce complex, high-value metal parts, with potential applications as critical metal components such as those found in aerospace engines and as customized biomedical implants. Material porosity in these parts is undesirable for aerospace parts - since porosity could lead to premature failure - and desirable for some biomedical implants - since surface-breaking pores allows for better integration with biological tissue. Changes in a part's porosity during an additive manufacturing build may also be an indication of an undesired change in the build process. Here, we present efforts to develop an ultrasonic sensor for monitoring changes in the porosity in metal parts during fabrication on a metal powder bed fusion system. The development of well-characterized reference samples, measurements of the porosity of these samples with multiple techniques, and correlation of ultrasonic measurements with the degree of porosity are presented. A proposed sensor design, measurement strategy, and future experimental plans on a metal powder bed fusion system are also presented.

  19. Modeling Errors in Daily Precipitation Measurements: Additive or Multiplicative?

    NASA Technical Reports Server (NTRS)

    Tian, Yudong; Huffman, George J.; Adler, Robert F.; Tang, Ling; Sapiano, Matthew; Maggioni, Viviana; Wu, Huan

    2013-01-01

    The definition and quantification of uncertainty depend on the error model used. For uncertainties in precipitation measurements, two types of error models have been widely adopted: the additive error model and the multiplicative error model. This leads to incompatible specifications of uncertainties and impedes intercomparison and application.In this letter, we assess the suitability of both models for satellite-based daily precipitation measurements in an effort to clarify the uncertainty representation. Three criteria were employed to evaluate the applicability of either model: (1) better separation of the systematic and random errors; (2) applicability to the large range of variability in daily precipitation; and (3) better predictive skills. It is found that the multiplicative error model is a much better choice under all three criteria. It extracted the systematic errors more cleanly, was more consistent with the large variability of precipitation measurements, and produced superior predictions of the error characteristics. The additive error model had several weaknesses, such as non constant variance resulting from systematic errors leaking into random errors, and the lack of prediction capability. Therefore, the multiplicative error model is a better choice.

  20. CSER 79-028, Addendum 2: Security bar addition to pedestal storage racks in Room 3 in 2736-Z Building

    SciTech Connect

    Miller, E.M.

    1994-11-18

    The Plutonium Finishing Plant (PFP) is installing security bars on plutonium storage racks in Room 3 in 2736-Z Building to meet International Atomic Energy Agency (IAEA) material control requirements. Figures show the existing arrangement and design of the security bars. The security bars are to be fabricated of aluminum or carbon steel. The detailed fabrication sketches are reproduced in Appendix C. The security bars are to be installed close to the chains of plutonium so a determination of their effect on criticality safety needs to be made. The addition of security bars to the storage array of 2.5 kg plutonium buttons in Room 3 can effect reactivity by reflecting neutrons back into the plutonium in the storage cans, by absorbing neutrons, and by moderating neutrons between stored plutonium buttons. The small amount of metal added by the storage bars in comparison to the amount of concrete in the walls and aluminum in the shelf monitors already in place would not significantly increase the k{sub eff} of the storage array. Several computer calculations in previous analyses show that the security bars will have a negligible affect on reactivity.

  1. 78 FR 48218 - Emergency Order Establishing Additional Requirements for Attendance and Securement of Certain...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ... Terminal The Federal Railroad Administration (FRA) of the United States Department of Transportation (DOT... terminal are properly secured against unintended movement. FRA re-examined its regulations governing the... on mainline track or mainline siding outside of a yard or terminal to ensure [[Page 48219

  2. Toward the Printed World: Additive Manufacturing and Implications for National Security (Defense Horizons, Number 73)

    DTIC Science & Technology

    2012-09-01

    Advanced Research Projects Agency (DAR- PA) has shown interest in this technology, most recently partnering with Georgia Tech and Stratasys to...involved in national security policy. The recently launched National Advanced Manu- facturing Innovation Institute (NAMII)—a pilot pro- gram within the...provide a general introduction to these issues for nontechnical readers through a survey of the recent history and the current state of technology

  3. Cleaning and Cleanliness Measurement of Additive Manufactured Parts

    NASA Technical Reports Server (NTRS)

    Welker, Roger W.; Mitchell, Mark A.

    2015-01-01

    The successful acquisition and utilization of piece parts and assemblies for contamination sensitive applications requires application of cleanliness acceptance criteria. Contamination can be classified using many different schemes. One common scheme is classification as organic, ionic and particulate contaminants. These may be present in and on the surface of solid components and assemblies or may be dispersed in various gaseous or liquid media. This discussion will focus on insoluble particle contamination on the surface of piece parts and assemblies. Cleanliness of parts can be controlled using two strategies, referred to as gross cleanliness and precision cleanliness. Under a gross cleanliness strategy acceptance is based on visual cleanliness. This approach introduces a number of concerns that render it unsuitable for controlling cleanliness of high technology products. Under the precision cleanliness strategy, subjective, visual assessment of cleanliness is replaced by objective measurement of cleanliness. When a precision cleanliness strategy is adopted there naturally arises the question: How clean is clean enough? The six commonly used methods for establishing objective cleanliness acceptance limits will be discussed. Special emphasis shall focus on the use of multiple extraction, a technique that has been demonstrated for additively manufactured parts.

  4. Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities

    PubMed Central

    Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min

    2012-01-01

    Objectives The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. Methods The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. Results From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. Conclusions This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another. PMID:22844648

  5. 33 CFR 105.205 - Facility Security Officer (FSO).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... facility security surveys and inspections; (vi) Instruction techniques for security training and education... of conducting audits, inspections, control, and monitoring techniques. (2) In addition to knowledge... likely to threaten security; (xi) Techniques used to circumvent security measures; (xii)...

  6. Commission on Measures of Household Economic Security Act of 2010

    THOMAS, 111th Congress

    Sen. Feingold, Russell D. [D-WI

    2009-12-11

    12/11/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... critical facility infrastructure, including: (i) Water supplies; (ii) Telecommunications; (iii) Electrical system; and (iv) Access points for ventilation and air-conditioning systems; (5) Manufacturing or...: (1) Restricting access to only authorized personnel; (2) Securing all access points not actively...

  8. Measuring Global Water Security Towards Sustainable Development Goals

    NASA Technical Reports Server (NTRS)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  9. What are we assessing when we measure food security? A compendium and review of current metrics.

    PubMed

    Jones, Andrew D; Ngure, Francis M; Pelto, Gretel; Young, Sera L

    2013-09-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics.

  10. Security camera resolution measurements: Horizontal TV lines versus modulation transfer function measurements.

    SciTech Connect

    Birch, Gabriel Carisle; Griffin, John Clark

    2015-01-01

    The horizontal television lines (HTVL) metric has been the primary quantity used by division 6000 related to camera resolution for high consequence security systems. This document shows HTVL measurements are fundamen- tally insufficient as a metric to determine camera resolution, and propose a quantitative, standards based methodology by measuring the camera system modulation transfer function (MTF), the most common and accepted metric of res- olution in the optical science community. Because HTVL calculations are easily misinterpreted or poorly defined, we present several scenarios in which HTVL is frequently reported, and discuss their problems. The MTF metric is discussed, and scenarios are presented with calculations showing the application of such a metric.

  11. Development of a food security measurement tool for New Zealand households.

    PubMed

    Parnell, Winsome R; Gray, Andrew R

    2014-10-28

    To determine the prevalence of household food insecurity in New Zealand (NZ), eight food security statements were included in the 1997 National Nutrition Survey of adults. Rasch model analysis was performed to determine whether each food security statement (addressing a food security attribute) was discrete and could be ranked on a unidimensional scale. The NZ model had marginal 'household' reliability (0·60-0·66), good item separation (17·20-17·77) and item infit/outfit values between 0·8 and 1·25. Indices could be ranked by level of severity and represent the experience of household food insecurity in NZ. Categories of food security were assigned and used to predict food choice, and energy and nutrient intakes. Compared with fully secure/almost fully secure households, those that were moderately secure or of low security were less likely to consume the recommended daily servings of fruit and vegetables, and more likely to consume fatty meats. Intake of total fat, saturated, monounsaturated and polyunsaturated fat, cholesterol, lactose and vitamin B12 increased with lower levels of food security. Intakes of glucose, fructose and vitamin C were highest in the fully secure/almost fully secure category. This unique eight-component food security measurement tool has less respondent burden than the US Core Food Security Measure. The relationships between the level of food insecurity and food choice and nutrient intakes illustrate that the most food-insecure households have less healthy diets. This relatively brief population-specific measurement tool is suitable to monitor population food security status, and is a useful marker of nutritional status.

  12. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Facility Vulnerability and Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST... Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  13. Parental Involvement in School and the Role of School Security Measures

    ERIC Educational Resources Information Center

    Mowen, Thomas J.

    2015-01-01

    Over the past three decades, the United States has experienced a significant increase in the use of security measures in public and private secondary schools. Measures including police officers, metal detectors, and security cameras are becoming more common in the hallways of American schools. Following this surge, a number of academics have…

  14. Risk-Based Measurement and Analysis: Application to Software Security

    DTIC Science & Technology

    2012-02-01

    Risk Diagnostic ( MRD ) 12 4.1 Driver Identification 12 4.1.1 Mission 12 4.1.2 Objectives 13 4.1.3 Drivers 14 4.1.4 Deriving a Set of Drivers 15...4.4 Mission Risk 21 4.5 The MRD : Key Tasks and Steps 22 5 Integrated Measurement and Analysis Framework (IMAF) 23 5.1 Using the IMAF to Direct...Identification 27 6.2 Standard Mapping 28 6.3 Driver Modeling 29 7 Summary and Next Steps 32 7.1 The IMAF and the MRD 32 7.2 Additional Research

  15. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  16. Special report. Upgrading security: hospitals opt for new equipment; new approaches; heavy investments in additional patient, employee protection.

    PubMed

    1994-07-01

    An increasing number of hospitals are taking steps to prevent the violence that plagues both urban and rural areas from spilling over into their emergency rooms and nursing units. Four facilities--Duke Medical University Center, Durham, NC; Children's Hospital, Columbus, OH; Ingalls Hospital, Harvey, IL; and University Medical Center, Las Vegas, NV--have recently installed new equipment or implemented innovative security procedures in an effort to better protect patients and employees. Although the price tag for additional protection is often high, officials at the hospitals agree that providing a safe environment is worth the investment.

  17. Security Problems of Scan Design and Accompanying Measures

    NASA Astrophysics Data System (ADS)

    Biasizzo, Anton; Novak, Franc

    2016-05-01

    The paper deals with the security problems of scan design and investigates currently proposed solutions. A solution based on data encryption to protect the data in scan chains is discussed and problems related to the block-based encoding are outlined. Next, security extension for IEEE Std. 1149.1 providing a locking mechanism is analysed. The mechanism prevents unauthorised users to interfere via test bus with the system normal operation. Possible attack scenario is considered and the probabilities of successful attack within a given time interval are calculated for different lengths of the Lock register. The paper concludes with the description of current work focused on improvements the security of the locking mechanism, in particular by using simplified public key infrastructure.

  18. Measuring global water security towards sustainable development goals

    NASA Astrophysics Data System (ADS)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-12-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  19. To amend the National Security Act of 1947 to provide additional procedures for congressional oversight.

    THOMAS, 111th Congress

    Rep. Thornberry, Mac [R-TX-13

    2009-12-10

    12/10/2009 Referred to the Committee on Intelligence (Permanent Select), and in addition to the Committee on Rules, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Additional studies for the spectrophotometric measurement of iodine in water

    NASA Technical Reports Server (NTRS)

    1972-01-01

    Previous work in iodine spectroscopy is briefly reviewed. Continued studies of the direct spectrophotometric determination of aqueous iodine complexed with potassium iodide show that free iodine is optimally determined at the isosbestic point for these solutions. The effects on iodine determinations of turbidity and chemical substances (in trace amounts) is discussed and illustrated. At the levels tested, iodine measurements are not significantly altered by such substances. A preliminary design for an on-line, automated iodine monitor with eventual capability of operating also as a controller was analyzed and developed in detail with respect single beam colorimeter operating at two wavelengths (using a rotating filter wheel). A flow-through sample cell allows the instrument to operate continuously, except for momentary stop flow when measurements are made. The timed automatic cycling of the system may be interrupted whenever desired, for manual operation. An analog output signal permits controlling an iodine generator.

  1. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) All persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must... screening or inspection; and (ii) Failure to consent or submit to screening or inspection will result...

  2. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...; (7) Control the entry, parking, loading and unloading of vehicles; (8) Control the movement and... Level 1. At MARSEC Level 1, the facility owner or operator must ensure the implementation of security... persons and all vehicles seeking entry; (5) Patrolling or monitoring the perimeter of restricted areas;...

  3. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...; (7) Control the entry, parking, loading and unloading of vehicles; (8) Control the movement and... Level 1. At MARSEC Level 1, the facility owner or operator must ensure the implementation of security... persons and all vehicles seeking entry; (5) Patrolling or monitoring the perimeter of restricted areas;...

  4. Examining School Security Measures as Moderators of the Association between Homophobic Victimization and School Avoidance

    ERIC Educational Resources Information Center

    Fisher, Benjamin W.; Tanner-Smith, Emily E.

    2015-01-01

    Homophobic victimization is a pervasive problem in U.S. schools that leads to negative outcomes for students. Those who experience homophobic victimization are at greater risk for avoiding particular spaces in school because they feel unsafe or afraid. Visible school security measures (e.g., security guards, metal detectors, and cameras) offer…

  5. Examining School Security Measures as Moderators of the Association between Homophobic Victimization and School Avoidance

    ERIC Educational Resources Information Center

    Fisher, Benjamin W.; Tanner-Smith, Emily E.

    2016-01-01

    Homophobic victimization is a pervasive problem in U.S. schools that leads to negative outcomes for students. Those who experience homophobic victimization are at greater risk for avoiding particular spaces in school because they feel unsafe or afraid. Visible school security measures (e.g., security guards, metal detectors, and cameras) offer…

  6. Breach Risk Magnitude: A Quantitative Measure of Database Security

    PubMed Central

    Yasnoff, William A.

    2016-01-01

    A quantitative methodology is described that provides objective evaluation of the potential for health record system breaches. It assumes that breach risk increases with the number of potential records that could be exposed, while it decreases when more authentication steps are required for access. The breach risk magnitude (BRM) is the maximum value for any system user of the common logarithm of the number of accessible database records divided by the number of authentication steps needed to achieve such access. For a one million record relational database, the BRM varies from 5.52 to 6 depending on authentication protocols. For an alternative data architecture designed specifically to increase security by separately storing and encrypting each patient record, the BRM ranges from 1.3 to 2.6. While the BRM only provides a limited quantitative assessment of breach risk, it may be useful to objectively evaluate the security implications of alternative database organization approaches. PMID:28269923

  7. Cleaning and Cleanliness Measurement of Additive Manufactured Parts

    NASA Technical Reports Server (NTRS)

    Mitchell, Mark A.; Raley, Randy

    2016-01-01

    The successful acquisition and utilization of piece parts and assemblies for contamination sensitive applications requires application of cleanliness acceptance criteria. Contamination can be classified using many different schemes. One common scheme is classification as organic, ionic and particulate contaminants. These may be present in and on the surface of solid components and assemblies or may be dispersed in various gaseous or liquid media. This discussion will focus on insoluble particle contamination on the surfaces of piece parts and assemblies. Cleanliness of parts can be controlled using two strategies, referred to as gross cleanliness and precision cleanliness. Under a gross cleanliness strategy acceptance is based on visual cleanliness. This approach introduces a number of concerns that render it unsuitable for controlling cleanliness of high technology products. Under the precision cleanliness strategy, subjective, visual assessment of cleanliness is replaced by objective measurement of cleanliness. When a precision cleanliness strategy is adopted there naturally arises the question: How clean is clean enough? The methods for establishing objective cleanliness acceptance limits will be discussed.

  8. Food safety security: a new concept for enhancing food safety measures.

    PubMed

    Iyengar, Venkatesh; Elmadfa, Ibrahim

    2012-06-01

    The food safety security (FSS) concept is perceived as an early warning system for minimizing food safety (FS) breaches, and it functions in conjunction with existing FS measures. Essentially, the function of FS and FSS measures can be visualized in two parts: (i) the FS preventive measures as actions taken at the stem level, and (ii) the FSS interventions as actions taken at the root level, to enhance the impact of the implemented safety steps. In practice, along with FS, FSS also draws its support from (i) legislative directives and regulatory measures for enforcing verifiable, timely, and effective compliance; (ii) measurement systems in place for sustained quality assurance; and (iii) shared responsibility to ensure cohesion among all the stakeholders namely, policy makers, regulators, food producers, processors and distributors, and consumers. However, the functional framework of FSS differs from that of FS by way of: (i) retooling the vulnerable segments of the preventive features of existing FS measures; (ii) fine-tuning response systems to efficiently preempt the FS breaches; (iii) building a long-term nutrient and toxicant surveillance network based on validated measurement systems functioning in real time; (iv) focusing on crisp, clear, and correct communication that resonates among all the stakeholders; and (v) developing inter-disciplinary human resources to meet ever-increasing FS challenges. Important determinants of FSS include: (i) strengthening international dialogue for refining regulatory reforms and addressing emerging risks; (ii) developing innovative and strategic action points for intervention {in addition to Hazard Analysis and Critical Control Points (HACCP) procedures]; and (iii) introducing additional science-based tools such as metrology-based measurement systems.

  9. Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan

    NASA Astrophysics Data System (ADS)

    Kobayashi, Hideaki; Watanabe, Kenji; Watanabe, Takahito; Nagayasu, Yukinobu

    In recent years, the dilemma of cyber attacks by malicious third parties targeting security vulnerabilities in information and communication systems has emerged, resulting in security incidents. This situation suggests that the establishment of proactive efforts and recurrence prevention measures are becoming imperative, especially in critical infrastructure sectors.This paper provides an analysis of 58 security incident cases, which occurred in critical infrastructures worldwide and were published in media. The purpose of the analysis is to conclude to a valid list of recurrence prevention measures that constitute good practices.

  10. Efficiency measurement for hospitals owned by the Iranian social security organisation.

    PubMed

    Hajialiafzali, Hossein; Moss, J R; Mahmood, M A

    2007-06-01

    This study used Data Envelopment Analysis (DEA) to examine the relative efficiency of hospitals owned by the Iranian Social Security Organization, which is the second largest institutional source of hospital care in that country. Using data for the year 2002, 26 of the 53 hospitals were deemed to be efficient. Inefficient hospitals had an average score of 90%, implying a potential reduction in all inputs on average by about 10% with no impact on output levels. In addition to the conventional DEA measurement, efficient hospitals were ranked by calculating super-efficiency scores, by identifying weak efficient hospitals, and by determining the frequency of peers. The study provides useful information for improving hospital management, rationalizing resource allocation, and improving services provided by hospitals.

  11. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    PubMed

    Bernik, Igor; Prislan, Kaja

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  12. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation

    PubMed Central

    2016-01-01

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model—ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it’s recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes. PMID:27655001

  13. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    PubMed

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.

  14. [Are the flight security measures good for the patients? The "sickurity" problem].

    PubMed

    Felkai, Péter

    2010-10-10

    Due to the stiffening requirements of security measures at the airports, prevention of air-travel related illnesses have become more difficult. The backlash effects of restrictions (e.g. fluid and movement restrictions) can trigger or even improve pathophysiological processes. The most advanced security check methods, the full body scan, besides ethical and moral considerations, may induce yet unknown pathological processes. We face the similar problem with the traveller, who becomes ill or injured during the trip. In this case, repatriation is often required, which is usually accomplished by commercial airlines. If patient should be transported by stretcher, it is also available on regular flight, but in this case he/she must be accompanied by a medical professional. This solution raises much more security problem: not only the sick person and the medical team, but even their medical equipments and medicines have to be checked. Due to the lack of standardised regulations the security staff solves the problem by various attempts from emphatic approach till refusal. For these reasons, a clear and exact regulation is needed, which must be based upon medical experts' opinion, and should deal not only with the flight security but with the patient's security, as well. This regulation can cease the patients and their medical accompanied persons' to be defencelessness against local authorities and security services. The same is true for handicapped persons. Author suggests solutions for the problem, balancing between flight security and the patient's "sickurity".

  15. Alternate measures of replacement rates for social security benefits and retirement income.

    PubMed

    Biggs, Andrew G; Springstead, Glenn R

    2008-01-01

    Discussions of retirement planning and Social Security policy often focus on replacement rates, which represent retirement income or Social Security benefits relative to preretirement earnings. Replacement rates are a rule of thumb designed to simplify the process of smoothing consumption over individuals' lifetimes. Despite their widespread use, however, there is no common means of measuring replacement rates. Various measures of preretirement earnings mean that the denominators used in replacement rate calculations are often inconsistent and can lead to confusion. Whether a given replacement rate represents an adequate retirement income depends on whether the denominator in the replacement rate calculation is an appropriate measure of preretirement earnings. This article illustrates replacement rates using four measures of preretirement earnings: final earnings; the constant income payable from the present value (PV) of lifetime earnings (PV payment); the wage-indexed average of all earnings prior to claiming Social Security benefits; and the inflation-adjusted average of all earnings prior to claiming Social Security benefits (consumer price index (CPI) average). The article then measures replacement rates against a sample of the Social Security beneficiary population using the Social Security Administration's Modeling Income in the Near Term (MINT) microsimulation model. Replacement rates are shown based on Social Security benefits alone, to indicate the adequacy of the current benefit structure, as well as on total retirement income including defined benefit pensions and financial assets, to indicate total preparedness for retirement. The results show that replacement rates can vary considerably based on the definition of preretirement earnings used and whether replacement rates are measured on an individual or a shared basis. For current new retirees, replacement rates based on all sources of retirement income seem strong by most measures and are projected to

  16. Security Assistance: DOD’s Ongoing Reforms Address Some Challenges, but Additional Information Is Needed to Further Enhance Program Management

    DTIC Science & Technology

    2012-11-01

    Abbreviations BPC building partner capacity DOD Department of Defense DSCA Defense Security Cooperation Agency EFTS Enhanced Freight Tracking System...SCOs are ready to receive a planned delivery. For both FMS and pseudo-FMS processes, DOD uses the Enhanced Freight Tracking System ( EFTS ), a secure...providing data for this system. The Security Assistance Management Manual recommends that SCOs use the EFTS to maintain awareness of incoming shipments

  17. Security of Y-00 under heterodyne measurement and fast correlation attack

    NASA Astrophysics Data System (ADS)

    Donnet, Stéphane; Thangaraj, Andrew; Bloch, Matthieu; Cussey, Johann; Merolla, Jean-Marc; Larger, Laurent

    2006-08-01

    We provide a security analysis of the Y-00 protocol under heterodyne measurement and correlation attack. We show that the secrecy of the data encryption scheme is extremely sensitive to the running-key generation process. In many situations our simple attack succeeds in recovering the initial shared secret key. Our simulation results suggest that a truly secure implementation of the protocol should take into account the effective key generation method.

  18. Measuring political commitment and opportunities to advance food and nutrition security: piloting a rapid assessment tool.

    PubMed

    Fox, Ashley M; Balarajan, Yarlini; Cheng, Chloe; Reich, Michael R

    2015-06-01

    Lack of political commitment has been identified as a primary reason for the low priority that food and nutrition interventions receive from national governments relative to the high disease burden caused by malnutrition. Researchers have identified a number of factors that contribute to food and nutrition's 'low-priority cycle' on national policy agendas, but few tools exist to rapidly measure political commitment and identify opportunities to advance food and nutrition on the policy agenda. This article presents a theory-based rapid assessment approach to gauging countries' level of political commitment to food and nutrition security and identifying opportunities to advance food and nutrition on the policy agenda. The rapid assessment tool was piloted among food and nutrition policymakers and planners in 10 low- and middle-income countries in April to June 2013. Food and nutrition commitment and policy opportunity scores were calculated for each country and strategies to advance food and nutrition on policy agendas were designed for each country. The article finds that, in a majority of countries, political leaders had verbally and symbolically committed to addressing food and nutrition, but adequate financial resources were not allocated to implement specific programmes. In addition, whereas the low cohesion of the policy community has been viewed a major underlying cause of the low-priority status of food and nutrition, the analysis finds that policy community cohesion and having a well thought-out policy alternative were present in most countries. This tool may be useful to policymakers and planners providing information that can be used to benchmark and/or evaluate advocacy efforts to advance reforms in the food and nutrition sector; furthermore, the results can help identify specific strategies that can be employed to move the food and nutrition agenda forward. This tool complements others that have been recently developed to measure national commitment to

  19. Integrated Measurement and Analysis Framework for Software Security

    DTIC Science & Technology

    2010-09-01

    tar - CMU/SEI-2010-TN-025 | 6 geted analysis, reports, and tactical measurement) and provide decision makers with a consolidat- ed view of current...drivers that have been selected. Data from tar - geted analysis, reports, and tactical measurement that meet these information needs can be col...sufficient information about the mission and objectives being eva - luated. As a result, the first step in identifying a set of drivers is to establish the

  20. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    SciTech Connect

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  1. 31 CFR 1023.410 - Additional records to be made and retained by brokers or dealers in securities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... monetary instruments, checks, or investment securities and of each transfer of funds or credit, of more... section need not be secured in the following instances: (i) Accounts for public funds opened by agencies...) Accounts for aliens who are accredited representatives to international organizations which are entitled...

  2. 31 CFR 1023.410 - Additional records to be made and retained by brokers or dealers in securities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... monetary instruments, checks, or investment securities and of each transfer of funds or credit, of more... section need not be secured in the following instances: (i) Accounts for public funds opened by agencies...) Accounts for aliens who are accredited representatives to international organizations which are entitled...

  3. 31 CFR 1023.410 - Additional records to be made and retained by brokers or dealers in securities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... monetary instruments, checks, or investment securities and of each transfer of funds or credit, of more... section need not be secured in the following instances: (i) Accounts for public funds opened by agencies...) Accounts for aliens who are accredited representatives to international organizations which are entitled...

  4. 75 FR 14335 - Revisions to the Export Administration Regulations To Enhance U.S. Homeland Security: Addition of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-25

    ... issues identified by an interagency working group that is reviewing export control issues related to homeland security. The interagency working group is made up of representatives from the Departments of Commerce, Defense, Homeland Security and State. The purpose of the interagency working group is to...

  5. ADAPTING FTIR MEASUREMENT TECHNOLOGY TO HOMELAND SECURITY APPLICATIONS

    EPA Science Inventory

    Open-path Fourier transform infrared (OP-FTIR) sensors have numerous advantages for measuring chemical plumes over wide areas compared to point detection sensors. Extractive FTIR sensors have been used for industrial stack monitoring and are attractive for building ventilation sy...

  6. 33 CFR 105.265 - Security measures for handling cargo.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... storage in a restricted area while awaiting loading or pick up; (6) Restrict the entry of cargo to the..., giving the location of those dangerous goods and hazardous substances. (b) MARSEC Level 1. At MARSEC Level 1, the facility owner or operator must ensure the implementation of measures to: (1) Unless...

  7. 33 CFR 105.265 - Security measures for handling cargo.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... storage in a restricted area while awaiting loading or pick up; (6) Restrict the entry of cargo to the..., giving the location of those dangerous goods and hazardous substances. (b) MARSEC Level 1. At MARSEC Level 1, the facility owner or operator must ensure the implementation of measures to: (1) Unless...

  8. Controlled quantum secure direct communication by entanglement distillation or generalized measurement

    NASA Astrophysics Data System (ADS)

    Tan, Xiaoqing; Zhang, Xiaoqian

    2016-05-01

    We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.

  9. Cryptographically secure hardware random number generator dedicated for distributed measurement and control systems

    NASA Astrophysics Data System (ADS)

    Czernik, Pawel

    The chaotic signal generator based on the theory of nonlinear dynamical systems for applications in cryptographically secure distributed measurement and control systems with asymmetric resources is presented. This system was implemented on the basis of the physical chaotic electronic vibration generator in which the resonant circuit is composed of two capacitors, two resistors, coil and transistor, called the Colpitts oscillator. The presented system was designed, programmed and thoroughly tested in the term of cryptographic security in our laboratory, what there is the most important part of this publication. True cryptographic security was tested based on the author's software and the software environment called RDieHarder. The obtained results will be here presented and analyzed in detail with particular reference to the specificity of distributed measurement and control systems with asymmetric resources.

  10. Household food security status measured by the US-Household Food Security/Hunger Survey Module (US-FSSM) is in line with coping strategy indicators found in urban and rural Indonesia.

    PubMed

    Usfar, Avita A; Fahmida, Umi; Februhartanty, Judhiastuty

    2007-01-01

    The food security assessment used by the United State's Food Security/Hunger Survey Module (US- FSSM) was used in five studies: these were in two urban and four rural areas in Indonesia between February 2004- August 2005. The number of households assessed was 3,704 and consisted of 45% urban and 55% rural. All households had children below five years. This paper aims to assess the applicability of US-FSSM for measuring household food-insecurity in Indonesia. Common coping-strategies discussed are to borrow money from the family, get an additional job, to lessen portion size of food, and to sell small assets. Although households in urban and rural areas were similar in size/number of children and male headed; the urban households were more income-secure, educated, and had better access to electrical appliances. A majority of the households was food-insecure (77% and 84% in urban and rural consecutively). More food-insecure households without and with hunger were found in rural areas. The number of affirmative responses to 17 out of 18 questions in the USFSSM was more in the rural households, showing less fortunate cases of food-insecurity. For a given coping strategy, as food-security status becomes more severe, the higher the percentage of households employing it. For a given food-security status, percentage of households was higher among lower-degree and less among higher-degree coping. Combining food-security and coping-strategy indicators may help to identify transient-food-secure households. Observing both indicators throughout different time of the year continuously may further identify adaptive mechanism by chronic-food-insecure households. Information on household food diversity could enrich findings on dietary intake modification, hence moving from food-security to nutrition-security.

  11. Prospects for cost reductions from relaxing additional cross-border measures related to livestock trade.

    PubMed

    Hop, G E; Mourits, M C M; Slager, R; Oude Lansink, A G J M; Saatkamp, H W

    2013-05-01

    Compared with the domestic trade in livestock, intra-communal trade across the European Union (EU) is subject to costly, additional veterinary measures. Short-distance transportation just across a border requires more measures than long-distance domestic transportation, while the need for such additional cross-border measures can be questioned. This study examined the prospects for cost reductions from relaxing additional cross-border measures related to trade within the cross-border region of the Netherlands (NL) and Germany (GER); that is, North Rhine Westphalia and Lower Saxony. The study constructed a deterministic spread-sheet cost model to calculate the costs of both routine veterinary measures (standard measures that apply to both domestic and cross-border transport) and additional cross-border measures (extra measures that only apply to cross-border transport) as applied in 2010. This model determined costs by stakeholder, region and livestock sector, and studied the prospects for cost reduction by calculating the costs after the relaxation of additional cross-border measures. The selection criteria for relaxing these measures were (1) a low expected added value on preventing contagious livestock diseases, (2) no expected additional veterinary risks in case of relaxation of measures and (3) reasonable cost-saving possibilities. The total cost of routine veterinary measures and additional cross-border measures for the cross-border region was €22.1 million, 58% (€12.7 million) of which came from additional cross-border measures. Two-thirds of this €12.7 million resulted from the trade in slaughter animals. The main cost items were veterinary checks on animals (twice in the case of slaughter animals), export certification and control of export documentation. Four additional cross-border measures met the selection criteria for relaxation. The relaxation of these measures could save €8.2 million (€5.0 million for NL and €3.2 million for GER) annually

  12. 78 FR 9769 - Bureau of International Security and Nonproliferation Imposition of Nonproliferation Measures on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-11

    ... of International Security and Nonproliferation Imposition of Nonproliferation Measures on Chinese and.... ACTION: Notice. SUMMARY: The U.S. Government has determined that a number of Chinese and Iranian foreign... amended, the U.S. Government determined on December 21, 2012 that the following Chinese and...

  13. Preventing School Bullying: Should Schools Prioritize an Authoritative School Discipline Approach over Security Measures?

    ERIC Educational Resources Information Center

    Gerlinger, Julie; Wo, James C.

    2016-01-01

    A common response to school violence features the use of security measures to deter serious and violent incidents. However, a second approach, based on school climate theory, suggests that schools exhibiting authoritative school discipline (i.e., high structure and support) might more effectively reduce school disorder. We tested these approaches…

  14. 33 CFR 105.285 - Additional requirements-passenger and ferry facilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements..., that the following security measures are implemented in addition to the requirements of this part: (1... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Additional...

  15. 33 CFR 105.285 - Additional requirements-passenger and ferry facilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements..., that the following security measures are implemented in addition to the requirements of this part: (1... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Additional...

  16. 33 CFR 105.285 - Additional requirements-passenger and ferry facilities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements..., that the following security measures are implemented in addition to the requirements of this part: (1... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Additional...

  17. 33 CFR 105.285 - Additional requirements-passenger and ferry facilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements..., that the following security measures are implemented in addition to the requirements of this part: (1... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Additional...

  18. Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work

    SciTech Connect

    Malviya, Ashish; Fink, Glenn A.; Sego, Landon H.; Endicott-Popovsky, Barbara E.

    2011-04-11

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge in turn could lead to better preparation of cyber defenders in both military and civilian settings. We conducted proof of concept experimentation to collect data during the Pacific-rim Regional Collegiate Cyber Defense Competition (PRCCDC) and analyzed it to study the behavior of cyber defenders. We propose that situational awareness predicts performance of cyber security professionals, and in this paper we focus on our collection and analysis of competition data to determine whether it supports our hypothesis. In addition to normal cyber data, we collected situational awareness and workload data and compared it against the performance of cyber defenders as indicated by their competition score. We conclude that there is a weak correlation between our measure of situational awareness and performance that we hope to exploit in further studies.

  19. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  20. What Are We Assessing When We Measure Food Security? A Compendium and Review of Current Metrics12

    PubMed Central

    Jones, Andrew D.; Ngure, Francis M.; Pelto, Gretel; Young, Sera L.

    2013-01-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics. PMID:24038241

  1. Measures for assessing architectural speech security (privacy) of closed offices and meeting rooms

    NASA Astrophysics Data System (ADS)

    Gover, Bradford N.; Bradley, John S.

    2004-12-01

    Objective measures were investigated as predictors of the speech security of closed offices and rooms. A new signal-to-noise type measure is shown to be a superior indicator for security than existing measures such as the Articulation Index, the Speech Intelligibility Index, the ratio of the loudness of speech to that of noise, and the A-weighted level difference of speech and noise. This new measure is a weighted sum of clipped one-third-octave-band signal-to-noise ratios; various weightings and clipping levels are explored. Listening tests had 19 subjects rate the audibility and intelligibility of 500 English sentences, filtered to simulate transmission through various wall constructions, and presented along with background noise. The results of the tests indicate that the new measure is highly correlated with sentence intelligibility scores and also with three security thresholds: the threshold of intelligibility (below which speech is unintelligible), the threshold of cadence (below which the cadence of speech is inaudible), and the threshold of audibility (below which speech is inaudible). The ratio of the loudness of speech to that of noise, and simple A-weighted level differences are both shown to be well correlated with these latter two thresholds (cadence and audibility), but not well correlated with intelligibility. .

  2. Defense Horizons. No. 73. September 2012. Toward the Printed World: Additive Manufacturing and Implications for National Security

    DTIC Science & Technology

    2012-09-01

    Advanced Research Projects Agency (DAR- PA) has shown interest in this technology, most recently partnering with Georgia Tech and Stratasys to...involved in national security policy. The recently launched National Advanced Manu- facturing Innovation Institute (NAMII)—a pilot pro- gram within the...provide a general introduction to these issues for nontechnical readers through a survey of the recent history and the current state of technology

  3. 49 CFR 192.935 - What additional preventive and mitigative measures must an operator take?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false What additional preventive and mitigative measures... STANDARDS Gas Transmission Pipeline Integrity Management § 192.935 What additional preventive and mitigative... those already required by Part 192 to prevent a pipeline failure and to mitigate the consequences of...

  4. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program

    DTIC Science & Technology

    1989-05-01

    and airport security measures. Finally, the passengers, the ultimate beneficiaries of the security program, pay for the costs of the program through...required to adopt and use a security program which provides a secure operating environment for these air carriers. Airport security programs are designed to...special security requirements. This additional level of security precaution has been effected through changes to the F4A-approved airport security programs

  5. Analysis of error-prone survival data under additive hazards models: measurement error effects and adjustments.

    PubMed

    Yan, Ying; Yi, Grace Y

    2016-07-01

    Covariate measurement error occurs commonly in survival analysis. Under the proportional hazards model, measurement error effects have been well studied, and various inference methods have been developed to correct for error effects under such a model. In contrast, error-contaminated survival data under the additive hazards model have received relatively less attention. In this paper, we investigate this problem by exploring measurement error effects on parameter estimation and the change of the hazard function. New insights of measurement error effects are revealed, as opposed to well-documented results for the Cox proportional hazards model. We propose a class of bias correction estimators that embraces certain existing estimators as special cases. In addition, we exploit the regression calibration method to reduce measurement error effects. Theoretical results for the developed methods are established, and numerical assessments are conducted to illustrate the finite sample performance of our methods.

  6. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    SciTech Connect

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  7. Controlling Crime and Delinquency in the Schools: An Exploratory Study of Student Perceptions of School Security Measures

    ERIC Educational Resources Information Center

    Brown, Ben

    2005-01-01

    This paper provides an analysis of data on school security measures which were obtained from a survey administered to a sample of 230 high school students. The majority of students indicated that the school police officers and security officers help keep the schools safe and that the drug-sniffing dogs help reduce drugs in the schools, but there…

  8. Generic System for Remote Testing and Calibration of Measuring Instruments: Security Architecture

    NASA Astrophysics Data System (ADS)

    Jurčević, M.; Hegeduš, H.; Golub, M.

    2010-01-01

    Testing and calibration of laboratory instruments and reference standards is a routine activity and is a resource and time consuming process. Since many of the modern instruments include some communication interfaces, it is possible to create a remote calibration system. This approach addresses a wide range of possible applications and permits to drive a number of different devices. On the other hand, remote calibration process involves a number of security issues due to recommendations specified in standard ISO/IEC 17025, since it is not under total control of the calibration laboratory personnel who will sign the calibration certificate. This approach implies that the traceability and integrity of the calibration process directly depends on the collected measurement data. The reliable and secure remote control and monitoring of instruments is a crucial aspect of internet-enabled calibration procedure.

  9. Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement

    NASA Astrophysics Data System (ADS)

    Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min

    2015-11-01

    In a recent study, Shukla et al. (Quantum Inf Process 13:2391-2405, 2014) proposed two quantum key agreement protocols based on Bell state and Bell measurement, and they claimed that their two protocols were secure. However, in this study, we will show that the three-party protocol they proposed is not secure. Any participant in the protocol can directly obtain other two participants' secret keys. More seriously, two dishonest participants in the protocol can conclude to determine the shared key alone. Furthermore, we will show that there is another minor flaw in their two protocols; that is, eavesdroppers can flip any bit of the final key without introducing any error. In the end, some possible improvements are proposed to avoid these flaws.

  10. Analysis of occupational accidents: prevention through the use of additional technical safety measures for machinery

    PubMed Central

    Dźwiarek, Marek; Latała, Agata

    2016-01-01

    This article presents an analysis of results of 1035 serious and 341 minor accidents recorded by Poland's National Labour Inspectorate (PIP) in 2005–2011, in view of their prevention by means of additional safety measures applied by machinery users. Since the analysis aimed at formulating principles for the application of technical safety measures, the analysed accidents should bear additional attributes: the type of machine operation, technical safety measures and the type of events causing injuries. The analysis proved that the executed tasks and injury-causing events were closely connected and there was a relation between casualty events and technical safety measures. In the case of tasks consisting of manual feeding and collecting materials, the injuries usually occur because of the rotating motion of tools or crushing due to a closing motion. Numerous accidents also happened in the course of supporting actions, like removing pollutants, correcting material position, cleaning, etc. PMID:26652689

  11. 49 CFR 192.935 - What additional preventive and mitigative measures must an operator take?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... accordance with one of the risk assessment approaches in ASME/ANSI B31.8S (incorporated by reference, see § 192.7), section 5, a risk analysis of its pipeline to identify additional measures to protect the high.... (2) Outside force damage. If an operator determines that outside force (e.g., earth movement,...

  12. 49 CFR 192.935 - What additional preventive and mitigative measures must an operator take?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... accordance with one of the risk assessment approaches in ASME/ANSI B31.8S (incorporated by reference, see § 192.7), section 5, a risk analysis of its pipeline to identify additional measures to protect the high.... (2) Outside force damage. If an operator determines that outside force (e.g., earth movement,...

  13. Study raises questions about measurement of 'additionality,'or maintaining domestic health spending amid foreign donations.

    PubMed

    Garg, Charu C; Evans, David B; Dmytraczenko, Tania; Izazola-Licea, José-Antonio; Tangcharoensathien, Viroj; Ejeder, Tessa Tan-Torres

    2012-02-01

    Donor nations and philanthropic organizations increasingly require that funds provided for a specific health priority such as HIV should supplement domestic spending on that priority-a concept known as "additionality." We investigated the "additionality" concept using data from Honduras, Rwanda, and Thailand, and we found that the three countries increased funding for HIV in response to increased donor funding. In contrast, the study revealed that donors, faced with increased Global Fund resources for HIV in certain countries, tended to decrease their funding for HIV or shift funds for use in non-HIV health areas. More broadly, we found many problems in the measurement and interpretation of additionality. These findings suggest that it would be preferable for donors and countries to agree on how best to use available domestic and external funds to improve population health, and to develop better means of tracking outcomes, than to try to develop more sophisticated methods to track additionality.

  14. Door locking and exit security measures on acute psychiatric admission wards.

    PubMed

    Nijman, H; Bowers, L; Haglund, K; Muir-Cochrane, E; Simpson, A; Van Der Merwe, M

    2011-09-01

    Locking the exit doors of psychiatric wards is believed to reduce the risk of patients absconding. The aims of the study were to investigate both the prevalence of door locking and other exit security measures on UK admission wards, as well as whether door locking appears to be effective in keeping inpatients in. A cross-sectional survey on 136 acute psychiatric wards in the UK was conducted, in which a range of data on patients, staff, and conflict and containment events, including door locking and absconding, were collected from shift to shift during a period of 6 months. About one-third of the participating wards (30%) operated with their ward exit door permanently locked, whereas another third (34%) never locked the ward door. Univariate analyses suggested little association between exit security measures and absconding. A more robust multilevel statistical analysis, however, did indicate a reduction of about 30% of absconding rates when the ward door was locked the entire shift. Although locking the ward door does seem to reduce absconding to a certain extent, it far from completely prevents it. As it may be unrealistic to strive for a 100% absconding-proof ward, alternative measures for door locking to prevent absconding are discussed.

  15. Methods of Measuring Vapor Pressures of Lubricants With Their Additives Using TGA and/or Microbalances

    NASA Technical Reports Server (NTRS)

    Scialdone, John J.; Miller, Michael K.; Montoya, Alex F.

    1996-01-01

    The life of a space system may be critically dependent on the lubrication of some of its moving parts. The vapor pressure, the quantity of the available lubricant, the temperature and the exhaust venting conductance passage are important considerations in the selection and application of a lubricant. In addition, the oil additives employed to provide certain properties of low friction, surface tension, antioxidant and load bearing characteristics, are also very important and need to be known with regard to their amounts and vapor pressures. This paper reports on the measurements and analyses carried out to obtain those parameters for two often employed lubricants, the Apiezon(TM)-C and the Krytox(TM) AB. The measurements were made employing an electronic microbalance and a thermogravimetric analyzer (TGA) modified to operate in a vacuum. The results have been compared to other data on these oils when available. The identification of the mass fractions of the additives in the oil and their vapor pressures as a function of the temperature were carried out. These may be used to estimate the lubricant life given its quantity and the system vent exhaust conductance. It was found that the Apiezon(TM)-C has three main components with different rates of evaporation while the Krytox(TM) did not indicate any measurable additive.

  16. Online measurement of bead geometry in GMAW-based additive manufacturing using passive vision

    NASA Astrophysics Data System (ADS)

    Xiong, Jun; Zhang, Guangjun

    2013-11-01

    Additive manufacturing based on gas metal arc welding is an advanced technique for depositing fully dense components with low cost. Despite this fact, techniques to achieve accurate control and automation of the process have not yet been perfectly developed. The online measurement of the deposited bead geometry is a key problem for reliable control. In this work a passive vision-sensing system, comprising two cameras and composite filtering techniques, was proposed for real-time detection of the bead height and width through deposition of thin walls. The nozzle to the top surface distance was monitored for eliminating accumulated height errors during the multi-layer deposition process. Various image processing algorithms were applied and discussed for extracting feature parameters. A calibration procedure was presented for the monitoring system. Validation experiments confirmed the effectiveness of the online measurement system for bead geometry in layered additive manufacturing.

  17. Field Measurements and Guidelines for the Application of Wireless Sensor Networks to the Environment and Security

    PubMed Central

    Gil Jiménez, Víctor P.; Armada, Ana García

    2009-01-01

    Frequently, Wireless Sensor Networks (WSN) are designed focusing on applications and omitting transmission problems in these wireless networks. In this paper, we present a measurement campaign that has been carried out using one of the most commonly used WSN platforms, the micaZ from Crossbow©. Based on these measurements, some guidelines to deploy a robust and reliable WSN are provided. The results are focused on security and environmental applications but can also be extrapolated to other scenarios. A main conclusion that can be extracted is that, from the transmission point of view, a dense WSN is one of the best choices to overcome many of the transmission problems such as the existence of a transitional region, redundance, forwarding, obstructions or interference with other systems. PMID:22303175

  18. Field measurements and guidelines for the application of wireless sensor networks to the environment and security.

    PubMed

    Gil Jiménez, Víctor P; Armada, Ana García

    2009-01-01

    Frequently, Wireless Sensor Networks (WSN) are designed focusing on applications and omitting transmission problems in these wireless networks. In this paper, we present a measurement campaign that has been carried out using one of the most commonly used WSN platforms, the micaZ from Crossbow(©). Based on these measurements, some guidelines to deploy a robust and reliable WSN are provided. The results are focused on security and environmental applications but can also be extrapolated to other scenarios. A main conclusion that can be extracted is that, from the transmission point of view, a dense WSN is one of the best choices to overcome many of the transmission problems such as the existence of a transitional region, redundance, forwarding, obstructions or interference with other systems.

  19. Measurement of powder bed density in powder bed fusion additive manufacturing processes

    NASA Astrophysics Data System (ADS)

    Jacob, G.; Donmez, A.; Slotwinski, J.; Moylan, S.

    2016-11-01

    Many factors influence the performance of additive manufacturing (AM) processes, resulting in a high degree of variation in process outcomes. Therefore, quantifying these factors and their correlations to process outcomes are important challenges to overcome to enable widespread adoption of emerging AM technologies. In the powder bed fusion AM process, the density of the powder layers in the powder bed is a key influencing factor. This paper introduces a method to determine the powder bed density (PBD) during the powder bed fusion (PBF) process. A complete uncertainty analysis associated with the measurement method was also described. The resulting expanded measurement uncertainty, U PBD (k  =  2), was determined as 0.004 g · cm-3. It was shown that this expanded measurement uncertainty is about three orders of magnitude smaller than the typical powder bed density. This method enables establishing correlations between the changes in PBD and the direction of motion of the powder recoating arm.

  20. A new approach to handle additive and multiplicative uncertainties in the measurement for ? LPV filtering

    NASA Astrophysics Data System (ADS)

    Lacerda, Márcio J.; Tognetti, Eduardo S.; Oliveira, Ricardo C. L. F.; Peres, Pedro L. D.

    2016-04-01

    This paper presents a general framework to cope with full-order ? linear parameter-varying (LPV) filter design subject to inexactly measured parameters. The main novelty is the ability of handling additive and multiplicative uncertainties in the measurements, for both continuous and discrete-time LPV systems, in a unified approach. By conveniently modelling scheduling parameters and uncertainties affecting the measurements, the ? filter design problem can be expressed in terms of robust matrix inequalities that become linear when two scalar parameters are fixed. Therefore, the proposed conditions can be efficiently solved through linear matrix inequality relaxations based on polynomial solutions. Numerical examples are presented to illustrate the improved efficiency of the proposed approach when compared to other methods and, more important, its capability to deal with scenarios where the available strategies in the literature cannot be used.

  1. The Role of Earnings and Financial Risk in Distributional Analyses of Social Security Reform Measures

    ERIC Educational Resources Information Center

    Hungerford, Thomas L.

    2006-01-01

    The Social Security Trustees project that the Social Security program faces longterm financing difficulties. Several proposals that have been offered to shore-up the finances of the Social Security program would create individual retirement accounts funded with part of the payroll tax. The authors of many of these proposals claim that future…

  2. Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library

    ERIC Educational Resources Information Center

    McMullen, Karen D.; Kane, Laura Townsend

    2008-01-01

    In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…

  3. Boundedness of completely additive measures with application to 2-local triple derivations

    NASA Astrophysics Data System (ADS)

    Hamhalter, Jan; Kudaybergenov, Karimbergen; Peralta, Antonio M.; Russo, Bernard

    2016-02-01

    We prove a Jordan version of Dorofeev's boundedness theorem for completely additive measures and use it to show that every (not necessarily linear nor continuous) 2-local triple derivation on a continuous JBW∗-triple is a triple derivation. 2-local triple derivations are well understood on von Neumann algebras. JBW*-triples, which are properly defined in Section I, are intimately related to infinite dimensional holomorphy and include von Neumann algebras as special cases. In particular, continuous JBW∗-triples can be realized as subspaces of continuous von Neumann algebras which are stable for the triple product xy∗z + zy∗x and closed in the weak operator topology.

  4. A multiple additive regression tree analysis of three exposure measures during Hurricane Katrina.

    PubMed

    Curtis, Andrew; Li, Bin; Marx, Brian D; Mills, Jacqueline W; Pine, John

    2011-01-01

    This paper analyses structural and personal exposure to Hurricane Katrina. Structural exposure is measured by flood height and building damage; personal exposure is measured by the locations of 911 calls made during the response. Using these variables, this paper characterises the geography of exposure and also demonstrates the utility of a robust analytical approach in understanding health-related challenges to disadvantaged populations during recovery. Analysis is conducted using a contemporary statistical approach, a multiple additive regression tree (MART), which displays considerable improvement over traditional regression analysis. By using MART, the percentage of improvement in R-squares over standard multiple linear regression ranges from about 62 to more than 100 per cent. The most revealing finding is the modelled verification that African Americans experienced disproportionate exposure in both structural and personal contexts. Given the impact of exposure to health outcomes, this finding has implications for understanding the long-term health challenges facing this population.

  5. [Ultima ratio of the applied security measures in placing perpetrators in a psychiatric hospital].

    PubMed

    Hajdukiewicz, Danuta

    2006-01-01

    The meaning of articles on the main security measures concerned with placing the convict in a closed psychiatric unit is studied. Articles 93 & 94 section 1 of the penal code limit their application only as final measures--the ultima ratio. Art. 93 of the penal code pertains to the perpetrator of illegal actions in connection to their psychiatric illness, mental retardation, alcohol or other related substance addiction, along with a risk of the crime being committed once again, only when it will prevent the person from repeating the crime. The issues that need be considered are the following: psychic state of the perpetrator along with prediction of the risk of him repeating the act, but the liability evaluation and the degree of probability do not play any vital role. This is probably due to the fact that the measure described in art. 96 of the penal code has a limited time span (it cannot be any shorter than 3 months and longer than 2 years) and what is more; it can be applied instead of the punishment. Art. 94 section 1 of the penal code requires very precise evaluation of the risk of repetition in each case of a non-liable perpetrator guilty of conducting crime of serious social damage. This measure is not limited in time span, because it depends on the psychic state of the person under its influence. Henceforth it is considered as more restrictive.

  6. reCAPTCHA: human-based character recognition via Web security measures.

    PubMed

    von Ahn, Luis; Maurer, Benjamin; McMillen, Colin; Abraham, David; Blum, Manuel

    2008-09-12

    CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are widespread security measures on the World Wide Web that prevent automated programs from abusing online services. They do so by asking humans to perform a task that computers cannot yet perform, such as deciphering distorted characters. Our research explored whether such human effort can be channeled into a useful purpose: helping to digitize old printed material by asking users to decipher scanned words from books that computerized optical character recognition failed to recognize. We showed that this method can transcribe text with a word accuracy exceeding 99%, matching the guarantee of professional human transcribers. Our apparatus is deployed in more than 40,000 Web sites and has transcribed over 440 million words.

  7. Additional Measurements and Analyses of H217O and H218O

    NASA Astrophysics Data System (ADS)

    Pearson, John; Yu, Shanshan; Walters, Adam; Daly, Adam M.

    2015-06-01

    Historically the analysis of the spectrum of water has been a balance between the quality of the data set and the applicability of the Hamiltonian to a highly non-rigid molecule. Recently, a number of different non-rigid analysis approaches have successfully been applied to 16O water resulting in a self-consistent set of transitions and energy levels to high J which allowed the spectrum to be modeled to experimental precision. The data set for 17O and 18O water was previously reviewed and many of the problematic measurements identified, but Hamiltonian modeling of the remaining data resulted in significantly poorer quality fits than that for the 16O parent. As a result, we have made additional microwave measurements and modeled the existing 17O and 18O data sets with an Euler series model. This effort has illuminated a number of additional problematic measurements in the previous data sets and has resulted in analyses of 17O and 18O water that are of similar quality to the 16O analysis. We report the new lines, the analyses and make recommendations on the quality of the experimental data sets. SS. Yu, J.C. Pearson, B.J. Drouin et al. J. Mol. Spectrosc. 279,~16-25 (2012) J. Tennyson, P.F. Bernath, L.R. Brown et al. J. Quant. Spectrosc. Rad. Trans. 117, 29-58 (2013) J. Tennyson, P.F. Bernath, L.R. Brown et al. J. Quant. Spectrosc. Rad. Trans. 110, 573-596 (2009) H.M. Pickett, J.C. Pearson, C.E. Miller J. Mol. Spectrosc. 233, 174-179 (2005)

  8. Longitudinal and transversal bioimpedance measurements in addition to diagnosis of heart failure

    NASA Astrophysics Data System (ADS)

    Ribas, N.; Nescolarde, L.; Domingo, M.; Gastelurrutia, P.; Bayés-Genis, A.; Rosell-Ferrer, J.

    2010-04-01

    Heart Failure (HF) is a clinical syndrome characterised by signs of systemic and pulmonary fluid retention, shortness of breath and/or fatigue. There is a lack of reliable indicators of disease state. Benefits and applicability of non-invasive bioimpedance measurement in the hydration state of soft tissues have been validated, fundamentally, in dialysis patients. Four impedance configurations (2 longitudinal and 2 transversal) were analyzed in 48 HF patients (M=28, F=20) classified according to a clinical disease severity score (CDSS) derived from the Framingham criteria: CDSS<=2 (G1: M = 23, F = 14) and CDSS>2 (G2: M = 5, F = 6). The aim of this study is to analyze longitudinal and transversal bioimpedance measurement at 50 kHz, in addition to clinical diagnosis parameters of heart failure, including: clinical disease severity score (CDSS) and a biomarker concentrations (NT-proBNP). The Kolmogorov-Smirnov test was used for the normality test of all variables. The CDSS, NTproBNP and impedance parameters between groups (G1 and G2) were compared by mean of Mann Withney U-test. The statistical significance was considered with P < 0.05. Whole-body impedance measured was analyzed using RXc graph.

  9. Time-Resolved In Situ Measurements During Rapid Alloy Solidification: Experimental Insight for Additive Manufacturing

    DOE PAGES

    McKeown, Joseph T.; Zweiacker, Kai; Liu, Can; ...

    2016-01-27

    In research and industrial environments, additive manufacturing (AM) of metals and alloys is becoming a pervasive technology, though significant challenges remain before widespread implementation of AM can be realized. In situ investigations of rapid alloy solidification with high spatial and temporal resolutions can provide unique experimental insight into microstructure evolution and kinetics that are relevant for AM processing. Hypoeutectic thin-film Al–Cu and Al–Si alloys were investigated using dynamic transmission electron microscopy to monitor pulsed-laser-induced rapid solidification across microsecond timescales. Solid–liquid interface velocities measured from time-resolved images revealed accelerating solidification fronts in both alloys. We observed microstructure evolution, solidification product, andmore » presence of a morphological instability at the solid–liquid interface in the Al–4 at.%Cu alloy are related to the measured interface velocities and small differences in composition that affect the thermophysical properties of the alloys. These time-resolved in situ measurements can inform and validate predictive modeling efforts for AM.« less

  10. Time-Resolved In Situ Measurements During Rapid Alloy Solidification: Experimental Insight for Additive Manufacturing

    SciTech Connect

    McKeown, Joseph T.; Zweiacker, Kai; Liu, Can; Coughlin, Daniel R.; Clarke, Amy J.; Baldwin, J. Kevin; Gibbs, John W.; Roehling, John D.; Imhoff, Seth D.; Gibbs, Paul J.; Tourret, Damien; Wiezorek, Jörg M. K.; Campbell, Geoffrey H.

    2016-01-27

    In research and industrial environments, additive manufacturing (AM) of metals and alloys is becoming a pervasive technology, though significant challenges remain before widespread implementation of AM can be realized. In situ investigations of rapid alloy solidification with high spatial and temporal resolutions can provide unique experimental insight into microstructure evolution and kinetics that are relevant for AM processing. Hypoeutectic thin-film Al–Cu and Al–Si alloys were investigated using dynamic transmission electron microscopy to monitor pulsed-laser-induced rapid solidification across microsecond timescales. Solid–liquid interface velocities measured from time-resolved images revealed accelerating solidification fronts in both alloys. We observed microstructure evolution, solidification product, and presence of a morphological instability at the solid–liquid interface in the Al–4 at.%Cu alloy are related to the measured interface velocities and small differences in composition that affect the thermophysical properties of the alloys. These time-resolved in situ measurements can inform and validate predictive modeling efforts for AM.

  11. Beyond Measure: New Approaches to Analyzing Congressional Oversight of Homeland Security

    DTIC Science & Technology

    2015-03-01

    15 B . SECONDARY SOURCES ............................................................................18 III. HOMELAND SECURITY OVERSIGHT...BACKGROUND ................................21 A. CONCEPT OF OVERSIGHT ......................................................................21 B ...36 B . HURRICANE KATRINA OVERSIGHT ....................................................40 1. Agency Interaction

  12. Nuclear Resonance Fluorescence Measurements on ^237Np for Security and Safeguards Applications

    NASA Astrophysics Data System (ADS)

    Angell, C. T.; Joshi, T.; Yee, Ryan; Norman, E. B.; Kulp, W. D.; Warren, G. A.; Korbly, S.; Klimenko, A.; Wilson, C.; Copping, R.; Shuh, D. K.

    2009-10-01

    The smuggling of nuclear material and the diversion of fissile material for covert weapon programs both present grave risks to world security. Methods are needed to detect nuclear material smuggled in cargo, and for proper material accountability in civilian fuel re-processing facilities. Nuclear resonance fluorescence (NRF) is a technique that can address both needs. It is a non-destructive active interrogation method that provides isotope-specific information. It works by using a γ-ray beam to resonantly excite levels in a nucleus and observing the γ-rays emitted whose energy and intensity are characteristic of that isotope. ^237Np presents significant safeguard challenges; it is fissile yet currently has fewer safeguard restrictions. NRF measurements on ^237Np will expand the nuclear database and will permit designing interrogation and assay systems. Measurements were made using the bremsstrahlung beam at the HVRL at MIT on a 7 g target of ^237Np with two incident electron energies of 2.8 and 3.1 MeV. Results will be presented with discussion of the relevant nuclear structure necessary to predict levels in other actinides.

  13. Measuring communication and social skills in a high security forensic setting using the behavioural status index.

    PubMed

    Woods, P; Reed, V; Collins, M

    2001-06-01

    Assessing patient functioning in the areas of communication and social skills is a core area of practice within psychiatric nursing. Difficulties within these areas can often represent the root of a number of presenting problems. Objective assessment can be difficult without a validated assessment schema. The Behavioural Status Index (BSI) offers such a system of baseline assessment and longitudinal monitoring as a basis for treatment, further specialised assessment, or measurement of outcome during and after interventions. This paper introduces some basic theory and describes the function and purpose of the BSI. This is followed by data analysis for the BSI communications and social skills sub-scale. Data were collected, using a repeated measures method by primary nurses, from a sample of 503 individual patients in two high security mental health hospitals. Results are reported for descriptive statistics, and factor analysis; and differences between the independent groups of Mental Health Act 1983 classification, ward dependency and gender. Data trends are indicative of clinically interesting relationships. A distinct factorial structure emerged suggesting groupings of assertive-interpersonal, non-verbal, social-perceptive and para-linguistic behaviours. Results are reported to be underpinning current European studies.

  14. Non-additivity of molecule-surface van der Waals potentials from force measurements

    PubMed Central

    Wagner, Christian; Fournier, Norman; Ruiz, Victor G.; Li, Chen; Müllen, Klaus; Rohlfing, Michael; Tkatchenko, Alexandre; Temirov, Ruslan; Tautz, F. Stefan

    2014-01-01

    Van der Waals (vdW) forces act ubiquitously in condensed matter. Despite being weak on an atomic level, they substantially influence molecular and biological systems due to their long range and system-size scaling. The difficulty to isolate and measure vdW forces on a single-molecule level causes our present understanding to be strongly theory based. Here we show measurements of the attractive potential between differently sized organic molecules and a metal surface using an atomic force microscope. Our choice of molecules and the large molecule-surface separation cause this attraction to be purely of vdW type. The experiment allows testing the asymptotic vdW force law and its validity range. We find a superlinear growth of the vdW attraction with molecular size, originating from the increased deconfinement of electrons in the molecules. Because such non-additive vdW contributions are not accounted for in most first-principles or empirical calculations, we suggest further development in that direction. PMID:25424490

  15. Nonlinearity measurements of solar cells with an LED-based combinatorial flux addition method

    PubMed Central

    Hamadani, Behrang H.; Shore, Andrew; Roller, John; Yoon, Howard W; Campanelli, Mark

    2016-01-01

    We present a light emitting diode (LED)-based system utilizing a combinatorial flux addition method to investigate the nonlinear relationship in solar cells between the output current of the cell and the incident irradiance level. The magnitude of the light flux is controlled by the supplied currents to two LEDs (or two sets of them) in a combinatorial fashion. The signals measured from the cell are arranged within a related overdetermined linear system of equations derived from an appropriately chosen Nth degree polynomial representing the relationship between the measured signals and the incident fluxes. The flux values and the polynomial coefficients are then solved for by linear least squares to obtain the best fit. The technique can be applied to any solar cell, under either monochromatic or broadband spectrum. For the unscaled solution, no reference detectors or prior calibrations of the light flux are required. However, if at least one calibrated irradiance value is known, then the entire curve can be scaled to an appropriate spectral responsivity value. Using this technique, a large number of data points can be obtained in a relatively short time scale over a large signal range. PMID:27524837

  16. Nonlinearity measurements of solar cells with an LED-based combinatorial flux addition method.

    PubMed

    Hamadani, Behrang H; Shore, Andrew; Roller, John; Yoon, Howard W; Campanelli, Mark

    2016-02-01

    We present a light emitting diode (LED)-based system utilizing a combinatorial flux addition method to investigate the nonlinear relationship in solar cells between the output current of the cell and the incident irradiance level. The magnitude of the light flux is controlled by the supplied currents to two LEDs (or two sets of them) in a combinatorial fashion. The signals measured from the cell are arranged within a related overdetermined linear system of equations derived from an appropriately chosen N(th) degree polynomial representing the relationship between the measured signals and the incident fluxes. The flux values and the polynomial coefficients are then solved for by linear least squares to obtain the best fit. The technique can be applied to any solar cell, under either monochromatic or broadband spectrum. For the unscaled solution, no reference detectors or prior calibrations of the light flux are required. However, if at least one calibrated irradiance value is known, then the entire curve can be scaled to an appropriate spectral responsivity value. Using this technique, a large number of data points can be obtained in a relatively short time scale over a large signal range.

  17. Measuring Security Effectiveness and Efficiency at U.S. Commercial Airports

    DTIC Science & Technology

    2013-03-01

    formative program evaluation and policy analysis to investigate current airport security programs. It identifies innovative public administration and...policy-analysis tools that could provide potential benefits to airport security . These tools will complement the System Based Risk Management framework if

  18. Nitrate removal in stream ecosystems measured by 15N addition experiments: 2. Denitrification

    SciTech Connect

    Mulholland, Patrick J; Hall, Robert; Sobota, Daniel; Dodds, Walter; Findlay, Stuart; Grimm, Nancy; Hamilton, Stephen; McDowell, William; O'Brien, Jon; Tank, Jennifer; Ashkenas, Linda; Cooper, Lee W; Dahm, Cliff; Gregory, Stanley; Johnson, Sherri; Meyer, Judy; Peterson, Bruce; Poole, Geoff; Valett, H. Maurice; Webster, Jackson; Arango, Clay; Beaulieu, Jake; Bernot, Melody; Burgin, Amy; Crenshaw, Chelsea; Helton, Ashley; Johnson, Laura; Niederlehner, Bobbie; Potter, Jody; Sheibley, Rich; Thomas, Suzanne

    2009-01-01

    We measured denitrification rates using a field {sup 15}N-NO{sub 3}{sup -} tracer-addition approach in a large, cross-site study of nitrate uptake in reference, agricultural, and suburban-urban streams. We measured denitrification rates in 49 of 72 streams studied. Uptake length due to denitrification (S{sub Wden}) ranged from 89 m to 184 km (median of 9050 m) and there were no significant differences among regions or land-use categories, likely because of the wide range of conditions within each region and land use. N{sub 2} production rates far exceeded N{sub 2}O production rates in all streams. The fraction of total NO{sub 3}{sup -} removal from water due to denitrification ranged from 0.5% to 100% among streams (median of 16%), and was related to NH{sub 4}{sup +} concentration and ecosystem respiration rate (ER). Multivariate approaches showed that the most important factors controlling S{sub Wden} were specific discharge (discharge/width) and NO{sub 3}{sup -} concentration (positive effects), and ER and transient storage zones (negative effects). The relationship between areal denitrification rate (U{sub den}) and NO{sub 3}{sup -} concentration indicated a partial saturation effect. A power function with an exponent of 0.5 described this relationship better than a Michaelis-Menten equation. Although U{sub den} increased with increasing NO{sub 3}{sup -} concentration, the efficiency of NO{sub 3}{sup -} removal from water via denitrification declined, resulting in a smaller proportion of streamwater NO{sub 3}{sup -} load removed over a given length of stream. Regional differences in stream denitrification rates were small relative to the proximate factors of NO{sub 3}{sup -} concentration and ecosystem respiration rate, and land use was an important but indirect control on denitrification in streams, primarily via its effect on NO{sub 3}{sup -} concentration.

  19. Nitrate removal in stream ecosystems measured by 15N addition experiments: Total uptake

    SciTech Connect

    Mulholland, Patrick J; Hall, Robert; Tank, Jennifer; Sobota, Daniel; O'Brien, Jon; Webster, Jackson; Valett, H. Maurice; Dodds, Walter; Poole, Geoff; Peterson, Chris G.; Meyer, Judy; McDowell, William; Johnson, Sherri; Hamilton, Stephen; Gregory, Stanley; Grimm, Nancy; Dahm, Cliff; Cooper, Lee W; Ashkenas, Linda; Thomas, Suzanne; Sheibley, Rich; Potter, Jody; Niederlehner, Bobbie; Johnson, Laura; Helton, Ashley; Crenshaw, Chelsea; Burgin, Amy; Bernot, Melody; Beaulieu, Jake; Arango, Clay

    2009-01-01

    We measured uptake length of {sup 15}NO{sub 3}{sup -} in 72 streams in eight regions across the United States and Puerto Rico to develop quantitative predictive models on controls of NO{sub 3}{sup -} uptake length. As part of the Lotic Intersite Nitrogen Experiment II project, we chose nine streams in each region corresponding to natural (reference), suburban-urban, and agricultural land uses. Study streams spanned a range of human land use to maximize variation in NO{sub 3}{sup -} concentration, geomorphology, and metabolism. We tested a causal model predicting controls on NO{sub 3}{sup -} uptake length using structural equation modeling. The model included concomitant measurements of ecosystem metabolism, hydraulic parameters, and nitrogen concentration. We compared this structural equation model to multiple regression models which included additional biotic, catchment, and riparian variables. The structural equation model explained 79% of the variation in log uptake length (S{sub Wtot}). Uptake length increased with specific discharge (Q/w) and increasing NO{sub 3}{sup -} concentrations, showing a loss in removal efficiency in streams with high NO{sub 3}{sup -} concentration. Uptake lengths shortened with increasing gross primary production, suggesting autotrophic assimilation dominated NO{sub 3}{sup -} removal. The fraction of catchment area as agriculture and suburban-urban land use weakly predicted NO{sub 3}{sup -} uptake in bivariate regression, and did improve prediction in a set of multiple regression models. Adding land use to the structural equation model showed that land use indirectly affected NO{sub 3}{sup -} uptake lengths via directly increasing both gross primary production and NO{sub 3}{sup -} concentration. Gross primary production shortened S{sub Wtot}, while increasing NO{sub 3}{sup -} lengthened S{sub Wtot} resulting in no net effect of land use on NO{sub 3}{sup -} removal.

  20. Modeling particulate matter concentrations measured through mobile monitoring in a deletion/substitution/addition approach

    NASA Astrophysics Data System (ADS)

    Su, Jason G.; Hopke, Philip K.; Tian, Yilin; Baldwin, Nichole; Thurston, Sally W.; Evans, Kristin; Rich, David Q.

    2015-12-01

    Land use regression modeling (LUR) through local scale circular modeling domains has been used to predict traffic-related air pollution such as nitrogen oxides (NOX). LUR modeling for fine particulate matters (PM), which generally have smaller spatial gradients than NOX, has been typically applied for studies involving multiple study regions. To increase the spatial coverage for fine PM and key constituent concentrations, we designed a mobile monitoring network in Monroe County, New York to measure pollutant concentrations of black carbon (BC, wavelength at 880 nm), ultraviolet black carbon (UVBC, wavelength at 3700 nm) and Delta-C (the difference between the UVBC and BC concentrations) using the Clarkson University Mobile Air Pollution Monitoring Laboratory (MAPL). A Deletion/Substitution/Addition (D/S/A) algorithm was conducted, which used circular buffers as a basis for statistics. The algorithm maximizes the prediction accuracy for locations without measurements using the V-fold cross-validation technique, and it reduces overfitting compared to other approaches. We found that the D/S/A LUR modeling approach could achieve good results, with prediction powers of 60%, 63%, and 61%, respectively, for BC, UVBC, and Delta-C. The advantage of mobile monitoring is that it can monitor pollutant concentrations at hundreds of spatial points in a region, rather than the typical less than 100 points from a fixed site saturation monitoring network. This research indicates that a mobile saturation sampling network, when combined with proper modeling techniques, can uncover small area variations (e.g., 10 m) in particulate matter concentrations.

  1. Nitrate removal in stream ecosystems measured by 15N addition experiments: Denitrification

    USGS Publications Warehouse

    Mulholland, P.J.; Hall, R.O.; Sobota, D.J.; Dodds, W.K.; Findlay, S.E.G.; Grimm, N. B.; Hamilton, S.K.; McDowell, W.H.; O'Brien, J. M.; Tank, J.L.; Ashkenas, L.R.; Cooper, L.W.; Dahm, Clifford N.; Gregory, S.V.; Johnson, S.L.; Meyer, J.L.; Peterson, B.J.; Poole, G.C.; Valett, H.M.; Webster, J.R.; Arango, C.P.; Beaulieu, J.J.; Bernot, M.J.; Burgin, A.J.; Crenshaw, C.L.; Helton, A.M.; Johnson, L.T.; Niederlehner, B.R.; Potter, J.D.; Sheibley, R.W.; Thomasn, S.M.

    2009-01-01

    We measured denitrification rates using a field 15N-NO- 3 tracer-addition approach in a large, cross-site study of nitrate uptake in reference, agricultural, and suburban-urban streams. We measured denitrification rates in 49 of 72 streams studied. Uptake length due to denitrification (SWden) ranged from 89 m to 184 km (median of 9050 m) and there were no significant differences among regions or land-use categories, likely because of the wide range of conditions within each region and land use. N2 production rates far exceeded N2O production rates in all streams. The fraction of total NO-3 removal from water due to denitrification ranged from 0.5% to 100% among streams (median of 16%), and was related to NHz 4 concentration and ecosystem respiration rate (ER). Multivariate approaches showed that the most important factors controlling SWden were specific discharge (discharge / width) and NO-3 concentration (positive effects), and ER and transient storage zones (negative effects). The relationship between areal denitrification rate (Uden) and NO- 3 concentration indicated a partial saturation effect. A power function with an exponent of 0.5 described this relationship better than a Michaelis-Menten equation. Although Uden increased with increasing NO- 3 concentration, the efficiency of NO-3 removal from water via denitrification declined, resulting in a smaller proportion of streamwater NO-3 load removed over a given length of stream. Regional differences in stream denitrification rates were small relative to the proximate factors of NO-3 concentration and ecosystem respiration rate, and land use was an important but indirect control on denitrification in streams, primarily via its effect on NO-3 concentration. ?? 2009.

  2. Effect of silica fume addition on the PGNAA measurement of chlorine in concrete.

    PubMed

    Naqvi, A A; Maslehuddin, M; Garwan, M A; Nagadi, M M; Al-Amoudi, O S B; Raashid, M; Khateeb-ur-Rehman

    2010-03-01

    Pozzolanic materials, such as fly ash (FA), silica fume (SF), and blast furnace slag (BFS) are added to Portland cement in concrete to prevent reinforcement steel corrosion in concrete. Further preventive measure against reinforcement steel corrosion require monitoring of chloride salts concentration in concrete using non-destructive techniques, such as the prompt gamma-ray neutron activation analysis (PGNAA) technique. Due to interferences between gamma-rays from chlorine and calcium in PGNAA technique, detection limit of chlorine in concrete strongly depends upon calcium concentration in concrete. SF mainly contains silica and its addition to cement concrete reduces overall concentration of calcium in concrete. This may result in an improvement in detection limit of chlorine in SF-based concrete in PGNAA studies. Particularly for chlorine detection using 6.11 and 6.62 MeV prompt gamma-rays that strongly interfere with 6.42 MeV prompt gamma-rays from calcium. In this study, SF was added to Portland cement to prevent concrete reinforcement steel from corrosion. The chlorine concentration in SF cement concrete specimens containing 0.2-3.0 wt% chlorine was measured through yield of 1.16, 1.95, 6.11, 6.62, 7.41, 7.79, and 8.58 MeV chlorine gamma-rays using PGNAA technique. An excellent agreement was noted between the experimental yield of the prompt gamma-rays and the gamma-ray yield calculated through the Monte Carlo simulations. Further the minimum detectable concentration (MDC) of chlorine in SF cement concrete was calculated and compared with the MDC values of chlorine in plain concrete and concrete mixed with fly ash cement. The MDC of chlorine in SF-based concrete through 6.11 MeV, and 6.62 MeV chlorine gamma-rays was found to be improved as compared to those in plain concrete and concrete mixed with fly ash cement.

  3. Nitrate removal in stream ecosystems measured by 15N addition experiments: Total uptake

    USGS Publications Warehouse

    Hall, R.O.; Tank, J.L.; Sobota, D.J.; Mulholland, P.J.; O'Brien, J. M.; Dodds, W.K.; Webster, J.R.; Valett, H.M.; Poole, G.C.; Peterson, B.J.; Meyer, J.L.; McDowell, W.H.; Johnson, S.L.; Hamilton, S.K.; Grimm, N. B.; Gregory, S.V.; Dahm, Clifford N.; Cooper, L.W.; Ashkenas, L.R.; Thomas, S.M.; Sheibley, R.W.; Potter, J.D.; Niederlehner, B.R.; Johnson, L.T.; Helton, A.M.; Crenshaw, C.M.; Burgin, A.J.; Bernot, M.J.; Beaulieu, J.J.; Arangob, C.P.

    2009-01-01

    We measured uptake length of 15NO-3 in 72 streams in eight regions across the United States and Puerto Rico to develop quantitative predictive models on controls of NO-3 uptake length. As part of the Lotic Intersite Nitrogen eXperiment II project, we chose nine streams in each region corresponding to natural (reference), suburban-urban, and agricultural land uses. Study streams spanned a range of human land use to maximize variation in NO-3 concentration, geomorphology, and metabolism. We tested a causal model predicting controls on NO-3 uptake length using structural equation modeling. The model included concomitant measurements of ecosystem metabolism, hydraulic parameters, and nitrogen concentration. We compared this structural equation model to multiple regression models which included additional biotic, catchment, and riparian variables. The structural equation model explained 79% of the variation in log uptake length (S Wtot). Uptake length increased with specific discharge (Q/w) and increasing NO-3 concentrations, showing a loss in removal efficiency in streams with high NO-3 concentration. Uptake lengths shortened with increasing gross primary production, suggesting autotrophic assimilation dominated NO-3 removal. The fraction of catchment area as agriculture and suburban-urban land use weakly predicted NO-3 uptake in bivariate regression, and did improve prediction in a set of multiple regression models. Adding land use to the structural equation model showed that land use indirectly affected NO-3 uptake lengths via directly increasing both gross primary production and NO-3 concentration. Gross primary production shortened SWtot, while increasing NO-3 lengthened SWtot resulting in no net effect of land use on NO- 3 removal. ?? 2009.

  4. Measuring the Immeasurable: Applying Hierarchical Holographic Modeling to Developing Measures of Effectiveness for Stability, Security, Transition, and Reconstruction Operations

    DTIC Science & Technology

    2006-05-16

    and Internally Displaced Persons (IDPs) Judicial Personnel and Infrastructure Trafficking in Persons Property Food Security Legal System Reform...Shelter and Non- Food Relief Human Rights Humanitarian Demining Corrections Public Health War Crime Courts and Tribunals Education Truth...shift the focus from what is best for his forces to fight and win, to what is best for a safe , secure, stable and self-sustaining, independent State

  5. Secure Mass Measurements from Transit Timing: 10 Kepler Exoplanets between 3 and 8 M⊕ with Diverse Densities and Incident Fluxes

    NASA Astrophysics Data System (ADS)

    Jontof-Hutter, Daniel; Ford, Eric B.; Rowe, Jason F.; Lissauer, Jack J.; Fabrycky, Daniel C.; Van Laerhoven, Christa; Agol, Eric; Deck, Katherine M.; Holczer, Tomer; Mazeh, Tsevi

    2016-03-01

    We infer dynamical masses in eight multiplanet systems using transit times measured from Kepler's complete data set, including short-cadence data where available. Of the 18 dynamical masses that we infer, 10 pass multiple tests for robustness. These are in systems Kepler-26 (KOI-250), Kepler-29 (KOI-738), Kepler-60 (KOI-2086), Kepler-105 (KOI-115), and Kepler-307 (KOI-1576). Kepler-105 c has a radius of 1.3 R⊕ and a density consistent with an Earth-like composition. Strong transit timing variation (TTV) signals were detected from additional planets, but their inferred masses were sensitive to outliers or consistent solutions could not be found with independently measured transit times, including planets orbiting Kepler-49 (KOI-248), Kepler-57 (KOI-1270), Kepler-105 (KOI-115), and Kepler-177 (KOI-523). Nonetheless, strong upper limits on the mass of Kepler-177 c imply an extremely low density of ˜0.1 g cm-3. In most cases, individual orbital eccentricities were poorly constrained owing to degeneracies in TTV inversion. For five planet pairs in our sample, strong secular interactions imply a moderate to high likelihood of apsidal alignment over a wide range of possible eccentricities. We also find solutions for the three planets known to orbit Kepler-60 in a Laplace-like resonance chain. However, nonlibrating solutions also match the transit timing data. For six systems, we calculate more precise stellar parameters than previously known, enabling useful constraints on planetary densities where we have secure mass measurements. Placing these exoplanets on the mass-radius diagram, we find that a wide range of densities is observed among sub-Neptune-mass planets and that the range in observed densities is anticorrelated with incident flux.

  6. Mental self-government: development of the additional democratic learning style scale using Rasch measurement models.

    PubMed

    Nielsen, Tine; Kreiner, Svend; Styles, Irene

    2007-01-01

    This paper describes the development and validation of a democratic learning style scale intended to fill a gap in Sternberg's theory of mental self-government and the associated learning style inventory (Sternberg, 1988, 1997). The scale was constructed as an 8-item scale with a 7-category response scale. The scale was developed following an adapted version of DeVellis' (2003) guidelines for scale development. The validity of the Democratic Learning Style Scale was assessed by items analysis using graphical loglinear Rasch models (Kreiner and Christensen, 2002, 2004, 2006) The item analysis confirmed that the full 8-item revised Democratic Learning Style Scale fitted a graphical loglinear Rasch model with no differential item functioning but weak to moderate uniform local dependence between two items. In addition, a reduced 6-item version of the scale fitted the pure Rasch model with a rating scale parameterization. The revised Democratic Learning Style Scale can therefore be regarded as a sound measurement scale meeting requirements of both construct validity and objectivity.

  7. [Design and implementation of an intellectualized measuring instrument for medical electricity security parameters].

    PubMed

    Guo, Hong-rui; Xu, Yan; Geng, Yan

    2006-09-01

    An introduction of an intelligent testing instrument for medical electrical equipment security is given in this article. The realization of its testing functions is based on a single-chip processor, the high-voltage control circuit and the relay combination network technology. It can be used to test security parameters such as the continuous leakage current, patient auxiliary current, dielectric strength and protective earth impedance. It is suitable for the medical electricity security testing of Kind I, II and Type B, BF, CF (internal power supply) medical electrical equipments.

  8. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...; (iii) Social security number (optional); (iv) Employer name and 24 hour contact information; and (v... suspicion regarding the new hire's ability to obtain a TWIC, and the facility owner or operator or FSO...

  9. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Social security number (optional); (iv) Employer name and 24 hour contact information; and (v) Date of... regarding the new hire's ability to obtain a TWIC, and the vessel owner or operator or VSO have not...

  10. What are we measuring? Comparison of household food security indicators in the Eastern Cape Province, South Africa.

    PubMed

    Hendriks, Sheryl L; van der Merwe, Corné; Ngidi, Mjabuliseni S; Manyamba, Christopher; Mbele, Mondli; McIntyre, Angela M; Mkandawire, Elizabeth; Molefe, Queeneth N; Mphephu, Mulalo Q; Ngwane, Lithle

    2016-01-01

    The development of national food security information systems is constrained by a lack of guidance on which indicators to use. This paper compares food security indicators across two seasons (summer and winter) in one of the most deprived areas of the Eastern Cape province of South Africa. The results show that only anthropometric indicators are sensitive enough to differentiate levels of food insecurity. The lack of consistent classification across indicators means that surveys must use a combination of food consumption and experience of hunger measures backed up by anthropometric measures. Targeting interventions is difficult if the measures cannot be relied on. Further investigation is needed to identify a suite of appropriate indicators for a national information and surveillance system.

  11. Airborne Dust Cloud Measurements at the INL National Security Test Range

    SciTech Connect

    Michael L. Abbott; Norm Stanley; Larry Radke; Charles Smeltzer

    2007-09-01

    On July 11, 2007, a surface, high-explosive test (<20,000 lb TNT-equivalent) was carried out at the National Security Test Range (NSTR) on the Idaho National Laboratory (INL) Site. Aircraft-mounted rapid response (1-sec) particulate monitors were used to measure airborne PM-10 concentrations directly in the dust cloud and to develop a PM-10 emission factor that could be used for subsequent tests at the NSTR. The blast produced a mushroom-like dust cloud that rose approximately 2,500–3,000 ft above ground level, which quickly dissipated (within 5 miles of the source). In general, the cloud was smaller and less persistence than expected, or that might occur in other areas, likely due to the coarse sand and subsurface conditions that characterize the immediate NSTR area. Maximum short time-averaged (1-sec) PM-10 concentrations at the center of the cloud immediately after the event reached 421 µg m-3 but were rapidly reduced (by atmospheric dispersion and fallout) to near background levels (~10 µg m-3) after about 15 minutes. This occurred well within the INL Site boundary, about 8 km (5 miles) from the NSTR source. These findings demonstrate that maximum concentrations in ambient air beyond the INL Site boundary (closest is 11.2 km from NSTR) from these types of tests would be well within the 150 µg m-3 24-hour National Ambient Air Quality Standards for PM-10. Aircraft measurements and geostatistical techniques were used to successfully quantify the initial volume (1.64E+9 m3 or 1.64 km3) and mass (250 kg) of the PM-10 dust cloud, and a PM-10 emission factor (20 kg m-3 crater soil volume) was developed for this specific type of event at NSTR. The 250 kg of PM-10 mass estimated from this experiment is almost seven-times higher than the 36 kg estimated for the environmental assessment (DOE-ID 2007) using available Environmental Protection Agency (EPA 1995) emission factors. This experiment demonstrated that advanced aircraft-mounted instruments operated by

  12. 49 CFR 192.935 - What additional preventive and mitigative measures must an operator take?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... STANDARDS Gas Transmission Pipeline Integrity Management § 192.935 What additional preventive and mitigative... detection systems, replacing pipe segments with pipe of heavier wall thickness, providing additional... supervision of known excavation work. (ii) Collecting in a central database information that is...

  13. An electrical conductivity method for measuring the effects of additives on effective diffusivities in Portland cement pastes

    SciTech Connect

    Kyi, A.A. ); Batchelor, B. . Civil Engineering)

    1994-01-01

    Effective diffusivities are important in describing corrosion and leaching of contaminants in cementitious systems. An electrical conductivity procedure has been used to measure the effective diffusivities of compounds in cementitious systems containing the additives fly ash, silica fume, sodium silicate and bentonite. Silica fume was the most effective additive in reducing the effective diffusivity, but fly ash was the most cost effective. Diffusivities that have been measured with techniques that rely on flux of a compound through the solid were generally lower than those measured with the electrical conductivity procedure. Porosity and bulk density are not well correlated with effective diffusivity in systems containing additives.

  14. 75 FR 73090 - Medicare Program; Listening Session on Development of Additional Imaging Efficiency Measures for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-29

    ..., cell phones, and palm pilots, are subject to physical inspection. We cannot assume responsibility for... measures that CMS could consider. Measure developers, hospitals, medical specialty societies, medical... medical technology costs. The imaging efficiency measures fill a significant gap in the availability...

  15. Reusable Security Requirements

    DTIC Science & Technology

    2016-06-13

    terms of subfactor of security quality factor, asset, threat, attacker, and situation • Standard measures for security subfactors • Parameterized...2003 by Carnegie Mellon University page 5 Carnegie Mellon Software Engineering Institute Types of Security Requirements Use Quality Model of factors...subfactors, criteria, and measures. Small number of Security Quality Subfactors: • Access Control (Identification, Authentication, and Authorization

  16. 49 CFR 192.935 - What additional preventive and mitigative measures must an operator take?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... detection systems, replacing pipe segments with pipe of heavier wall thickness, providing additional training to personnel on response procedures, conducting drills with local emergency responders and... must, at least, consider the following factors—swiftness of leak detection and pipe...

  17. Security of quantum bit string commitment depends on the information measure.

    PubMed

    Buhrman, Harry; Christandl, Matthias; Hayden, Patrick; Lo, Hoi-Kwong; Wehner, Stephanie

    2006-12-22

    Unconditionally secure nonrelativistic bit commitment is known to be impossible in both the classical and the quantum world. However, when committing to a string of n bits at once, how far can we stretch the quantum limits? In this Letter, we introduce a framework of quantum schemes where Alice commits a string of n bits to Bob, in such a way that she can only cheat on a bits and Bob can learn at most b bits of information before the reveal phase. Our results are twofold: we show by an explicit construction that in the traditional approach, where the reveal and guess probabilities form the security criteria, no good schemes can exist: a + b is at least n. If, however, we use a more liberal criterion of security, the accessible information, we construct schemes where a = 4log2(n) + O(1) and b = 4, which is impossible classically. Our findings significantly extend known no-go results for quantum bit commitment.

  18. [Security measures in the penal code, in the opinions of expert psychiatrists and some problems in their applications].

    PubMed

    Hajdukiewicz, Danuta

    2006-01-01

    The aim of this paper is to remind expert psychiatrists, the three basic elements required for the application of security measures such as placing the convict in a psychiatric hospital. They are: 1) An act was of serious social damage, 2) the damage was committed in a state of non-liability, 3) there is a high risk of the person repeating the act of similar social damage. The fulfilment of these three is an obligation for the court to apply the security measure of placing the person in a psychiatric hospital (art. 94 section 1 of the penal code). Practice shows that experts have difficulties in these evaluations, which in turn results in faults in directing for placement withoutjust cause, or in turn-there is no directing, even though there are causes for it. There is a huge need for legal regulations on these manners, after the forensic psychiatric observation ends. The non-liable delinquent who committed an act of serious social damage is in risk of committing this act once more, whilst he is not in custody. The issue is in showing a legal basis for keeping the non-liable delinquent from such an act in a psychiatric hospital, in spite of ending the observation, until the legal sentence on the security measure is in place.

  19. Mortality Measurement at Advanced Ages: A Study of the Social Security Administration Death Master File.

    PubMed

    Gavrilov, Leonid A; Gavrilova, Natalia S

    2011-01-01

    Accurate estimates of mortality at advanced ages are essential to improving forecasts of mortality and the population size of the oldest old age group. However, estimation of hazard rates at extremely old ages poses serious challenges to researchers: (1) The observed mortality deceleration may be at least partially an artifact of mixing different birth cohorts with different mortality (heterogeneity effect); (2) standard assumptions of hazard rate estimates may be invalid when risk of death is extremely high at old ages and (3) ages of very old people may be exaggerated. One way of obtaining estimates of mortality at extreme ages is to pool together international records of persons surviving to extreme ages with subsequent efforts of strict age validation. This approach helps researchers to resolve the third of the above-mentioned problems but does not resolve the first two problems because of inevitable data heterogeneity when data for people belonging to different birth cohorts and countries are pooled together. In this paper we propose an alternative approach, which gives an opportunity to resolve the first two problems by compiling data for more homogeneous single-year birth cohorts with hazard rates measured at narrow (monthly) age intervals. Possible ways of resolving the third problem of hazard rate estimation are elaborated. This approach is based on data from the Social Security Administration Death Master File (DMF). Some birth cohorts covered by DMF could be studied by the method of extinct generations. Availability of month of birth and month of death information provides a unique opportunity to obtain hazard rate estimates for every month of age. Study of several single-year extinct birth cohorts shows that mortality trajectory at advanced ages follows the Gompertz law up to the ages 102-105 years without a noticeable deceleration. Earlier reports of mortality deceleration (deviation of mortality from the Gompertz law) at ages below 100 appear to be

  20. Mortality Measurement at Advanced Ages: A Study of the Social Security Administration Death Master File

    PubMed Central

    Gavrilov, Leonid A.; Gavrilova, Natalia S.

    2011-01-01

    Accurate estimates of mortality at advanced ages are essential to improving forecasts of mortality and the population size of the oldest old age group. However, estimation of hazard rates at extremely old ages poses serious challenges to researchers: (1) The observed mortality deceleration may be at least partially an artifact of mixing different birth cohorts with different mortality (heterogeneity effect); (2) standard assumptions of hazard rate estimates may be invalid when risk of death is extremely high at old ages and (3) ages of very old people may be exaggerated. One way of obtaining estimates of mortality at extreme ages is to pool together international records of persons surviving to extreme ages with subsequent efforts of strict age validation. This approach helps researchers to resolve the third of the above-mentioned problems but does not resolve the first two problems because of inevitable data heterogeneity when data for people belonging to different birth cohorts and countries are pooled together. In this paper we propose an alternative approach, which gives an opportunity to resolve the first two problems by compiling data for more homogeneous single-year birth cohorts with hazard rates measured at narrow (monthly) age intervals. Possible ways of resolving the third problem of hazard rate estimation are elaborated. This approach is based on data from the Social Security Administration Death Master File (DMF). Some birth cohorts covered by DMF could be studied by the method of extinct generations. Availability of month of birth and month of death information provides a unique opportunity to obtain hazard rate estimates for every month of age. Study of several single-year extinct birth cohorts shows that mortality trajectory at advanced ages follows the Gompertz law up to the ages 102–105 years without a noticeable deceleration. Earlier reports of mortality deceleration (deviation of mortality from the Gompertz law) at ages below 100 appear to be

  1. Measuring Children's Proportional Reasoning, The "Tendency" for an Additive Strategy and The Effect of Models

    ERIC Educational Resources Information Center

    Misailadou, Christina; Williams, Julian

    2003-01-01

    We report a study of 10-14 year old children's use of additive strategies while solving ratio and proportion tasks. Rasch methodology was used to develop a diagnostic instrument that reveals children's misconceptions. Two versions of this instrument, one with "models" thought to facilitate proportional reasoning and one without were…

  2. Voice measures of workload in the advanced flight deck: Additional studies

    NASA Technical Reports Server (NTRS)

    Schneider, Sid J.; Alpert, Murray

    1989-01-01

    These studies investigated acoustical analysis of the voice as a measure of workload in individual operators. In the first study, voice samples were recorded from a single operator during high, medium, and low workload conditions. Mean amplitude, frequency, syllable duration, and emphasis all tended to increase as workload increased. In the second study, NASA test pilots performed a laboratory task, and used a flight simulator under differing work conditions. For two of the pilots, high workload in the simulator brought about greater amplitude, peak duration, and stress. In both the laboratory and simulator tasks, high workload tended to be associated with more statistically significant drop-offs in the acoustical measures than were lower workload levels. There was a great deal of intra-subject variability in the acoustical measures. The results suggested that in individual operators, increased workload might be revealed by high initial amplitude and frequency, followed by rapid drop-offs over time.

  3. Additional atmospheric opacity measurements at lambda = 1.1 mm from Mauna Kea Observatory, Hawaii

    NASA Technical Reports Server (NTRS)

    Parrish, A.; De Zafra, R. L.; Barrett, J. W.; Solomon, P.; Connor, B.

    1987-01-01

    Atmospheric opacity values in the zenith direction are given for a wavelength of 1.1 mm (278 GHz) at the summit of Mauna Kea in the Hawaiian Islands. A total of 75 days is covered during the period 1983-1986. Observations were made on a quasi-continuous basis, with opacity measured every 20 minutes around the clock for significant periods of time. A conversion from opacity at lambda = 1.1 mm to the equivalent precipitable water vapor column is given from the measurements of Zammit and Ade (1981), from which opacities at other wavelengths may be derived.

  4. 40 CFR 52.1163 - Additional control measures for East Boston.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...”) shall each submit to the Regional Administrator a study or studies of various alternative strategies to... consistent with the national primary ambient air quality standards. These studies may be combined into one or more joint studies. These studies shall contain recommendations for control measures to be...

  5. 40 CFR 52.1163 - Additional control measures for East Boston.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...”) shall each submit to the Regional Administrator a study or studies of various alternative strategies to... consistent with the national primary ambient air quality standards. These studies may be combined into one or more joint studies. These studies shall contain recommendations for control measures to be...

  6. Measurement of Insertion Loss of an Acoustic Treatment in the Presence of Additional Uncorrelated Sound Sources

    NASA Technical Reports Server (NTRS)

    Klos, Jacob; Palumbo, Daniel L.

    2003-01-01

    A method to intended for measurement of the insertion loss of an acoustic treatment applied to an aircraft fuselage in-situ is documented in this paper. Using this method, the performance of a treatment applied to a limited portion of an aircraft fuselage can be assessed even though the untreated fuselage also radiates into the cabin, corrupting the intensity measurement. This corrupting noise in the intensity measurement incoherent with the panel vibration of interest is removed by correlating the intensity to reference transducers such as accelerometers. Insertion loss of the acoustic treatments is estimated from the ratio of correlated intensity measurements with and without a treatment applied. In the case of turbulent boundary layer excitation of the fuselage, this technique can be used to assess the performance of noise control methods without requiring treatment of the entire fuselage. Several experimental studies and numerical simulations have been conducted, and results from three case studies are documented in this paper. Conclusions are drawn about the use of this method to study aircraft sidewall treatments.

  7. An Additional Measure of Overall Effect Size for Logistic Regression Models

    ERIC Educational Resources Information Center

    Allen, Jeff; Le, Huy

    2008-01-01

    Users of logistic regression models often need to describe the overall predictive strength, or effect size, of the model's predictors. Analogs of R[superscript 2] have been developed, but none of these measures are interpretable on the same scale as effects of individual predictors. Furthermore, R[superscript 2] analogs are not invariant to the…

  8. 42 CFR 414.1230 - Additional measures for groups of physicians.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... diabetes. The rate of potentially preventable hospital admissions for diabetes is a composite measure of uncontrolled diabetes, short term diabetes complications, long term diabetes complications and lower extremity amputation for diabetes. (b) A composite of rates of potentially preventable hospital admissions...

  9. 42 CFR 414.1230 - Additional measures for groups of physicians.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... diabetes. The rate of potentially preventable hospital admissions for diabetes is a composite measure of uncontrolled diabetes, short term diabetes complications, long term diabetes complications and lower extremity amputation for diabetes. (b) A composite of rates of potentially preventable hospital admissions...

  10. Turbulence measurements over immobile gravel with additions of sand from supply limited to capacity transport conditions

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Measurement of the turbulence that drives sand transport over and through immobile gravels is relevant to efforts to model sediment movement downstream of dams, where fine sediments are eroded from coarse substrates and are not replaced due to the presence of the upstream dam. The relative elevatio...

  11. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    PubMed

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  12. Assessing the use of an infrared spectrum hyperpixel array imager to measure temperature during additive and subtractive manufacturing

    NASA Astrophysics Data System (ADS)

    Whitenton, Eric; Heigel, Jarred; Lane, Brandon; Moylan, Shawn

    2016-05-01

    Accurate non-contact temperature measurement is important to optimize manufacturing processes. This applies to both additive (3D printing) and subtractive (material removal by machining) manufacturing. Performing accurate single wavelength thermography suffers numerous challenges. A potential alternative is hyperpixel array hyperspectral imaging. Focusing on metals, this paper discusses issues involved such as unknown or changing emissivity, inaccurate greybody assumptions, motion blur, and size of source effects. The algorithm which converts measured thermal spectra to emissivity and temperature uses a customized multistep non-linear equation solver to determine the best-fit emission curve. Emissivity dependence on wavelength may be assumed uniform or have a relationship typical for metals. The custom software displays residuals for intensity, temperature, and emissivity to gauge the correctness of the greybody assumption. Initial results are shown from a laser powder-bed fusion additive process, as well as a machining process. In addition, the effects of motion blur are analyzed, which occurs in both additive and subtractive manufacturing processes. In a laser powder-bed fusion additive process, the scanning laser causes the melt pool to move rapidly, causing a motion blur-like effect. In machining, measuring temperature of the rapidly moving chip is a desirable goal to develop and validate simulations of the cutting process. A moving slit target is imaged to characterize how the measured temperature values are affected by motion of a measured target.

  13. Efficient method for computing the maximum-likelihood quantum state from measurements with additive Gaussian noise.

    PubMed

    Smolin, John A; Gambetta, Jay M; Smith, Graeme

    2012-02-17

    We provide an efficient method for computing the maximum-likelihood mixed quantum state (with density matrix ρ) given a set of measurement outcomes in a complete orthonormal operator basis subject to Gaussian noise. Our method works by first changing basis yielding a candidate density matrix μ which may have nonphysical (negative) eigenvalues, and then finding the nearest physical state under the 2-norm. Our algorithm takes at worst O(d(4)) for the basis change plus O(d(3)) for finding ρ where d is the dimension of the quantum state. In the special case where the measurement basis is strings of Pauli operators, the basis change takes only O(d(3)) as well. The workhorse of the algorithm is a new linear-time method for finding the closest probability distribution (in Euclidean distance) to a set of real numbers summing to one.

  14. Conceptual foundation for measures of physical function and behavioral health function for Social Security work disability evaluation.

    PubMed

    Marfeo, Elizabeth E; Haley, Stephen M; Jette, Alan M; Eisen, Susan V; Ni, Pengsheng; Bogusz, Kara; Meterko, Mark; McDonough, Christine M; Chan, Leighton; Brandt, Diane E; Rasch, Elizabeth K

    2013-09-01

    Physical and mental impairments represent the 2 largest health condition categories for which workers receive Social Security disability benefits. Comprehensive assessment of physical and mental impairments should include aspects beyond medical conditions such as a person's underlying capabilities as well as activity demands relevant to the context of work. The objective of this article is to describe the initial conceptual stages of developing new measurement instruments of behavioral health and physical functioning relevant for Social Security work disability evaluation purposes. To outline a clear conceptualization of the constructs to be measured, 2 content models were developed using structured and informal qualitative approaches. We performed a structured literature review focusing on work disability and incorporating aspects of the International Classification of Functioning, Disability and Health as a unifying taxonomy for framework development. Expert interviews provided advice and consultation to enhance face validity of the resulting content models. The content model for work-related behavioral health function identifies 5 major domains: (1) behavior control, (2) basic interactions, (3) temperament and personality, (4) adaptability, and (5) workplace behaviors. The content model describing physical functioning includes 3 domains: (1) changing and maintaining body position, (2) whole-body mobility, and (3) carrying, moving, and handling objects. These content models informed subsequent measurement properties including item development and measurement scale construction, and provided conceptual coherence guiding future empirical inquiry. The proposed measurement approaches show promise to comprehensively and systematically assess physical and behavioral health functioning relevant to work.

  15. Single-Molecule FRET Measurements in Additive-Enriched Aqueous Solutions.

    PubMed

    Kempe, Daryan; Cerminara, Michele; Poblete, Simón; Schöne, Antonie; Gabba, Matteo; Fitter, Jörg

    2017-01-03

    The addition of high amounts of chemical denaturants, salts, viscosity enhancers or macro-molecular crowding agents has an impact on the physical properties of buffer solutions. Among others, the (microscopic) viscosity, the refractive index, the dielectric constant, and the ionic strength can be affected. Here, we systematically evaluate the importance of solvent characteristics with respect to single-molecule FRET (smFRET) data. First, we present a confocal based method for the determination of fluorescence quantum yields to facilitate a fast characterization of smFRET-samples at sub-nM-concentrations. As a case study, we analyze smFRET data of structurally rigid, double-stranded DNA-oligonucleotides in aqueous buffer and in buffers with specific amounts of glycerol, guanidine hydrochloride (GdnHCl), and sodium chloride (NaCl) added. We show that the calculation of interdye distances, without taking into account solvent-induced spectral and photophysical changes of the labels, leads to deviations of up to 4 Å from the real interdye distances. Additionally, we demonstrate that electrostatic dye-dye repulsions are negligible for the interdye distance regime considered here (>50 Å). Finally, we use our approach to validate the further compaction of the already unfolded state of phosphoglycerate kinase (PGK) with decreasing denaturant concentrations, a mechanism known as coil-globule transition.

  16. Rates of False-Positive Classification Resulting From the Analysis of Additional Embedded Performance Validity Measures.

    PubMed

    Silk-Eglit, Graham M; Stenclik, Jessica H; Miele, Andrea S; Lynch, Julie K; McCaffrey, Robert J

    2015-01-01

    Several studies have documented improvements in the classification accuracy of performance validity tests (PVTs) when they are combined to form aggregated models. Fewer studies have evaluated the impact of aggregating additional PVTs and changing the classification threshold within these models. A recent Monte Carlo simulation demonstrated that to maintain a false-positive rate (FPR) of ≤.10, only 1, 4, 8, 10, and 15 PVTs should be analyzed at classification thresholds of failing at least 1, at least 2, at least 3, at least 4, and at least 5 PVTs, respectively. The current study sought to evaluate these findings with embedded PVTs in a sample of real-life litigants and to highlight a potential danger in analytic flexibility with embedded PVTs. Results demonstrated that to maintain an FPR of ≤.10, only 3, 7, 10, 14, and 15 PVTs should be analyzed at classification thresholds of failing at least 1, at least 2, at least 3, at least 4, and at least 5 PVTs, respectively. Analyzing more than these numbers of PVTs resulted in a dramatic increase in the FPR. In addition, in the most extreme case, flexibility in analyzing and reporting embedded PVTs increased the FPR by 67%. Given these findings, a more objective approach to analyzing and reporting embedded PVTs should be introduced.

  17. Development of the laser absorption radiation thermometry technique to measure thermal diffusivity in addition to temperature

    NASA Astrophysics Data System (ADS)

    Levick, Andrew; Lobato, Killian; Edwards, Gordon

    2003-01-01

    A comparative technique based on photothermal radiometry has been developed to measure thermal diffusivity of semi-infinite targets with arbitrary geometry. The technique exploits the principle that the frequency response of the temperature modulation induced by a periodic modulated heating source (in this case a laser spot) scales with thermal diffusivity. To demonstrate this technique, a photothermal radiometer has been developed, which detects modulated thermal radiance at a wavelength of 2 μm due to a small temperature modulation induced on the target surface by a modulated erbium fiber laser of power 1 W. Two frequency responses were measured for platinum and oxidized Inconel 600 targets (the frequency response is a scan of the amplitude of the modulated thermal radiance over laser modulation frequency). Scaling the two responses with respect to frequency gives a ratio of thermal diffusivities Dplatinum/DInconel of 4.45(33) which compares with a literature value of 4.46(50). The aim is to combine this technique with laser absorption radiation thermometry to produce multithermal property instrument for measuring "industrial" targets.

  18. Food security of older adults requesting Older Americans Act Nutrition Program in Georgia can be validly measured using a short form of the U.S. Household Food Security Survey Module.

    PubMed

    Lee, Jung Sun; Johnson, Mary Ann; Brown, Arvine; Nord, Mark

    2011-07-01

    Food security is a newly recommended outcome measure for the Older Americans Act Nutrition Program (OAANP); however, it is unknown how best to evaluate the need for this program and assess its impact on a large scale. Therefore, we measured food security in all new OAANP participants and waitlisted applicants in Georgia between July and early November, 2008 (n = 4731) with the self-administered mail survey method used in the ongoing Georgia Performance Outcomes Measures project. We used a modified 6-item U.S. Household Food Security Survey Module (HFSSM) with a 30-d reference period and 2 reminder postcards. Approximately 33% of those identified completed the survey (n = 1594, mean age 74.6 ± 9.5 y, 68.6% female, 30.6% black). Most of the respondents (91%) completed all 6 food security questions, whereas 26 did not respond to any question. Infit and outfit statistics for each of the 6 questions were within an acceptable range. Psychometric properties observed in our food security data were generally similar to those in the nationally representative survey conducted by the Census Bureau and suggest that our food security statistics may be meaningfully compared with national food security statistics published by the USDA. Our findings suggest that food security can be reasonably measured by a short form of HFSSM in older adults requesting OAANP. Such methodology also can be used to estimate the extent of food insecurity and help guide program and policy decisions to meet the nutrition assistance needs of vulnerable older adults.

  19. Modest additive effects of integrated vector control measures on malaria prevalence and transmission in western Kenya

    PubMed Central

    2013-01-01

    Background The effect of integrating vector larval intervention on malaria transmission is unknown when insecticide-treated bed-net (ITN) coverage is very high, and the optimal indicator for intervention evaluation needs to be determined when transmission is low. Methods A post hoc assignment of intervention-control cluster design was used to assess the added effect of both indoor residual spraying (IRS) and Bacillus-based larvicides (Bti) in addition to ITN in the western Kenyan highlands in 2010 and 2011. Cross-sectional, mass parasite screenings, adult vector populations, and cohort of active case surveillance (ACS) were conducted before and after the intervention in three study sites with two- to three-paired intervention-control clusters at each site each year. The effect of larviciding, IRS, ITNs and other determinants of malaria risk was assessed by means of mixed estimating methods. Results Average ITN coverage increased from 41% in 2010 to 92% in 2011 in the study sites. IRS intervention had significant added impact on reducing vector density in 2010 but the impact was modest in 2011. The effect of IRS on reducing parasite prevalence was significant in 2011 but was seasonal specific in 2010. ITN was significantly associated with parasite densities in 2010 but IRS application was significantly correlated with reduced gametocyte density in 2011. IRS application reduced about half of the clinical malaria cases in 2010 and about one-third in 2011 compare to non-intervention areas. Conclusion Compared with a similar study conducted in 2005, the efficacy of the current integrated vector control with ITN, IRS, and Bti reduced three- to five-fold despite high ITN coverage, reflecting a modest added impact on malaria transmission. Additional strategies need to be developed to further reduce malaria transmission. PMID:23870708

  20. Cl2 Measurements in Polluted Coastal Air Using a Br- Addition CIMS Technique

    NASA Astrophysics Data System (ADS)

    Lawler, M. J.; Saltzman, E. S.

    2008-12-01

    Molecular chlorine (Cl2) was measured in ambient air using chemical ionization mass spectrometry (CIMS) with Br- as a reagent ion. Ionization was carried out by adding CHBr3 to ambient air and flowing the gas mixture through a 63Ni ion source maintained at 300 Torr. The resulting Cl2Br- adduct was collisionally dissociated in a triple quadrupole mass spectrometer and detected as Cl-. Ambient Cl2 measurements were made at Irvine, CA, from August 1-8, 2008. Air was drawn to the instrument from outside via a ~4m long laminar flow inlet. Inlet and instrument blanks were assessed by passing ambient air through carbonate-coated glass wool, and the instrument was calibrated with a Cl2 permeation tube. During this study, the mean detection limit for Cl2 was estimated at approximately 2 ppt. Cl2 showed a diel cycle on the days it was detectable, with nighttime mixing ratios up to about 15 ppt and daytime values of a few ppt or less. A rapid decrease in Cl2 in surface air was observed overnight in association with stagnation of the nocturnal surface layer.

  1. Neutron measurements of stresses in a test artifact produced by laser-based additive manufacturing

    SciTech Connect

    Gnäupel-Herold, Thomas; Slotwinski, John; Moylan, Shawn

    2014-02-18

    A stainless steel test artifact produced by Direct Metal Laser Sintering and similar to a proposed standardized test artifact was examined using neutron diffraction. The artifact contained a number of structures with different aspect ratios pertaining to wall thickness, height above base plate, and side length. Through spatial resolutions of the order of one millimeter the volumetric distribution of stresses in several was measured. It was found that the stresses peak in the tensile region around 500 MPa near the top surface, with balancing compressive stresses in the interior. The presence of a support structure (a one millimeter high, thin walled, hence weaker, lattice structure deposited on the base plate, followed by a fully dense AM structure) has only minor effects on the stresses.

  2. Time- and isomer-resolved measurements of sequential addition of acetylene to the propargyl radical

    DOE PAGES

    Savee, John D.; Selby, Talitha M.; Welz, Oliver; ...

    2015-10-06

    Soot formation in combustion is a complex process in which polycyclic aromatic hydrocarbons (PAHs) are believed to play a critical role. Recent works concluded that three consecutive additions of acetylene (C2H2) to propargyl (C3H3) create a facile route to the PAH indene (C9H8). However, the isomeric forms of C5H5 and C7H7 intermediates in this reaction sequence are not known. We directly investigate these intermediates using time- and isomer-resolved experiments. Both the resonance stabilized vinylpropargyl (vp-C5H5) and 2,4-cyclopentadienyl (c-C5H5) radical isomers of C5H5 are produced, with substantially different intensities at 800 K vs 1000 K. In agreement with literature master equationmore » calculations, we find that c-C5H5 + C2H2 produces only the tropyl isomer of C7H7 (tp-C7H7) below 1000 K, and that tp-C7H7 + C2H2 terminates the reaction sequence yielding C9H8 (indene) + H. Lastly, this work demonstrates a pathway for PAH formation that does not proceed through benzene.« less

  3. A New Method for Finding Optical Aberrations on the Basis of Analysis of the Object Hologram Without Additional Measurements

    NASA Astrophysics Data System (ADS)

    Matkivsky, V. A.; Moiseev, A. A.; Shilyagin, P. A.; Shabanov, D. V.; Gelikonov, G. V.; Gelikonov, V. M.

    2016-11-01

    We propose a new method of compensating for the wavefront aberrations during the image processing. The method employs the digital-holography potential. The developed algorithms allow one to find the wavefront distortions caused by the optical-path nonuniformities during the interference recording of images without additional measurements (i.e., without using the reference point source and measuring the wavefront distortions). The possibility of decreasing the wavefront aberrations from tens to several radians using digital methods is demonstrated.

  4. Time- and isomer-resolved measurements of sequential addition of acetylene to the propargyl radical

    SciTech Connect

    Savee, John D.; Selby, Talitha M.; Welz, Oliver; Taatjes, Craig A.; Osborn, David L.

    2015-10-06

    Soot formation in combustion is a complex process in which polycyclic aromatic hydrocarbons (PAHs) are believed to play a critical role. Recent works concluded that three consecutive additions of acetylene (C2H2) to propargyl (C3H3) create a facile route to the PAH indene (C9H8). However, the isomeric forms of C5H5 and C7H7 intermediates in this reaction sequence are not known. We directly investigate these intermediates using time- and isomer-resolved experiments. Both the resonance stabilized vinylpropargyl (vp-C5H5) and 2,4-cyclopentadienyl (c-C5H5) radical isomers of C5H5 are produced, with substantially different intensities at 800 K vs 1000 K. In agreement with literature master equation calculations, we find that c-C5H5 + C2H2 produces only the tropyl isomer of C7H7 (tp-C7H7) below 1000 K, and that tp-C7H7 + C2H2 terminates the reaction sequence yielding C9H8 (indene) + H. Lastly, this work demonstrates a pathway for PAH formation that does not proceed through benzene.

  5. Assessing the internal validity of a household survey-based food security measure adapted for use in Iran

    PubMed Central

    Rafiei, Morteza; Nord, Mark; Sadeghizadeh, Atefeh; Entezari, Mohammad H

    2009-01-01

    Background The prevalence of food insecurity is an indicator of material well-being in an area of basic need. The U.S. Food Security Module has been adapted for use in a wide variety of cultural and linguistic settings around the world. We assessed the internal validity of the adapted U.S. Household Food Security Survey Module to measure adult and child food insecurity in Isfahan, Iran, using statistical methods based on the Rasch measurement model. Methods The U.S. Household Food Security Survey Module was translated into Farsi and after adaptation, administered to a representative sample. Data were provided by 2,004 randomly selected households from all sectors of the population of Isfahan, Iran, during 2005. Results 53.1 percent reported that their food had run out at some time during the previous 12 months and they did not have money to buy more, while 26.7 percent reported that an adult had cut the size of a meal or skipped a meal because there was not enough money for food, and 7.2 percent reported that an adult did not eat for a whole day because there was not enough money for food. The severity of the items in the adult scale, estimated under Rasch-model assumptions, covered a range of 6.65 logistic units, and those in the child scale 11.68 logistic units. Most Item-infit statistics were near unity, and none exceeded 1.20. Conclusion The range of severity of items provides measurement coverage across a wide range of severity of food insecurity for both adults and children. Both scales demonstrated acceptable levels of internal validity, although several items should be improved. The similarity of the response patterns in the Isfahan and the U.S. suggests that food insecurity is experienced, managed, and described similarly in the two countries. PMID:19558676

  6. Ocular accommodation and cognitive demand: An additional indicator besides pupil size and cardiovascular measures?

    PubMed Central

    Jainta, Stephanie; Hoormann, Joerg; Jaschinski, Wolfgang

    2008-01-01

    Background The aim of the present study was to assess accommodation as a possible indicator of changes in the autonomic balance caused by altered cognitive demand. Accounting for accommodative responses from a human factors perspective may be motivated by the interest of designing virtual image displays or by establishing an autonomic indicator that allows for remote measurement at the human eye. Heart period, pulse transit time, and the pupillary response were considered as reference for possible closed-loop accommodative effects. Cognitive demand was varied by presenting monocularly numbers at a viewing distance of 5 D (20 cm) which had to be read, added or multiplied; further, letters were presented in a "n-back" task. Results Cardiovascular parameters and pupil size indicated a change in autonomic balance, while error rates and reaction time confirmed the increased cognitive demand during task processing. An observed decrease in accommodation could not be attributed to the cognitive demand itself for two reasons: (1) the cognitive demand induced a shift in gaze direction which, for methodological reasons, accounted for a substantial part of the observed accommodative changes. (2) Remaining effects disappeared when the correctness of task processing was taken into account. Conclusion Although the expectation of accommodation as possible autonomic indicator of cognitive demand was not confirmed, the present results are informative for the field of applied psychophysiology noting that it seems not to be worthwhile to include closed-loop accommodation in future studies. From a human factors perspective, expected changes of accommodation due to cognitive demand are of minor importance for design specifications – of, for example, complex visual displays. PMID:18721478

  7. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  8. Measuring Productive Elements of Multi-Word Phrase Vocabulary Knowledge among Children with English as an Additional or Only Language

    ERIC Educational Resources Information Center

    Smith, Sara A.; Murphy, Victoria A.

    2015-01-01

    Vocabulary plays a critical role in language and reading development for children, particularly those learning English as an additional language (EAL) (Stahl & Nagy, 2006). Previous research on vocabulary has mainly focused on measuring individual words without considering multi-word phrase knowledge, despite evidence that these items occur…

  9. Additional Value of CH₄ Measurement in a Combined (13)C/H₂ Lactose Malabsorption Breath Test: A Retrospective Analysis.

    PubMed

    Houben, Els; De Preter, Vicky; Billen, Jaak; Van Ranst, Marc; Verbeke, Kristin

    2015-09-07

    The lactose hydrogen breath test is a commonly used, non-invasive method for the detection of lactose malabsorption and is based on an abnormal increase in breath hydrogen (H₂) excretion after an oral dose of lactose. We use a combined (13)C/H₂ lactose breath test that measures breath (13)CO₂ as a measure of lactose digestion in addition to H₂ and that has a better sensitivity and specificity than the standard test. The present retrospective study evaluated the results of 1051 (13)C/H₂ lactose breath tests to assess the impact on the diagnostic accuracy of measuring breath CH₄ in addition to H₂ and (13)CO₂. Based on the (13)C/H₂ breath test, 314 patients were diagnosed with lactase deficiency, 138 with lactose malabsorption or small bowel bacterial overgrowth (SIBO), and 599 with normal lactose digestion. Additional measurement of CH₄ further improved the accuracy of the test as 16% subjects with normal lactose digestion and no H₂-excretion were found to excrete CH₄. These subjects should have been classified as subjects with lactose malabsorption or SIBO. In conclusion, measuring CH₄-concentrations has an added value to the (13)C/H₂ breath test to identify methanogenic subjects with lactose malabsorption or SIBO.

  10. [The status and measures to secure safe household water supply in the Russian Federation].

    PubMed

    Onishchenko, G G

    2010-01-01

    To preserve the health of our nation, to reduce mortality rates, and to increase longevity are the most important conditions for solving the problem of national security. The Russian Federation completely supports the world community's efforts to conserve water bodies and to prevent the spread water-borne diseases. Despite the fact that Russia is the largest water country and has one fifth of the worldwide resources, the situation in this sphere is serious as before. Portable water deficiency in a number of the Russian Federation's subjects, such as the Kostroma, Kaluga, and Pskov Republics, the Republic of North-Alania, etc., is one of the poor factors of household water supply. To improve the provision of our country's population with good-quality drinking water, the Russian Inspectorate for the Protection of Consumer Rights and Human Welfare, continuously does work to improve the legal and regulatory basis that stipulates sanitary-and-epidemiological standards for portable water and drinking water supply.

  11. Real-time interferometric monitoring and measuring of photopolymerization based stereolithographic additive manufacturing process: sensor model and algorithm

    NASA Astrophysics Data System (ADS)

    Zhao, X.; Rosen, D. W.

    2017-01-01

    As additive manufacturing is poised for growth and innovations, it faces barriers of lack of in-process metrology and control to advance into wider industry applications. The exposure controlled projection lithography (ECPL) is a layerless mask-projection stereolithographic additive manufacturing process, in which parts are fabricated from photopolymers on a stationary transparent substrate. To improve the process accuracy with closed-loop control for ECPL, this paper develops an interferometric curing monitoring and measuring (ICM&M) method which addresses the sensor modeling and algorithms issues. A physical sensor model for ICM&M is derived based on interference optics utilizing the concept of instantaneous frequency. The associated calibration procedure is outlined for ICM&M measurement accuracy. To solve the sensor model, particularly in real time, an online evolutionary parameter estimation algorithm is developed adopting moving horizon exponentially weighted Fourier curve fitting and numerical integration. As a preliminary validation, simulated real-time measurement by offline analysis of a video of interferograms acquired in the ECPL process is presented. The agreement between the cured height estimated by ICM&M and that measured by microscope indicates that the measurement principle is promising as real-time metrology for global measurement and control of the ECPL process.

  12. PREFACE: 2014 Joint IMEKO TC1-TC7-TC13 Symposium: Measurement Science Behind Safety and Security

    NASA Astrophysics Data System (ADS)

    Sousa, João A.; Ribeiro, Álvaro S.; Filipe, Eduarda

    2015-02-01

    The 2014 Joint IMEKO (International Measurement Confederation) TC1-TC7-TC13 Symposium was organized by RELACRE - Portuguese Association of Accredited Laboratories and the Portuguese Society for Metrology, on 3-5 September 2014. The work of this symposium is reported in this volume. The scope of the symposium includes the main topics covered by the above Technical Committees: - TC1 Education and Training in measurement and Instrumentation - TC7 Measurement Science - TC13 Measurements in Biology and Medicine The effort towards excellence of previous events, in this well established series, is maintained. There has been a special focus on measurement science behind safety and security, with the aim of highlighting the interdisciplinary character of measurement science and the importance of metrology in our daily lives. The discussion was introduced by keynote lectures on measurement challenges in biometrics, health monitoring and social sciences, to promote useful interactions with scientists from different disciplines. The Symposium was attended by experts working in these areas from 18 countries, including USA, Japan and China, and provided a useful forum for them to share and exchange their work and ideas. In total over fifty papers are included in the volume, organized according to the presentation sessions. Each paper was independently peer-reviewed by two reviewers from a distinguished international panel. The Symposium was held in Funchal, capital of Madeira Islands, known as the Atlantic Pearl. This wonderful Atlantic archipelago, formed by Madeira and Porto Santo islands, discovered in the 14th century, was chosen to host the 2014 IMEKO TC1-TC7-TC13 Joint Symposium ''Measurement Science behind Safety and Security''. It was the first territory discovered by the Portuguese sailors, when set out to discover a new world, in an epic journey where instrumentation and quality of measurement played a central role in the success of the enterprise, and gave an

  13. Measurement of water by oven evaporation using a novel oven design. 2. Water in motor oils and motor oil additives.

    PubMed

    Margolis, Sam A; Vaishnav, Kevin; Sieber, John R

    2004-11-01

    The measurement of water in lubricating oils is important because water accelerates the corrosion of metal parts and bearings in motors. Some of the additives added to lubricating oils to improve their performance react with the Karl Fischer reagent (KFR) causing a positive bias in the water measurement. A new oven evaporation technique for measuring water in oils has been developed that is automated, requires less sample handling, is easily calibrated, and is capable of measuring relatively small mass fractions of water (> or =50 mg/kg sample). A series of motor oils was analyzed with the standard KFR, a reagent that detects interfering substances that reduce iodine, and the aldehyde-ketone reagent that does not detect substances that react with methanol and form water. The oil samples were heated to 107 degrees C and then reheated to 160 degrees C. At both temperatures, material was measured by both KFRs, but only zinc dithiophosphate released sulfur compounds that would react with the reagent that detects interfering substances. Mass fractions of between 20 and 70% of the volatile material released at either temperature were measured with the standard KFR but not with the aldehyde-ketone reagent. These results demonstrate that there are a number of sources of positive bias in the measurement of water in motor oils and that the standard KFR cannot be used to measure water in motor oils and motor oil additives. These results also indicate that some of the material reacts with methanol to form water. Finally, these results suggest that some of the material that is volatile at 160 degrees C and not at 107 degrees C may be water that is physically occluded or may be substances that react with diethyleneglycol monomethylether to produce water.

  14. Measurements at Los Alamos National Laboratory Plutonium Facility in Support of Global Security Mission Space

    SciTech Connect

    Stange, Sy; Mayo, Douglas R.; Herrera, Gary D.; McLaughlin, Anastasia D.; Montoya, Charles M.; Quihuis, Becky A.; Trujillo, Julio B.; Van Pelt, Craig E.; Wenz, Tracy R.

    2012-07-13

    The Los Alamos National Laboratory Plutonium Facility at Technical Area (TA) 55 is one of a few nuclear facilities in the United States where Research & Development measurements can be performed on Safeguards Category-I (CAT-I) quantities of nuclear material. This capability allows us to incorporate measurements of CAT-IV through CAT-I materials as a component of detector characterization campaigns and training courses conducted at Los Alamos. A wider range of measurements can be supported. We will present an overview of recent measurements conducted in support of nuclear emergency response, nuclear counterterrorism, and international and domestic safeguards. This work was supported by the NNSA Office of Counterterrorism.

  15. A method of analyzing nonstationary ionic channel current fluctuations in the presence of an additive measurement noise.

    PubMed

    Mino, H

    1993-03-01

    A method of estimating the parameters of nonstationary ionic channel current fluctuations (NST-ICF's) in the presence of an additive measurement noise is proposed. The case is considered in which the sample records of NST-ICT's corrupted by the measurement noise are available for estimation, where the experiment can be repeated many times to calculate the statistics of noisy NST-ICF's. The conventional second-order regression model expressed in terms of the mean and variance of noisy NST-ICF's is derived theoretically, assuming that NST-ICF's are binomially distributed. Since the coefficients of the regression model are explicitly related to not only the parameters of NST-ICF's but also the measurement noise component, the parameters of NST-ICF's that are of interest can be estimated without interference from the additive measurement noise by identifying the regression coefficients. Furthermore, the accuracy of the parameter estimates is theoretically evaluated using the error-covariance matrix of the regression coefficients. The validity and effectiveness of the proposed method are demonstrated in a Monte Carlo simulation in which a fundamental kinetic scheme of Na+ channels is treated as a specific example.

  16. Analysis of the laser powder bed fusion additive manufacturing process through experimental measurement and finite element modeling

    NASA Astrophysics Data System (ADS)

    Dunbar, Alexander Jay

    The objective in this work is to provide rigourous experimental measurements to aid in the development of laser powder bed fusion (LPBF) additive manufacturing (AM). A specialized enclosed instrumented measurement system is designed to provide in situ experimental measurements of temperature and distortion. Experiments include comparisons of process parameters, materials and LPBF machines. In situ measurements of distortion and temperature made throughout the build process highlight inter-layer distortion effects previously undocumented for laser powder bed fusion. Results from these experiments are also be implemented in the development and validation of finite element models of the powder bed build process. Experimental analysis is extended from small-scale to larger part-scale builds where experimental post-build measurements are used in analysis of distortion profiles. Experimental results provided from this study are utilized in the validation of a finite element model capable of simulating production scale parts. The validated finite element model is then implemented in the analysis of the part to provide information regarding the distortion evolution process. A combination of experimental measurements and simulation results are used to identify the mechanism that results in the measured distortion profile for this geometry. Optimization of support structure primarily focuses on the minimization of material use and scan time, but no information regarding failure criteria for support structure is available. Tensile test samples of LPBF built support structure are designed, built, and tested to provide measurements of mechanical properties of the support structure. Experimental tests show that LPBF built support structure has only 30-40% of the ultimate tensile strength of solid material built in the same machine. Experimental measurement of LPBF built support structure provides clear failure criteria to be utilized in the future design and implementation of

  17. Secure Database Management Study.

    DTIC Science & Technology

    1978-12-01

    3.1.2 McCauleYls Security Atoms Additional concepts are introduced in (MCCAES) which enhance the security aspects of the attribute- bar id model...sLgnificance. Physical access remains as an overriding factor of system security. Without protection of the physeal operating environment (computer

  18. Alternative security

    SciTech Connect

    Weston, B.H. )

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  19. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  20. Near-road modeling and measurement of cerium-containing particles generated by nanoparticle diesel fuel additive use.

    PubMed

    Gantt, Brett; Hoque, Shamia; Willis, Robert D; Fahey, Kathleen M; Delgado-Saborit, Juana Mari; Harrison, Roy M; Erdakos, Garnet B; Bhave, Prakash V; Zhang, K Max; Kovalcik, Kasey; Pye, Havala O T

    2014-09-16

    Cerium oxide nanoparticles (nCe) are used as a fuel-borne catalyst in diesel engines to reduce particulate emissions, yet the environmental and human health impacts of the exhaust particles are not well understood. To bridge the gap between emission measurements and ambient impacts, size-resolved measurements of particle composition and mass concentration have been performed in Newcastle-upon-Tyne, United Kingdom, where buses have used an nCe additive since 2005. These observations show that the noncrustal cerium fraction thought to be associated with the use of nCe has a mass concentration ∼ 0.3 ng m(-3) with a size distribution peaking at 100-320 nm in aerodynamic diameter. Simulations with a near-roadway multicomponent sectional aerosol dynamic model predict that the use of nCe additives increases the number concentration of nuclei mode particles (<50 nm in diameter) while decreasing the total mass concentration. The near-road model predicts a downwind mass size distribution of cerium-containing particles peaking at 150 nm in aerodynamic diameter, a value similar to that measured for noncrustal cerium in Newcastle. This work shows that both the emission and atmospheric transformation of cerium-containing particles needs to be taken into account by regional modelers, exposure scientists, and policymakers when determining potential environmental and human health impacts.

  1. Influence of oxygen addition to the carrier gas on laser-induced breakdown spectroscopy measurements on aerosols

    NASA Astrophysics Data System (ADS)

    Palazzo, N.; Migliorini, F.; Dondè, R.; Maffi, S.; De Iuliis, S.

    2016-01-01

    In this work, laser-induced breakdown spectrosopy is implemented on aerosol particles for absolute concentration analysis. The aim of this work is the investigation of the effect of the bath gas used for nebulizing the aerosol. Nitrogen, air, and 50% O2 in N2 mixture have been chosen as carrier gasses in order to analyze the effect of oxygen addition to the gas. LIBS measurements have been carried out on aerosol particles produced from CuCl2 2H2O solutions, and the 324.7 nm Cu line is considered. As a first analysis, plasma parameters, such as temperature and electron density, have been evaluated changing the carrier gas. Measurements to derive the LIBS calibration curve of the 324.7 nm Cu line are carried out in air and in N2. The significant difference in the slope of the resulting calibration curves has to be attributed to the oxygen addition to the bath gas. To explore such behavior, time-resolved measurements of the Cu line and peak/base ratio have been performed. The presence of two competitive effects have been observed that becomes significant increasing the amount of oxygen in the carrier gas. One is the oxygen-quenching effect, already observed in the literature, and the other one is the enhancement of the Cu LIBS signal, expecially at short delay times. These effects have been observed also at other Cu lines and changing the analyte source. The results are presented and widely discussed.

  2. Effect of polyglycerol esters additive on palm oil crystallization using focused beam reflectance measurement and differential scanning calorimetry.

    PubMed

    Saw, M H; Hishamuddin, E; Chong, C L; Yeoh, C B; Lim, W H

    2017-01-01

    The effect of 0.1-0.7% (w/w) of polyglycerol esters (PGEmix-8) on palm oil crystallization was studied using focused beam reflectance measurement (FBRM) to analyze the in-line changes of crystal size distribution during the crystallization. FBRM results show that 0.1-0.5% (w/w) of PGEmix-8 did not significantly affect nucleation but slightly retarded crystal growth. The use of 0.7% (w/w) additive showed greater heterogeneous nucleation compared to those with lower dosages of additive. Crystal growth was also greatly reduced when using 0.7% (w/w) dosage. The morphological study indicated that the palm oil crystals were smaller and more even in size than when more additive was added. Isothermal crystallization studies using differential scanning calorimetry (DSC) showed increased inhibitory effects on palm oil crystal growth with increasing concentration of PGEmix-8. These results imply that PGEmix-8 is a nucleation enhancing and crystal growth retarding additive in palm oil crystallization at 0.7% (w/w) dosage.

  3. 75 FR 28672 - Bureau of International Security and Nonproliferation; Lifting of Nonproliferation Measures...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-21

    ... Russian Entities AGENCY: Department of State. ACTION: Notice. SUMMARY: A determination has been made... measures on two Russian entities. DATES: Effective Date: May 21, 2010. FOR FURTHER INFORMATION CONTACT... Executive Order on the following Russian entities, their sub-units and successors: 1. D....

  4. Measuring Sustainability: Deriving Metrics From A Secure Human-Environment Relationship

    EPA Science Inventory

    The ability of individuals and institutions to take actions that would achieve sustainability is often lost in rhetoric about what it is or isn't and how to measure progress. Typically, sustainability is viewed as an objective and in this capacity efforts are made to identify i...

  5. Review on measurement techniques of transport properties of nanowires Additions and Corrections. See DOI:10.1039/C3NR03242F Click here for additional data file.

    PubMed Central

    Rojo, Miguel Muñoz; Calero, Olga Caballero; Lopeandia, A. F.; Rodriguez-Viejo, J.

    2013-01-01

    Physical properties at the nanoscale are novel and different from those in bulk materials. Over the last few decades, there has been an ever growing interest in the fabrication of nanowire structures for a wide variety of applications including energy generation purposes. Nevertheless, the study of their transport properties, such as thermal conductivity, electrical conductivity or Seebeck coefficient, remains an experimental challenge. For instance, in the particular case of nanostructured thermoelectrics, theoretical calculations have shown that nanowires offer a promising way of enhancing the hitherto low efficiency of these materials in the conversion of temperature differences into electricity. Therefore, within the thermoelectrical community there has been a great experimental effort in the measurement of these quantities in actual nanowires. The measurements of these properties at the nanoscale are also of interest in fields other than energy, such as electrical components for microchips, field effect transistors, sensors, and other low scale devices. For all these applications, knowing the transport properties is mandatory. This review deals with the latest techniques developed to perform the measurement of these transport properties in nanowires. A thorough overview of the most important and modern techniques used for the characterization of different kinds of nanowires will be shown. PMID:24113712

  6. The 1998-2000 SHADOZ (Southern Hemisphere ADditional Ozonesondes) Tropical Ozone Climatology: Comparison with TOMS and Ground-Based Measurements

    NASA Technical Reports Server (NTRS)

    Thompson, Anne M.; Witte, Jacquelyn; McPeters, Richard D.; Oltmans, Samuel J.; Schmidlin, Francis J.; Logan, Jennifer A.; Fujiwara, Masatormo; Kirchhoff, Volker W. J. H.; Posny, Francoise; Coetzee, Gerhard J. R.; Bhartia, P. K. (Technical Monitor)

    2001-01-01

    A network of 10 southern hemisphere tropical and Subtropical stations, designated the Southern Hemisphere ADditional OZonesondes, (SHADOZ) project and established from operational sites, provided over 1000 ozone profiles during the period 1998-2000. Balloon-borne electrochemical concentration cell (ECC) ozonesondes, combined with standard radiosondes for pressure, temperature and relative humidity measurements, collected profiles in the troposphere and lower- to mid-stratosphere at: Ascension Island; Nairobi, Kenya; Irene, South Africa: Reunion Island, Watukosek Java; Fiji; Tahiti; American Samoa; San Cristobal, Galapagos; Natal, Brazil.

  7. Photon Doppler Velocimeter to Measure Entrained Additive Manufactured Bulk Metal Powders in Hot Subsonic and Supersonic Oxygen Gas

    NASA Technical Reports Server (NTRS)

    Tylka, Jonathan

    2016-01-01

    Parts produced by additive manufacturing, particularly selective laser melting (SLM), have been shown to silt metal particulate even after undergoing stringent precision aerospace cleaning processes (Lowrey 2016). As printed parts are used in oxygen systems with increased pressures, temperatures, and gas velocity, the risk of ignition by particle impact, the most common direct ignition source of metals in oxygen, substantially increases. The White Sands Test Facility (WSTF), in collaboration with Marshall Space Flight Center (MSFC), desires to test the ignitability of SLM metals by particle impact in heated oxygen. The existing test systems rely on gas velocity calculations to infer particle velocity in both subsonic and supersonic particle impact systems. Until now, it was not possible to directly measure particle velocity. To increase the fidelity of planned SLM ignition studies, it is necessary to validate that the Photon Doppler Velocimetry(PDV) test system can accurately measure particle velocity.

  8. 32 CFR 2003.15 - Additional functions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... President through the National Security Advisor, the ISCAP performs such additional advisory functions as... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION INTERAGENCY SECURITY CLASSIFICATION APPEALS PANEL...

  9. 32 CFR 2003.15 - Additional functions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... President through the National Security Advisor, the ISCAP performs such additional advisory functions as... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION INTERAGENCY SECURITY CLASSIFICATION APPEALS PANEL...

  10. Climate-derived tensions in Arctic security.

    SciTech Connect

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  11. The life closure scale: additional psychometric testing of a tool to measure psychological adaptation in death and dying.

    PubMed

    Dobratz, Marjorie C

    2004-02-01

    The purpose of this study was to conduct additional psychometric testing on an instrument designed to measure psychological adaptation in end-of-life populations across a wide spectrum of terminal illnesses. A sample of 20 participants completed initial testing of the Life Closure Scale (LCS); however, its usefulness was limited by the small sample size. A larger sample of 113 home hospice individuals who met established criteria and who gave informed consent completed the 27-item LCS for additional psychometric testing. Cronbach's alphas and correlation coefficients were computed, and factor analysis was conducted to establish internal consistency reliability, theoretical clarity, and criterion-related validity. The number of scale items was reduced to 20, with a total alpha of.87. Cronbach's alphas for the two subscales were.80 (self-reconciled) and.82 (self-restructuring). Item-total correlations for the subscales ranged from a low of.37 to a high of.68, with confirmatory factor analysis yielding two loadings. These findings lend credence to the usefulness of the LCS in measuring psychological adaptation in dying persons.

  12. Integrating Multi-Sensor Remote Sensing and In-situ Measurements for Africa Drought Monitoring and Food Security Assessment

    NASA Astrophysics Data System (ADS)

    Hao, X.; Qu, J. J.; Motha, R. P.; Stefanski, R.; Malherbe, J.

    2014-12-01

    Drought is one of the most complicated natural hazards, and causes serious environmental, economic and social consequences. Agricultural production systems, which are highly susceptible to weather and climate extremes, are often the first and most vulnerable sector to be affected by drought events. In Africa, crop yield potential and grazing quality are already nearing their limit of temperature sensitivity, and, rapid population growth and frequent drought episodes pose serious complications for food security. It is critical to promote sustainable agriculture development in Africa under conditions of climate extremes. Soil moisture is one of the most important indicators for agriculture drought, and is a fundamentally critical parameter for decision support in crop management, including planting, water use efficiency and irrigation. While very significant technological advances have been introduced for remote sensing of surface soil moisture from space, in-situ measurements are still critical for calibration and validation of soil moisture estimation algorithms. For operational applications, synergistic collaboration is needed to integrate measurements from different sensors at different spatial and temporal scales. In this presentation, a collaborative effort is demonstrated for drought monitoring in Africa, supported and coordinated by WMO, including surface soil moisture and crop status monitoring. In-situ measurements of soil moisture, precipitation and temperature at selected sites are provided by local partners in Africa. Measurements from the Soil Moisture and Ocean Salinity (SMOS) and the Moderate Resolution Imaging Spectroradiometer (MODIS) are integrated with in-situ observations to derive surface soil moisture at high spatial resolution. Crop status is estimated through temporal analysis of current and historical MODIS measurements. Integrated analysis of soil moisture data and crop status provides both in-depth understanding of drought conditions and

  13. Integrating Multi-Sensor Remote Sensing and In-situ Measurements for Africa Drought Monitoring and Food Security Assessment

    NASA Astrophysics Data System (ADS)

    Hao, X.; Qu, J. J.; Motha, R. P.; Stefanski, R.; Malherbe, J.

    2015-12-01

    Drought is one of the most complicated natural hazards, and causes serious environmental, economic and social consequences. Agricultural production systems, which are highly susceptible to weather and climate extremes, are often the first and most vulnerable sector to be affected by drought events. In Africa, crop yield potential and grazing quality are already nearing their limit of temperature sensitivity, and, rapid population growth and frequent drought episodes pose serious complications for food security. It is critical to promote sustainable agriculture development in Africa under conditions of climate extremes. Soil moisture is one of the most important indicators for agriculture drought, and is a fundamentally critical parameter for decision support in crop management, including planting, water use efficiency and irrigation. While very significant technological advances have been introduced for remote sensing of surface soil moisture from space, in-situ measurements are still critical for calibration and validation of soil moisture estimation algorithms. For operational applications, synergistic collaboration is needed to integrate measurements from different sensors at different spatial and temporal scales. In this presentation, a collaborative effort is demonstrated for drought monitoring in Africa, supported and coordinated by WMO, including surface soil moisture and crop status monitoring. In-situ measurements of soil moisture, precipitation and temperature at selected sites are provided by local partners in Africa. Measurements from the Soil Moisture and Ocean Salinity (SMOS) and the Moderate Resolution Imaging Spectroradiometer (MODIS) are integrated with in-situ observations to derive surface soil moisture at high spatial resolution. Crop status is estimated through temporal analysis of current and historical MODIS measurements. Integrated analysis of soil moisture data and crop status provides both in-depth understanding of drought conditions and

  14. A City and National Metric measuring Isolation from the Global Market for Food Security Assessment

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.; Silver, Kirk Coleman; Rajagopalan, Krishnan

    2013-01-01

    The World Bank has invested in infrastructure in developing countries for decades. This investment aims to reduce the isolation of markets, reducing both seasonality and variability in food availability and food prices. Here we combine city market price data, global distance to port, and country infrastructure data to create a new Isolation Index for countries and cities around the world. Our index quantifies the isolation of a city from the global market. We demonstrate that an index built at the country level can be applied at a sub-national level to quantify city isolation. In doing so, we offer policy makers with an alternative metric to assess food insecurity. We compare our isolation index with other indices and economic data found in the literature.We show that our Index measures economic isolation regardless of economic stability using correlation and analysis

  15. Measuring the Effectiveness of Visual Analytics and Data Fusion Techniques on Situation Awareness in Cyber-Security

    ERIC Educational Resources Information Center

    Giacobe, Nicklaus A.

    2013-01-01

    Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…

  16. Measuring the Effectiveness of Information Security Training: A Comparative Analysis of Computer-Based Training and Instructor-Based Training

    ERIC Educational Resources Information Center

    Kim, Philip

    2010-01-01

    Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…

  17. 78 FR 41413 - Aviation Security Advisory Committee (ASAC) Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-10

    ... SECURITY Transportation Security Administration Aviation Security Advisory Committee (ASAC) Meeting AGENCY... Meeting. SUMMARY: The Transportation Security Administration (TSA) will hold a meeting of the Aviation... and provides advice and recommendations for improving aviation security measures to the...

  18. Design and analysis of a piezoelectric material based touch screen with additional pressure and its acceleration measurement functions

    NASA Astrophysics Data System (ADS)

    Chu, Xiang-Cheng; Liu, Jia-Yi; Gao, Ren-Long; Chang, Jie; Li, Long-Tu

    2013-12-01

    Touch screens are becoming more and more prevalent in everyday environments due to their convenience and humanized operation. In this paper, a piezoelectric material based touch screen is developed and investigated. Piezoelectric ceramics arrayed under the touch panel at the edges or corners are used as tactile sensors to measure the touch positioning point similarly to conventional touch screens. However, additional touch pressure and its acceleration performance can also be obtained to obtain a higher-level human-machine interface. The piezoelectric ceramics can also be added to a traditional touch screen structure, or they can be used independently to construct a novel touch screen with a high light transmittance approach to a transparent glass. The piezoelectric ceramics were processed from PZT piezoelectric ceramic powder into a round or rectangular shape. According to the varied touch position and physical press strength of a finger, or even a gloved hand or fingernail, the piezoelectric tactile sensors will have different output voltage responses. By calculating the ratio of different piezoelectric tactile sensors’ responses and summing up all piezoelectric tactile sensors’ output voltages, the touch point position, touch pressure and touch force acceleration can be detected. A prototype of such a touch screen is manufactured and its position accuracy, touch pressure and response speed are measured in detail. The experimental results show that the prototype has many advantages such as high light transmittance, low energy cost and high durability.

  19. Predicting Perceptions of Fear at School and Going to and from School for African American and White Students: The Effects of School Security Measures

    ERIC Educational Resources Information Center

    Bachman, Ronet; Randolph, Antonia; Brown, Bethany L.

    2011-01-01

    This article uses the School Crime Supplement of the National Crime Victimization Survey to investigate the factors related to White and African American students' perceived levels of fear of harm, while at school and while commuting to and from school. Of particular interest were the effects of school security measures, including metal detectors,…

  20. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  1. Gross anatomy of network security

    NASA Technical Reports Server (NTRS)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  2. Enhanced Radioactive Material Source Security.

    PubMed

    Klinger, Joseph G

    2016-02-01

    Requirements for additional security measures for sealed radioactive sources have evolved since they were first implemented after the terrorist events of 11 September 2001. This paper will describe the sequence of those measures, commencing with the early orders issued by the U.S. Nuclear Regulatory Commission to the May 2013 adoption of 10 CFR Part 37, Physical Protections of Category 1 and Category 2 Quantities of Radioactive Material. Part 37 requirements will be discussed in detail, as the 37 NRC Agreement States, which regulate approximately 88% of the radioactive material licensees, will be required to enact by 19 March 2016. In addition to the Part 37 requirements, the paper will also highlight some of the other ongoing efforts of the U.S. Department of Energy's National Nuclear Security Administration's Global Threat Reduction Initiative and the Conference of Radiation Control Program Directors.

  3. Securing collaborative environments

    SciTech Connect

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  4. Process Control Systems in the Chemical Industry: Safety vs. Security

    SciTech Connect

    Jeffrey Hahn; Thomas Anderson

    2005-04-01

    Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

  5. Helicopter acoustic alerting system for high-security facilities

    NASA Astrophysics Data System (ADS)

    Steadman, Robert L.; Hansen, Scott; Park, Chris; Power, Dennis

    2009-05-01

    Helicopters present a serious threat to high security facilities such as prisons, nuclear sites, armories, and VIP compounds. They have the ability to instantly bypass conventional security measures focused on ground threats such as fences, check-points, and intrusion sensors. Leveraging the strong acoustic signature inherent in all helicopters, this system would automatically detect, classify, and accurately track helicopters using multi-node acoustic sensor fusion. An alert would be generated once the threat entered a predefined 3-dimension security zone in time for security personnel to repel the assault. In addition the system can precisely identify the landing point on the facility grounds.

  6. The vulnerable do-gooders: security strategies of German aid agencies.

    PubMed

    Schneiker, Andrea

    2013-04-01

    Humanitarian and development agencies have confronted growing insecurity in some of the regions in which they work over the course of the past decade. Consequently, aid agencies are changing their approach to security issues. Compared to aid agencies from other countries, especially the United Kingdom and the United States, German aid agencies have been relatively slow to adopt security measures. In addition, the security measures they have selected differ from one agency to another, even in comparable security contexts. The literature on organisational learning helps to explain these differences. The findings show that external and internal organisational factors influence an aid agency's choice of a particular security measure. The different responses of German aid agencies to the changing security environment demonstrate that security measures are not only influenced by an organisation's identity but also can be a way for them to demonstrate their identity and thereby distinguish themselves from other actors that deliver aid.

  7. Additional security features for optically variable foils

    NASA Astrophysics Data System (ADS)

    Marshall, Allan C.; Russo, Frank

    1998-04-01

    For thousands of years, man has exploited the attraction and radiance of pure gold to adorn articles of great significance. Today, designers decorate packaging with metallic gold foils to maintain the prestige of luxury items such as perfumes, chocolates, wine and whisky, and to add visible appeal and value to wide range of products. However, today's products do not call for the hand beaten gold leaf of the Ancient Egyptians, instead a rapid production technology exists which makes use of accurately coated thin polymer films and vacuum deposited metallic layers. Stamping Foils Technology is highly versatile since several different layers may be combined into one product, each providing a different function. Not only can a foil bring visual appeal to an article, it can provide physical and chemical resistance properties and also protect an article from human forms of interference, such as counterfeiting, copying or tampering. Stamping foils have proved to be a highly effective vehicle for applying optical devices to items requiring this type of protection. Credit cards, bank notes, personal identification documents and more recently high value packaged items such as software and perfumes are protected by optically variable devices applied using stamping foil technology.

  8. Statistical security for Social Security.

    PubMed

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  9. School Safety and Security.

    ERIC Educational Resources Information Center

    California State Dept. of Education, Sacramento.

    This document offers additional guidelines for school facilities in California in the areas of safety and security, lighting, and cleanliness. It also offers a description of technology resources available on the World Wide Web. On the topic of safety and security, the document offers guidelines in the areas of entrances, doors, and controlled…

  10. 31 CFR 354.10 - Additional provisions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.10 Additional provisions. (a... attachment for Sallie Mae Securities in Book-entry System. The interest of a debtor in a Security Entitlement may be reached by a creditor only by legal process upon the Securities Intermediary with whom...

  11. FOILFEST :community enabled security.

    SciTech Connect

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6

  12. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  13. Study of adsorption of detergent-dispersion additives on solid particles dispersed in oil using the method of electrical conductivity measurement

    SciTech Connect

    Waligora, B.; Buczak, H.; Olszewska, A.; Szeglowski, Z.

    1984-01-01

    By measuring electrical conductivity of paraffin oil solutions in isooctane (1:1 by volume) the variation in concentration of detergent-dispersant additives is studied; this variation is caused by their adsorption on solid particles (carbon black, aluminum powder). It is shown that dispersants have an improved ability to undergo adsorption, compared with detergents. Studies of adsorption of additives on model sorbents may be used to develop tests for evaluating additive properties. 7 references, 4 figures.

  14. National Security Technology Incubator Operations Plan

    SciTech Connect

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  15. Network Security Is Manageable

    ERIC Educational Resources Information Center

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  16. New initiatives in materials security

    SciTech Connect

    Cynthia, G.; Jones, Ph.D.

    2008-07-01

    NRC Mission: To license and regulate the Nation's civilian use of byproduct, source, and special nuclear materials to ensure adequate protection of public health and safety, promote the common defense and security, and protect the environment. Scope of Responsibility: NRC's regulatory mission covers three main areas: - Reactors: commercial reactors for generating electric power and non-power reactors used for research, testing, and training; - Materials: uses of nuclear materials in medical, industrial, and academic settings and facilities that produce nuclear fuel; - Waste: transportation, storage, and disposal of nuclear materials and waste, and decommissioning of nuclear facilities from service. A Changing Environment: - National security is dominant concern; - Obtain appropriate balance between safety and Security initiatives and Operational activities; - Multiple layers of systems, infrastructures for various licensees. Effective Communication: Not easy; Sound bites galore; Nuclear 'phobia'; Acceptability of risk; Balance of cost and benefits; Responsibility of the regulator, licensees and radiation protection professionals. Prioritized Licensee Groups: - High priority: Panoramic irradiators; manufacturers/distributors; - Medium priority: medical and research facilities, radiography, well-logging, broad-scope licenses, self-shielded irradiators, open-field irradiators, and other licensees; - Low priority: Portable gauges. Increased Security Measures: Security Zone; Control Access; Monitor, Detect, Assess, and Respond; Transportation Security; Additional control to secure portable and mobile devices; Liaison with Local Law Enforcement Agencies; Background Investigations and Fingerprinting; License Verification; Document Retention; Information Protection; Orders/Legally binding requirements to more than 3000 licensees. Orders Issued: Large Panoramic Irradiators Security Measures (60 Orders issued 6/03, Inspections done); Manufacturing and Distribution Licensees

  17. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Security Administration--023 Workplace Violence Prevention Program System of Records AGENCY: Privacy Office..., ``Department of Homeland Security/Transportation Security Administration--023 Workplace Violence Prevention... and maintain records on their Workplace Violence Prevention Program. Additionally, the Department...

  18. 31 CFR 354.10 - Additional provisions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING BOOK-ENTRY SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.10 Additional provisions. (a) Additional... Securities in Book-entry System. The interest of a debtor in a Security Entitlement may be reached by...

  19. 31 CFR 354.10 - Additional provisions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING BOOK-ENTRY SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.10 Additional provisions. (a) Additional... Securities in Book-entry System. The interest of a debtor in a Security Entitlement may be reached by...

  20. 31 CFR 354.10 - Additional provisions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING BOOK-ENTRY SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.10 Additional provisions. (a) Additional... Securities in Book-entry System. The interest of a debtor in a Security Entitlement may be reached by...

  1. 31 CFR 354.10 - Additional provisions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING BOOK-ENTRY SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.10 Additional provisions. (a) Additional... Securities in Book-entry System. The interest of a debtor in a Security Entitlement may be reached by...

  2. A rapid automated procedure for laboratory and shipboard spectrophotometric measurements of seawater alkalinity: continuously monitored single-step acid additions

    NASA Astrophysics Data System (ADS)

    Liu, X.; Byrne, R. H.; Lindemuth, M.; Easley, R. A.; Patsavas, M. C.

    2012-12-01

    An automated system for shipboard and laboratory alkalinity measurements is presented. The simple system, which consists of a Dosimat titrator to deliver acid volumetrically and a USB 4000 spectrophotometer to monitor the titration progress, provides fast, precise and accurate measurements of total alkalinity for oceanographic research. The analytical method is based on single-point HCl titrations of seawater samples of a known volume; bromol cresol purple is used as an indicator to determine the final pH. Field data from an Arctic cruise demonstrates accuracy and precision around 1 micro mol/kg and a sample processing rate of 6 min per sample.

  3. Near-road modeling and measurement of cerium-containing particles generated by nanoparticle diesel fuel additive use

    EPA Science Inventory

    Cerium oxide nanoparticles (nCe) are used as a fuel-borne catalyst in diesel engines to reduce particulate emissions, yet the environmental and human health impacts of the exhaust particles are not well understood. To bridge the gap between emission measurements and ambient impac...

  4. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... access prevention systems; (5) Response capability for security incidents; (6) Threat assessments..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... of security concerns, the exercise of control measures, or audits. (2) Possible security...

  5. Secure Quantum Technologies

    NASA Astrophysics Data System (ADS)

    Malik, Mehul

    Over the past three decades, quantum mechanics has allowed the development of technologies that provide unconditionally secure communication. In parallel, the quantum nature of the transverse electromagnetic field has spawned the field of quantum imaging that encompasses technologies such as quantum lithography, quantum ghost imaging, and high-dimensional quantum key distribution (QKD). The emergence of such quantum technologies also highlights the need for the development of accurate and efficient methods of measuring and characterizing the elusive quantum state itself. In this thesis, I present new technologies that use the quantum properties of light for security. The first of these is a technique that extends the principles behind QKD to the field of imaging and optical ranging. By applying the polarization-based BB84 protocol to individual photons in an active imaging system, we obtained images that were secure against any intercept-resend jamming attacks. The second technology presented in this thesis is based on an extension of quantum ghost imaging, a technique that uses position-momentum entangled photons to create an image of an object without directly gaining any spatial information from it. We used a holographic filtering technique to build a quantum ghost image identification system that uses a few pairs of photons to identify an object from a set of known objects. The third technology addressed in this thesis is a high-dimensional QKD system that uses orbital-angular-momentum (OAM) modes of light for encoding. Moving to a high-dimensional state space in QKD allows one to impress more information on each photon, as well as introduce higher levels of security. I discuss the development of two OAM-QKD protocols based on the BB84 and Ekert protocols of QKD. In addition, I present a study characterizing the effects of turbulence on a communication system using OAM modes for encoding. The fourth and final technology presented in this thesis is a relatively

  6. National security in the third world

    SciTech Connect

    Al-Mashat, A.M.M.

    1985-01-01

    For nations of the Third World, national security poses serious dilemmas. Unlike Western nations, less-developed countries must balance the complex and often contradictory requirements of socio-economic and political development with problems of internal stability and the requirements of national defense. For these countries, a concept of national security that focuses primarily on the international threat system and its overt manifestations of wars and violence, ignoring domestic well-being, is inadequate on theoretical and pragmatic grounds. This book addresses the security problems of Third World states, arguing for new ways to define and measure national security so that the concept may be appropriately applied to the needs of developing countries. In addition, the author argues that the tranquility of a state, a concept traditionally linked with national security, cannot necessarily be associated with quality of life as measured by conventional means. Dr. Al-Mashat constructs a tranquility index for 95 developing nations and tests its relationship with the physical quality-of-life index to demonstrate this point. Attempts to improve quality of life, he suggests, may in many countries lead to a reduction in security unless simultaneous attempts are made to democratize the regime.

  7. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  8. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    PubMed

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  9. Measurement of [Formula: see text] production with additional jet activity, including [Formula: see text] quark jets, in the dilepton decay channel using pp collisions at [Formula: see text].

    PubMed

    Khachatryan, V; Sirunyan, A M; Tumasyan, A; Adam, W; Asilar, E; Bergauer, T; Brandstetter, J; Brondolin, E; Dragicevic, M; Erö, J; Friedl, M; Frühwirth, R; Ghete, V M; Hartl, C; Hörmann, N; Hrubec, J; Jeitler, M; Knünz, V; König, A; Krammer, M; Krätschmer, I; Liko, D; Matsushita, T; Mikulec, I; Rabady, D; Rahbaran, B; Rohringer, H; Schieck, J; Schöfbeck, R; Strauss, J; Treberer-Treberspurg, W; Waltenberger, W; Wulz, C-E; Mossolov, V; Shumeiko, N; Suarez Gonzalez, J; Alderweireldt, S; Cornelis, T; De Wolf, E A; Janssen, X; Knutsson, A; Lauwers, J; Luyckx, S; Van De Klundert, M; Van Haevermaet, H; Van Mechelen, P; Van Remortel, N; Van Spilbeeck, A; Abu Zeid, S; Blekman, F; D'Hondt, J; Daci, N; De Bruyn, I; Deroover, K; Heracleous, N; Keaveney, J; Lowette, S; Moreels, L; Olbrechts, A; Python, Q; Strom, D; Tavernier, S; Van Doninck, W; Van Mulders, P; Van Onsem, G P; Van Parijs, I; Barria, P; Brun, H; Caillol, C; Clerbaux, B; De Lentdecker, G; Fasanella, G; Favart, L; Grebenyuk, A; Karapostoli, G; Lenzi, T; Léonard, A; Maerschalk, T; Marinov, A; Perniè, L; Randle-Conde, A; Reis, T; Seva, T; Vander Velde, C; Yonamine, R; Vanlaer, P; Yonamine, R; Zenoni, F; Zhang, F; Adler, V; Beernaert, K; Benucci, L; Cimmino, A; Crucy, S; Dobur, D; Fagot, A; Garcia, G; Gul, M; Mccartin, J; Ocampo Rios, A A; Poyraz, D; Ryckbosch, D; Salva, S; Sigamani, M; Strobbe, N; Tytgat, M; Van Driessche, W; Yazgan, E; Zaganidis, N; Basegmez, S; Beluffi, C; Bondu, O; Brochet, S; Bruno, G; Caudron, A; Ceard, L; Da Silveira, G G; Delaere, C; Favart, D; Forthomme, L; Giammanco, A; Hollar, J; Jafari, A; Jez, P; Komm, M; Lemaitre, V; Mertens, A; Musich, M; Nuttens, C; Perrini, L; Pin, A; Piotrzkowski, K; Popov, A; Quertenmont, L; Selvaggi, M; Vidal Marono, M; Beliy, N; Hammad, G H; Júnior, W L Aldá; Alves, F L; Alves, G A; Brito, L; Correa Martins Junior, M; Hamer, M; Hensel, C; Mora Herrera, C; Moraes, A; Pol, M E; Rebello Teles, P; Belchior Batista Das Chagas, E; Carvalho, W; Chinellato, J; Custódio, A; Da Costa, E M; De Jesus Damiao, D; De Oliveira Martins, C; Fonseca De Souza, S; Huertas Guativa, L M; Malbouisson, H; Matos Figueiredo, D; Mundim, L; Nogima, H; Prado Da Silva, W L; Santoro, A; Sznajder, A; Tonelli Manganote, E J; Vilela Pereira, A; Ahuja, S; Bernardes, C A; De Souza Santos, A; Dogra, S; Fernandez Perez Tomei, T R; Gregores, E M; Mercadante, P G; Moon, C S; Novaes, S F; Padula, Sandra S; Romero Abad, D; Ruiz Vargas, J C; Aleksandrov, A; Hadjiiska, R; Iaydjiev, P; Rodozov, M; Stoykova, S; Sultanov, G; Vutova, M; Dimitrov, A; Glushkov, I; Litov, L; Pavlov, B; Petkov, P; Ahmad, M; Bian, J G; Chen, G M; Chen, H S; Chen, M; Cheng, T; Du, R; Jiang, C H; Plestina, R; Romeo, F; Shaheen, S M; Spiezia, A; Tao, J; Wang, C; Wang, Z; Zhang, H; Asawatangtrakuldee, C; Ban, Y; Li, Q; Liu, S; Mao, Y; Qian, S J; Wang, D; Xu, Z; Avila, C; Cabrera, A; Chaparro Sierra, L F; Florez, C; Gomez, J P; Gomez Moreno, B; Sanabria, J C; Godinovic, N; Lelas, D; Puljak, I; Ribeiro Cipriano, P M; Antunovic, Z; Kovac, M; Brigljevic, V; Kadija, K; Luetic, J; Micanovic, S; Sudic, L; Attikis, A; Mavromanolakis, G; Mousa, J; Nicolaou, C; Ptochos, F; Razis, P A; Rykaczewski, H; Bodlak, M; Finger, M; Finger, M; El Sawy, M; El-Khateeb, E; Elkafrawy, T; Mohamed, A; Salama, E; Calpas, B; Kadastik, M; Murumaa, M; Raidal, M; Tiko, A; Veelken, C; Eerola, P; Pekkanen, J; Voutilainen, M; Härkönen, J; Karimäki, V; Kinnunen, R; Lampén, T; Lassila-Perini, K; Lehti, S; Lindén, T; Luukka, P; Mäenpää, T; Peltola, T; Tuominen, E; Tuominiemi, J; Tuovinen, E; Wendland, L; Talvitie, J; Tuuva, T; Besancon, M; Couderc, F; Dejardin, M; Denegri, D; Fabbro, B; Faure, J L; Favaro, C; Ferri, F; Ganjour, S; Givernaud, A; Gras, P; Hamel de Monchenault, G; Jarry, P; Locci, E; Machet, M; Malcles, J; Rander, J; Rosowsky, A; Titov, M; Zghiche, A; Antropov, I; Baffioni, S; Beaudette, F; Busson, P; Cadamuro, L; Chapon, E; Charlot, C; Dahms, T; Davignon, O; Filipovic, N; Florent, A; Granier de Cassagnac, R; Lisniak, S; Mastrolorenzo, L; Miné, P; Naranjo, I N; Nguyen, M; Ochando, C; Ortona, G; Paganini, P; Pigard, P; Regnard, S; Salerno, R; Sauvan, J B; Sirois, Y; Strebler, T; Yilmaz, Y; Zabi, A; Agram, J-L; Andrea, J; Aubin, A; Bloch, D; Brom, J-M; Buttignol, M; Chabert, E C; Chanon, N; Collard, C; Conte, E; Coubez, X; Fontaine, J-C; Gelé, D; Goerlach, U; Goetzmann, C; Le Bihan, A-C; Merlin, J A; Skovpen, K; Van Hove, P; Gadrat, S; Beauceron, S; Bernet, C; Boudoul, G; Bouvier, E; Carrillo Montoya, C A; Chierici, R; Contardo, D; Courbon, B; Depasse, P; El Mamouni, H; Fan, J; Fay, J; Gascon, S; Gouzevitch, M; Ille, B; Lagarde, F; Laktineh, I B; Lethuillier, M; Mirabito, L; Pequegnot, A L; Perries, S; Ruiz Alvarez, J D; Sabes, D; Sgandurra, L; Sordini, V; Vander Donckt, M; Verdier, P; Viret, S; Toriashvili, T; Lomidze, D; Autermann, C; Beranek, S; Edelhoff, M; Feld, L; Heister, A; Kiesel, M K; Klein, K; Lipinski, M; Ostapchuk, A; Preuten, M; Raupach, F; Schael, S; Schulte, J F; Verlage, T; Weber, H; Wittmer, B; Zhukov, V; Ata, M; Brodski, M; Dietz-Laursonn, E; Duchardt, D; Endres, M; Erdmann, M; Erdweg, S; Esch, T; Fischer, R; Güth, A; Hebbeker, T; Heidemann, C; Hoepfner, K; Klingebiel, D; Knutzen, S; Kreuzer, P; Merschmeyer, M; Meyer, A; Millet, P; Olschewski, M; Padeken, K; Papacz, P; Pook, T; Radziej, M; Reithler, H; Rieger, M; Scheuch, F; Sonnenschein, L; Teyssier, D; Thüer, S; Cherepanov, V; Erdogan, Y; Flügge, G; Geenen, H; Geisler, M; Hoehle, F; Kargoll, B; Kress, T; Kuessel, Y; Künsken, A; Lingemann, J; Nehrkorn, A; Nowack, A; Nugent, I M; Pistone, C; Pooth, O; Stahl, A; Aldaya Martin, M; Asin, I; Bartosik, N; Behnke, O; Behrens, U; Bell, A J; Borras, K; Burgmeier, A; Campbell, A; Choudhury, S; Costanza, F; Diez Pardos, C; Dolinska, G; Dooling, S; Dorland, T; Eckerlin, G; Eckstein, D; Eichhorn, T; Flucke, G; Gallo, E; Garcia, J Garay; Geiser, A; Gizhko, A; Gunnellini, P; Hauk, J; Hempel, M; Jung, H; Kalogeropoulos, A; Karacheban, O; Kasemann, M; Katsas, P; Kieseler, J; Kleinwort, C; Korol, I; Lange, W; Leonard, J; Lipka, K; Lobanov, A; Lohmann, W; Mankel, R; Marfin, I; Melzer-Pellmann, I-A; Meyer, A B; Mittag, G; Mnich, J; Mussgiller, A; Naumann-Emme, S; Nayak, A; Ntomari, E; Perrey, H; Pitzl, D; Placakyte, R; Raspereza, A; Roland, B; Sahin, M Ö; Saxena, P; Schoerner-Sadenius, T; Schröder, M; Seitz, C; Spannagel, S; Trippkewitz, K D; Walsh, R; Wissing, C; Blobel, V; Centis Vignali, M; Draeger, A R; Erfle, J; Garutti, E; Goebel, K; Gonzalez, D; Görner, M; Haller, J; Hoffmann, M; Höing, R S; Junkes, A; Klanner, R; Kogler, R; Lapsien, T; Lenz, T; Marchesini, I; Marconi, D; Meyer, M; Nowatschin, D; Ott, J; Pantaleo, F; Peiffer, T; Perieanu, A; Pietsch, N; Poehlsen, J; Rathjens, D; Sander, C; Schettler, H; Schleper, P; Schlieckau, E; Schmidt, A; Schwandt, J; Sola, V; Stadie, H; Steinbrück, G; Tholen, H; Troendle, D; Usai, E; Vanelderen, L; Vanhoefer, A; Vormwald, B; Akbiyik, M; Barth, C; Baus, C; Berger, J; Böser, C; Butz, E; Chwalek, T; Colombo, F; De Boer, W; Descroix, A; Dierlamm, A; Fink, S; Frensch, F; Friese, R; Giffels, M; Gilbert, A; Haitz, D; Hartmann, F; Heindl, S M; Husemann, U; Katkov, I; Kornmayer, A; Lobelle Pardo, P; Maier, B; Mildner, H; Mozer, M U; Müller, T; Müller, Th; Plagge, M; Quast, G; Rabbertz, K; Röcker, S; Roscher, F; Sieber, G; Simonis, H J; Stober, F M; Ulrich, R; Wagner-Kuhr, J; Wayand, S; Weber, M; Weiler, T; Wöhrmann, C; Wolf, R; Anagnostou, G; Daskalakis, G; Geralis, T; Giakoumopoulou, V A; Kyriakis, A; Loukas, D; Psallidas, A; Topsis-Giotis, I; Agapitos, A; Kesisoglou, S; Panagiotou, A; Saoulidou, N; Tziaferi, E; Evangelou, I; Flouris, G; Foudas, C; Kokkas, P; Loukas, N; Manthos, N; Papadopoulos, I; Paradas, E; Strologas, J; Bencze, G; Hajdu, C; Hazi, A; Hidas, P; Horvath, D; Sikler, F; Veszpremi, V; Vesztergombi, G; Zsigmond, A J; Beni, N; Czellar, S; Karancsi, J; Molnar, J; Szillasi, Z; Bartók, M; Makovec, A; Raics, P; Trocsanyi, Z L; Ujvari, B; Mal, P; Mandal, K; Sahoo, D K; Sahoo, N; Swain, S K; Bansal, S; Beri, S B; Bhatnagar, V; Chawla, R; Gupta, R; Bhawandeep, U; Kalsi, A K; Kaur, A; Kaur, M; Kumar, R; Mehta, A; Mittal, M; Singh, J B; Walia, G; Kumar, Ashok; Bhardwaj, A; Choudhary, B C; Garg, R B; Kumar, A; Malhotra, S; Naimuddin, M; Nishu, N; Ranjan, K; Sharma, R; Sharma, V; Bhattacharya, S; Chatterjee, K; Dey, S; Dutta, S; Jain, Sa; Majumdar, N; Modak, A; Mondal, K; Mukherjee, S; Mukhopadhyay, S; Roy, A; Roy, D; Roy Chowdhury, S; Sarkar, S; Sharan, M; Abdulsalam, A; Chudasama, R; Dutta, D; Jha, V; Kumar, V; Mohanty, A K; Pant, L M; Shukla, P; Topkar, A; Aziz, T; Banerjee, S; Bhowmik, S; Chatterjee, R M; Dewanjee, R K; Dugad, S; Ganguly, S; Ghosh, S; Guchait, M; Gurtu, A; Kole, G; Kumar, S; Mahakud, B; Maity, M; Majumder, G; Mazumdar, K; Mitra, S; Mohanty, G B; Parida, B; Sarkar, T; Sur, N; Sutar, B; Wickramage, N; Chauhan, S; Dube, S; Sharma, S; Bakhshiansohi, H; Behnamian, H; Etesami, S M; Fahim, A; Goldouzian, R; Khakzad, M; Mohammadi Najafabadi, M; Naseri, M; Paktinat Mehdiabadi, S; Rezaei Hosseinabadi, F; Safarzadeh, B; Zeinali, M; Felcini, M; Grunewald, M; Abbrescia, M; Calabria, C; Caputo, C; Colaleo, A; Creanza, D; Cristella, L; De Filippis, N; De Palma, M; Fiore, L; Iaselli, G; Maggi, G; Miniello, G; Maggi, M; My, S; Nuzzo, S; Pompili, A; Pugliese, G; Radogna, R; Ranieri, A; Selvaggi, G; Silvestris, L; Venditti, R; Verwilligen, P; Abbiendi, G; Battilana, C; Benvenuti, A C; Bonacorsi, D; Braibant-Giacomelli, S; Brigliadori, L; Campanini, R; Capiluppi, P; Castro, A; Cavallo, F R; Chhibra, S S; Codispoti, G; Cuffiani, M; Dallavalle, G M; Fabbri, F; Fanfani, A; Fasanella, D; Giacomelli, P; Grandi, C; Guiducci, L; Marcellini, S; Masetti, G; Montanari, A; Navarria, F L; Perrotta, A; Rossi, A M; Primavera, F; Rovelli, T; Siroli, G P; Tosi, N; Travaglini, R; Cappello, G; Chiorboli, M; Costa, S; Di Mattia, A; Giordano, F; Potenza, R; Tricomi, A; Tuve, C; Barbagli, G; Ciulli, V; Civinini, C; D'Alessandro, R; Focardi, E; Gonzi, S; Gori, V; Lenzi, P; Meschini, M; Paoletti, S; Sguazzoni, G; Tropiano, A; Viliani, L; Benussi, L; Bianco, S; Fabbri, F; Piccolo, D; Primavera, F; Calvelli, V; Ferro, F; Lo Vetere, M; Monge, M R; Robutti, E; Tosi, S; Brianza, L; Dinardo, M E; Fiorendi, S; Gennai, S; Gerosa, R; Ghezzi, A; Govoni, P; Malvezzi, S; Manzoni, R A; Marzocchi, B; Menasce, D; Moroni, L; Paganoni, M; Pedrini, D; Ragazzi, S; Redaelli, N; Tabarelli de Fatis, T; Buontempo, S; Cavallo, N; Di Guida, S; Esposito, M; Fabozzi, F; Iorio, A O M; Lanza, G; Lista, L; Meola, S; Merola, M; Paolucci, P; Sciacca, C; Thyssen, F; Azzi, P; Bacchetta, N; Bellato, M; Benato, L; Bisello, D; Boletti, A; Carlin, R; Checchia, P; Dall'Osso, M; Dorigo, T; Dosselli, U; Fanzago, F; Gasparini, F; Gasparini, U; Gonella, F; Gozzelino, A; Lacaprara, S; Margoni, M; Meneguzzo, A T; Pazzini, J; Pozzobon, N; Ronchese, P; Simonetto, F; Torassa, E; Tosi, M; Zanetti, M; Zotto, P; Zucchetta, A; Zumerle, G; Braghieri, A; Magnani, A; Montagna, P; Ratti, S P; Re, V; Riccardi, C; Salvini, P; Vai, I; Vitulo, P; Alunni Solestizi, L; Biasini, M; Bilei, G M; Ciangottini, D; Fanò, L; Lariccia, P; Mantovani, G; Menichelli, M; Saha, A; Santocchia, A; Androsov, K; Azzurri, P; Bagliesi, G; Bernardini, J; Boccali, T; Castaldi, R; Ciocci, M A; Dell'Orso, R; Donato, S; Fedi, G; Fiori, F; Foà, L; Giassi, A; Grippo, M T; Ligabue, F; Lomtadze, T; Martini, L; Messineo, A; Palla, F; Rizzi, A; Savoy-Navarro, A; Serban, A T; Spagnolo, P; Tenchini, R; Tonelli, G; Venturi, A; Verdini, P G; Barone, L; Cavallari, F; D'imperio, G; Del Re, D; Diemoz, M; Gelli, S; Jorda, C; Longo, E; Margaroli, F; Meridiani, P; Organtini, G; Paramatti, R; Preiato, F; Rahatlou, S; Rovelli, C; Santanastasio, F; Traczyk, P; Amapane, N; Arcidiacono, R; Argiro, S; Arneodo, M; Bellan, R; Biino, C; Cartiglia, N; Costa, M; Covarelli, R; Degano, A; Demaria, N; Finco, L; Kiani, B; Mariotti, C; Maselli, S; Migliore, E; Monaco, V; Monteil, E; Obertino, M M; Pacher, L; Pastrone, N; Pelliccioni, M; Pinna Angioni, G L; Ravera, F; Potenza, A; Romero, A; Ruspa, M; Sacchi, R; Solano, A; Staiano, A; Tamponi, U; Belforte, S; Candelise, V; Casarsa, M; Cossutti, F; Della Ricca, G; Gobbo, B; La Licata, C; Marone, M; Schizzi, A; Zanetti, A; Kropivnitskaya, T A; Nam, S K; Kim, D H; Kim, G N; Kim, M S; Kim, M S; Kong, D J; Lee, S; Oh, Y D; Sakharov, A; Son, D C; Brochero Cifuentes, J A; Kim, H; Kim, T J; Song, S; Choi, S; Go, Y; Gyun, D; Hong, B; Jo, M; Kim, H; Kim, Y; Lee, B; Lee, K; Lee, K S; Lee, S; Lee, S; Park, S K; Roh, Y; Yoo, H D; Choi, M; Kim, H; Kim, J H; Lee, J S H; Park, I C; Ryu, G; Ryu, M S; Choi, Y; Goh, J; Kim, D; Kwon, E; Lee, J; Yu, I; Juodagalvis, A; Vaitkus, J; Ahmed, I; Ibrahim, Z A; Komaragiri, J R; Md Ali, M A B; Mohamad Idris, F; Wan Abdullah, W A T; Yusli, M N; Wan Abdullah, W A T; Casimiro Linares, E; Castilla-Valdez, H; De La Cruz-Burelo, E; Heredia-De La Cruz, I; Hernandez-Almada, A; Lopez-Fernandez, R; Sanchez-Hernandez, A; Carrillo Moreno, S; Vazquez Valencia, F; Pedraza, I; Salazar Ibarguen, H A; Morelos Pineda, A; Krofcheck, D; Butler, P H; Ahmad, A; Ahmad, M; Hassan, Q; Hoorani, H R; Khan, W A; Khurshid, T; Shoaib, M; Bialkowska, H; Bluj, M; Boimska, B; Frueboes, T; Górski, M; Kazana, M; Nawrocki, K; Romanowska-Rybinska, K; Szleper, M; Zalewski, P; Brona, G; Bunkowski, K; Byszuk, A; Doroba, K; Kalinowski, A; Konecki, M; Krolikowski, J; Misiura, M; Olszewski, M; Walczak, M; Bargassa, P; Da Cruz E Silva, C Beir Ao; Di Francesco, A; Faccioli, P; Parracho, P G Ferreira; Gallinaro, M; Leonardo, N; Lloret Iglesias, L; Nguyen, F; Rodrigues Antunes, J; Seixas, J; Toldaiev, O; Vadruccio, D; Varela, J; Vischia, P; Afanasiev, S; Bunin, P; Gavrilenko, M; Golutvin, I; Gorbunov, I; Kamenev, A; Karjavin, V; Konoplyanikov, V; Lanev, A; Malakhov, A; Matveev, V; Moisenz, P; Palichik, V; Perelygin, V; Savina, M; Shmatov, S; Shulha, S; Smirnov, V; Zarubin, A; Golovtsov, V; Ivanov, Y; Kim, V; Kuznetsova, E; Levchenko, P; Murzin, V; Oreshkin, V; Smirnov, I; Sulimov, V; Uvarov, L; Vavilov, S; Vorobyev, A; Andreev, Yu; Dermenev, A; Gninenko, S; Golubev, N; Karneyeu, A; Kirsanov, M; Krasnikov, N; Pashenkov, A; Tlisov, D; Toropin, A; Epshteyn, V; Gavrilov, V; Lychkovskaya, N; Popov, V; Pozdnyakov, L; Safronov, G; Spiridonov, A; Vlasov, E; Zhokin, A; Bylinkin, A; Andreev, V; Azarkin, M; Dremin, I; Kirakosyan, M; Leonidov, A; Mesyats, G; Rusakov, S V; Baskakov, A; Belyaev, A; Boos, E; Bunichev, V; Dubinin, M; Dudko, L; Klyukhin, V; Kodolova, O; Korneeva, N; Lokhtin, I; Myagkov, I; Obraztsov, S; Perfilov, M; Petrushanko, S; Savrin, V; Azhgirey, I; Bayshev, I; Bitioukov, S; Kachanov, V; Kalinin, A; Konstantinov, D; Krychkine, V; Petrov, V; Ryutin, R; Sobol, A; Tourtchanovitch, L; Troshin, S; Tyurin, N; Uzunian, A; Volkov, A; Adzic, P; Milosevic, J; Rekovic, V; Alcaraz Maestre, J; Battilana, C; Calvo, E; Cerrada, M; Chamizo Llatas, M; Colino, N; De La Cruz, B; Delgado Peris, A; Domínguez Vázquez, D; Escalante Del Valle, A; Fernandez Bedoya, C; Ramos, J P Fernández; Flix, J; Fouz, M C; Garcia-Abia, P; Gonzalez Lopez, O; Goy Lopez, S; Hernandez, J M; Josa, M I; Navarro De Martino, E; Yzquierdo, A Pérez-Calero; Puerta Pelayo, J; Quintario Olmeda, A; Redondo, I; Romero, L; Santaolalla, J; Soares, M S; Albajar, C; de Trocóniz, J F; Missiroli, M; Moran, D; Cuevas, J; Fernandez Menendez, J; Folgueras, S; Gonzalez Caballero, I; Palencia Cortezon, E; Vizan Garcia, J M; Cabrillo, I J; Calderon, A; Castiñeiras De Saa, J R; De Castro Manzano, P; Duarte Campderros, J; Fernandez, M; Garcia-Ferrero, J; Gomez, G; Lopez Virto, A; Marco, J; Marco, R; Martinez Rivero, C; Matorras, F; Munoz Sanchez, F J; Piedra Gomez, J; Rodrigo, T; Rodríguez-Marrero, A Y; Ruiz-Jimeno, A; Scodellaro, L; Trevisani, N; Vila, I; Vilar Cortabitarte, R; Abbaneo, D; Auffray, E; Auzinger, G; Bachtis, M; Baillon, P; Ball, A H; Barney, D; Benaglia, A; Bendavid, J; Benhabib, L; Benitez, J F; Berruti, G M; Bloch, P; Bocci, A; Bonato, A; Botta, C; Breuker, H; Camporesi, T; Castello, R; Cerminara, G; D'Alfonso, M; d'Enterria, D; Dabrowski, A; Daponte, V; David, A; De Gruttola, M; De Guio, F; De Roeck, A; De Visscher, S; Di Marco, E; Dobson, M; Dordevic, M; Dorney, B; du Pree, T; Dünser, M; Dupont, N; Elliott-Peisert, A; Franzoni, G; Funk, W; Gigi, D; Gill, K; Giordano, D; Girone, M; Glege, F; Guida, R; Gundacker, S; Guthoff, M; Hammer, J; Harris, P; Hegeman, J; Innocente, V; Janot, P; Kirschenmann, H; Kortelainen, M J; Kousouris, K; Krajczar, K; Lecoq, P; Lourenço, C; Lucchini, M T; Magini, N; Malgeri, L; Mannelli, M; Martelli, A; Masetti, L; Meijers, F; Mersi, S; Meschi, E; Moortgat, F; Morovic, S; Mulders, M; Nemallapudi, M V; Neugebauer, H; Orfanelli, S; Orsini, L; Pape, L; Perez, E; Peruzzi, M; Petrilli, A; Petrucciani, G; Pfeiffer, A; Piparo, D; Racz, A; Rolandi, G; Rovere, M; Ruan, M; Sakulin, H; Schäfer, C; Schwick, C; Seidel, M; Sharma, A; Silva, P; Simon, M; Sphicas, P; Steggemann, J; Stieger, B; Stoye, M; Takahashi, Y; Treille, D; Triossi, A; Tsirou, A; Veres, G I; Wardle, N; Wöhri, H K; Zagozdzinska, A; Zeuner, W D; Bertl, W; Deiters, K; Erdmann, W; Horisberger, R; Ingram, Q; Kaestli, H C; Kotlinski, D; Langenegger, U; Renker, D; Rohe, T; Bachmair, F; Bäni, L; Bianchini, L; Casal, B; Dissertori, G; Dittmar, M; Donegà, M; Eller, P; Grab, C; Heidegger, C; Hits, D; Hoss, J; Kasieczka, G; Lustermann, W; Mangano, B; Marionneau, M; Martinez Ruiz Del Arbol, P; Masciovecchio, M; Meister, D; Micheli, F; Musella, P; Nessi-Tedaldi, F; Pandolfi, F; Pata, J; Pauss, F; Perrozzi, L; Quittnat, M; Rossini, M; Starodumov, A; Takahashi, M; Tavolaro, V R; Theofilatos, K; Wallny, R; Aarrestad, T K; Amsler, C; Caminada, L; Canelli, M F; Chiochia, V; De Cosa, A; Galloni, C; Hinzmann, A; Hreus, T; Kilminster, B; Lange, C; Ngadiuba, J; Pinna, D; Robmann, P; Ronga, F J; Salerno, D; Yang, Y; Cardaci, M; Chen, K H; Doan, T H; Jain, Sh; Khurana, R; Konyushikhin, M; Kuo, C M; Lin, W; Lu, Y J; Yu, S S; Kumar, Arun; Bartek, R; Chang, P; Chang, Y H; Chao, Y; Chen, K F; Chen, P H; Dietz, C; Fiori, F; Grundler, U; Hou, W-S; Hsiung, Y; Liu, Y F; Lu, R-S; Miñano Moya, M; Petrakou, E; Tsai, J F; Tzeng, Y M; Asavapibhop, B; Kovitanggoon, K; Singh, G; Srimanobhas, N; Suwonjandee, N; Adiguzel, A; Cerci, S; Demiroglu, Z S; Dozen, C; Dumanoglu, I; Girgis, S; Gokbulut, G; Guler, Y; Guler, Y; Gurpinar, E; Hos, I; Kangal, E E; Kayis Topaksu, A; Onengut, G; Ozdemir, K; Ozturk, S; Tali, B; Topakli, H; Vergili, M; Zorbilmez, C; Akin, I V; Bilin, B; Bilmis, S; Isildak, B; Karapinar, G; Yalvac, M; Zeyrek, M; Gülmez, E; Kaya, M; Kaya, O; Yetkin, E A; Yetkin, T; Cakir, A; Cankocak, K; Sen, S; Vardarlı, F I; Grynyov, B; Levchuk, L; Sorokin, P; Aggleton, R; Ball, F; Beck, L; Brooke, J J; Clement, E; Cussans, D; Flacher, H; Goldstein, J; Grimes, M; Heath, G P; Heath, H F; Jacob, J; Kreczko, L; Lucas, C; Meng, Z; Newbold, D M; Paramesvaran, S; Poll, A; Sakuma, T; Seif El Nasr-Storey, S; Senkin, S; Smith, D; Smith, V J; Bell, K W; Belyaev, A; Brew, C; Brown, R M; Calligaris, L; Cieri, D; Cockerill, D J A; Coughlan, J A; Harder, K; Harper, S; Olaiya, E; Petyt, D; Shepherd-Themistocleous, C H; Thea, A; Tomalin, I R; Williams, T; Womersley, W J; Worm, S D; Baber, M; Bainbridge, R; Buchmuller, O; Bundock, A; Burton, D; Casasso, S; Citron, M; Colling, D; Corpe, L; Cripps, N; Dauncey, P; Davies, G; De Wit, A; Della Negra, M; Dunne, P; Elwood, A; Elwood, A; Ferguson, W; Fulcher, J; Futyan, D; Hall, G; Iles, G; Kenzie, M; Lane, R; Lucas, R; Lyons, L; Magnan, A-M; Malik, S; Nash, J; Nikitenko, A; Pela, J; Pesaresi, M; Petridis, K; Raymond, D M; Richards, A; Rose, A; Seez, C; Tapper, A; Uchida, K; Vazquez Acosta, M; Virdee, T; Zenz, S C; Cole, J E; Hobson, P R; Khan, A; Kyberd, P; Leggat, D; Leslie, D; Reid, I D; Symonds, P; Teodorescu, L; Turner, M; Borzou, A; Call, K; Dittmann, J; Hatakeyama, K; Liu, H; Pastika, N; Scarborough, T; Wu, Z; Charaf, O; Cooper, S I; Henderson, C; Rumerio, P; Arcaro, D; Avetisyan, A; Bose, T; Fantasia, C; Gastler, D; Lawson, P; Rankin, D; Richardson, C; Rohlf, J; St John, J; Sulak, L; Zou, D; Alimena, J; Berry, E; Bhattacharya, S; Cutts, D; Dhingra, N; Ferapontov, A; Garabedian, A; Hakala, J; Heintz, U; Laird, E; Landsberg, G; Mao, Z; Narain, M; Piperov, S; Sagir, S; Syarif, R; Breedon, R; Breto, G; De La Barca Sanchez, M Calderon; Chauhan, S; Chertok, M; Conway, J; Conway, R; Cox, P T; Erbacher, R; Gardner, M; Ko, W; Lander, R; Mulhearn, M; Pellett, D; Pilot, J; Ricci-Tam, F; Shalhout, S; Smith, J; Squires, M; Stolp, D; Tripathi, M; Wilbur, S; Yohay, R; Cousins, R; Everaerts, P; Farrell, C; Hauser, J; Ignatenko, M; Saltzberg, D; Valuev, V; Weber, M; Burt, K; Clare, R; Ellison, J; Gary, J W; Hanson, G; Heilman, J; Ivova Paneva, M; Jandir, P; Kennedy, E; Lacroix, F; Long, O R; Luthra, A; Malberti, M; Negrete, M Olmedo; Shrinivas, A; Wei, H; Wimpenny, S; Yates, B R; Branson, J G; Cerati, G B; Cittolin, S; D'Agnolo, R T; Derdzinski, M; Holzner, A; Kelley, R; Klein, D; Letts, J; Macneill, I; Olivito, D; Padhi, S; Pieri, M; Sani, M; Sharma, V; Simon, S; Tadel, M; Tu, Y; Vartak, A; Wasserbaech, S; Welke, C; Würthwein, F; Yagil, A; Zevi Della Porta, G; Bradmiller-Feld, J; Campagnari, C; Dishaw, A; Dutta, V; Flowers, K; Franco Sevilla, M; Geffert, P; George, C; Golf, F; Gouskos, L; Gran, J; Incandela, J; Mccoll, N; Mullin, S D; Mullin, S D; Richman, J; Stuart, D; Suarez, I; West, C; Yoo, J; Anderson, D; Apresyan, A; Bornheim, A; Bunn, J; Chen, Y; Duarte, J; Mott, A; Newman, H B; Pena, C; Pierini, M; Spiropulu, M; Vlimant, J R; Xie, S; Zhu, R Y; Andrews, M B; Azzolini, V; Calamba, A; Carlson, B; Ferguson, T; Paulini, M; Russ, J; Sun, M; Vogel, H; Vorobiev, I; Cumalat, J P; Ford, W T; Gaz, A; Jensen, F; Johnson, A; Krohn, M; Mulholland, T; Nauenberg, U; Stenson, K; Wagner, S R; Alexander, J; Chatterjee, A; Chaves, J; Chu, J; Dittmer, S; Eggert, N; Mirman, N; Nicolas Kaufman, G; Patterson, J R; Rinkevicius, A; Ryd, A; Skinnari, L; Soffi, L; Sun, W; Tan, S M; Teo, W D; Thom, J; Thompson, J; Tucker, J; Weng, Y; Wittich, P; Abdullin, S; Albrow, M; Anderson, J; Apollinari, G; Banerjee, S; Bauerdick, L A T; Beretvas, A; Berryhill, J; Bhat, P C; Bolla, G; Burkett, K; Butler, J N; Cheung, H W K; Chlebana, F; Cihangir, S; Elvira, V D; Fisk, I; Freeman, J; Gottschalk, E; Gray, L; Green, D; Grünendahl, S; Gutsche, O; Hanlon, J; Hare, D; Harris, R M; Hasegawa, S; Hirschauer, J; Hu, Z; Jindariani, S; Johnson, M; Joshi, U; Jung, A W; Klima, B; Kreis, B; Kwan, S; Lammel, S; Linacre, J; Lincoln, D; Lipton, R; Liu, T; Lopes De Sá, R; Lykken, J; Maeshima, K; Marraffino, J M; Martinez Outschoorn, V I; Maruyama, S; Mason, D; McBride, P; Merkel, P; Mishra, K; Mrenna, S; Nahn, S; Newman-Holmes, C; O'Dell, V; Pedro, K; Prokofyev, O; Rakness, G; Sexton-Kennedy, E; Soha, A; Spalding, W J; Spiegel, L; Taylor, L; Tkaczyk, S; Tran, N V; Uplegger, L; Vaandering, E W; Vernieri, C; Verzocchi, M; Vidal, R; Weber, H A; Whitbeck, A; Yang, F; Acosta, D; Avery, P; Bortignon, P; Bourilkov, D; Carnes, A; Carver, M; Curry, D; Das, S; Di Giovanni, G P; Field, R D; Furic, I K; Gleyzer, S V; Hugon, J; Konigsberg, J; Korytov, A; Low, J F; Ma, P; Matchev, K; Mei, H; Milenovic, P; Mitselmakher, G; Rank, D; Rossin, R; Shchutska, L; Snowball, M; Sperka, D; Terentyev, N; Thomas, L; Wang, J; Wang, S; Yelton, J; Hewamanage, S; Linn, S; Markowitz, P; Martinez, G; Rodriguez, J L; Adams, J R; Ackert, A; Adams, T; Askew, A; Bochenek, J; Diamond, B; Haas, J; Hagopian, S; Hagopian, V; Johnson, K F; Khatiwada, A; Prosper, H; Weinberg, M; Baarmand, M M; Bhopatkar, V; Colafranceschi, S; Hohlmann, M; Kalakhety, H; Noonan, D; Roy, T; Yumiceva, F; Adams, M R; Apanasevich, L; Berry, D; Betts, R R; Bucinskaite, I; Cavanaugh, R; Evdokimov, O; Gauthier, L; Gerber, C E; Hofman, D J; Kurt, P; O'Brien, C; Sandoval Gonzalez, L D; Silkworth, C; Turner, P; Varelas, N; Wu, Z; Zakaria, M; Bilki, B; Clarida, W; Dilsiz, K; Durgut, S; Gandrajula, R P; Haytmyradov, M; Khristenko, V; Merlo, J-P; Mermerkaya, H; Mestvirishvili, A; Moeller, A; Nachtman, J; Ogul, H; Onel, Y; Ozok, F; Penzo, A; Snyder, C; Tiras, E; Wetzel, J; Yi, K; Anderson, I; Anderson, I; Barnett, B A; Blumenfeld, B; Eminizer, N; Fehling, D; Feng, L; Gritsan, A V; Maksimovic, P; Martin, C; Osherson, M; Roskes, J; Sady, A; Sarica, U; Swartz, M; Xiao, M; Xin, Y; You, C; Xiao, M; Baringer, P; Bean, A; Benelli, G; Bruner, C; Kenny, R P; Majumder, D; Majumder, D; Malek, M; Murray, M; Sanders, S; Stringer, R; Wang, Q; Ivanov, A; Kaadze, K; Khalil, S; Makouski, M; Maravin, Y; Mohammadi, A; Saini, L K; Skhirtladze, N; Toda, S; Lange, D; Rebassoo, F; Wright, D; Anelli, C; Baden, A; Baron, O; Belloni, A; Calvert, B; Eno, S C; Ferraioli, C; Gomez, J A; Hadley, N J; Jabeen, S; Jabeen, S; Kellogg, R G; Kolberg, T; Kunkle, J; Lu, Y; Mignerey, A C; Shin, Y H; Skuja, A; Tonjes, M B; Tonwar, S C; Apyan, A; Barbieri, R; Baty, A; Bierwagen, K; Brandt, S; Bierwagen, K; Busza, W; Cali, I A; Demiragli, Z; Di Matteo, L; Gomez Ceballos, G; Goncharov, M; Gulhan, D; Iiyama, Y; Innocenti, G M; Klute, M; Kovalskyi, D; Lai, Y S; Lee, Y-J; Levin, A; Luckey, P D; Marini, A C; Mcginn, C; Mironov, C; Narayanan, S; Niu, X; Paus, C; Ralph, D; Roland, C; Roland, G; Salfeld-Nebgen, J; Stephans, G S F; Sumorok, K; Varma, M; Velicanu, D; Veverka, J; Wang, J; Wang, T W; Wyslouch, B; Yang, M; Zhukova, V; Dahmes, B; Evans, A; Finkel, A; Gude, A; Hansen, P; Kalafut, S; Kao, S C; Klapoetke, K; Kubota, Y; Lesko, Z; Mans, J; Nourbakhsh, S; Ruckstuhl, N; Rusack, R; Tambe, N; Turkewitz, J; Acosta, J G; Oliveros, S; Avdeeva, E; Bloom, K; Bose, S; Claes, D R; Dominguez, A; Fangmeier, C; Gonzalez Suarez, R; Kamalieddin, R; Keller, J; Knowlton, D; Kravchenko, I; Meier, F; Monroy, J; Ratnikov, F; Siado, J E; Snow, G R; Alyari, M; Dolen, J; George, J; Godshalk, A; Harrington, C; Iashvili, I; Kaisen, J; Kharchilava, A; Kumar, A; Rappoccio, S; Roozbahani, B; Alverson, G; Barberis, E; Baumgartel, D; Chasco, M; Hortiangtham, A; Massironi, A; Morse, D M; Nash, D; Orimoto, T; Teixeira De Lima, R; Trocino, D; Wang, R-J; Wood, D; Zhang, J; Hahn, K A; Kubik, A; Mucia, N; Odell, N; Pollack, B; Pozdnyakov, A; Schmitt, M; Stoynev, S; Sung, K; Trovato, M; Velasco, M; Brinkerhoff, A; Dev, N; Hildreth, M; Jessop, C; Karmgard, D J; Kellams, N; Lannon, K; Lynch, S; Marinelli, N; Meng, F; Mueller, C; Musienko, Y; Pearson, T; Planer, M; Reinsvold, A; Ruchti, R; Smith, G; Taroni, S; Valls, N; Wayne, M; Wolf, M; Woodard, A; Antonelli, L; Brinson, J; Bylsma, B; Durkin, L S; Flowers, S; Hart, A; Hill, C; Hughes, R; Ji, W; Kotov, K; Ling, T Y; Liu, B; Luo, W; Puigh, D; Rodenburg, M; Winer, B L; Wulsin, H W; Driga, O; Elmer, P; Hardenbrook, J; Hebda, P; Koay, S A; Lujan, P; Marlow, D; Medvedeva, T; Mooney, M; Olsen, J; Palmer, C; Piroué, P; Saka, H; Stickland, D; Tully, C; Zuranski, A; Malik, S; Barnes, V E; Benedetti, D; Bortoletto, D; Gutay, L; Jha, M K; Jones, M; Jung, K; Miller, D H; Neumeister, N; Primavera, F; Radburn-Smith, B C; Shi, X; Shipsey, I; Silvers, D; Sun, J; Svyatkovskiy, A; Wang, F; Xie, W; Xu, L; Parashar, N; Stupak, J; Adair, A; Akgun, B; Chen, Z; Ecklund, K M; Geurts, F J M; Guilbaud, M; Li, W; Michlin, B; Northup, M; Padley, B P; Redjimi, R; Roberts, J; Rorie, J; Tu, Z; Zabel, J; Betchart, B; Bodek, A; de Barbaro, P; Demina, R; Eshaq, Y; Ferbel, T; Galanti, M; Galanti, M; Garcia-Bellido, A; Han, J; Harel, A; Hindrichs, O; Hindrichs, O; Khukhunaishvili, A; Petrillo, G; Tan, P; Verzetti, M; Arora, S; Barker, A; Chou, J P; Contreras-Campana, C; Contreras-Campana, E; Duggan, D; Ferencek, D; Gershtein, Y; Gray, R; Halkiadakis, E; Hidas, D; Hughes, E; Kaplan, S; Kunnawalkam Elayavalli, R; Lath, A; Nash, K; Panwalkar, S; Park, M; Salur, S; Schnetzer, S; Sheffield, D; Somalwar, S; Stone, R; Thomas, S; Thomassen, P; Walker, M; Foerster, M; Riley, G; Rose, K; Spanier, S; York, A; Bouhali, O; Castaneda Hernandez, A; Dalchenko, M; De Mattia, M; Delgado, A; Dildick, S; Dildick, S; Eusebi, R; Gilmore, J; Kamon, T; Krutelyov, V; Krutelyov, V; Mueller, R; Osipenkov, I; Pakhotin, Y; Patel, R; Patel, R; Perloff, A; Rose, A; Safonov, A; Tatarinov, A; Ulmer, K A; Akchurin, N; Cowden, C; Damgov, J; Dragoiu, C; Dudero, P R; Faulkner, J; Kunori, S; Lamichhane, K; Lee, S W; Libeiro, T; Undleeb, S; Volobouev, I; Appelt, E; Delannoy, A G; Greene, S; Gurrola, A; Janjam, R; Johns, W; Maguire, C; Mao, Y; Melo, A; Ni, H; Sheldon, P; Snook, B; Tuo, S; Velkovska, J; Xu, Q; Arenton, M W; Cox, B; Francis, B; Goodell, J; Hirosky, R; Ledovskoy, A; Li, H; Lin, C; Neu, C; Sinthuprasith, T; Sun, X; Wang, Y; Wolfe, E; Wood, J; Xia, F; Clarke, C; Harr, R; Karchin, P E; Kottachchi Kankanamge Don, C; Lamichhane, P; Sturdy, J; Belknap, D A; Carlsmith, D; Cepeda, M; Dasu, S; Dodd, L; Duric, S; Gomber, B; Grothe, M; Hall-Wilton, R; Herndon, M; Hervé, A; Klabbers, P; Lanaro, A; Levine, A; Long, K; Loveless, R; Mohapatra, A; Ojalvo, I; Perry, T; Pierro, G A; Polese, G; Ruggles, T; Sarangi, T; Savin, A; Sharma, A; Smith, N; Smith, W H; Taylor, D; Woods, N; Collaboration, Authorinst The Cms

    2016-01-01

    Jet multiplicity distributions in top quark pair ([Formula: see text]) events are measured in pp collisions at a centre-of-mass energy of 8 TeV with the CMS detector at the LHC using a data set corresponding to an integrated luminosity of 19.7[Formula: see text]. The measurement is performed in the dilepton decay channels ([Formula: see text], [Formula: see text], and [Formula: see text]). The absolute and normalized differential cross sections for [Formula: see text] production are measured as a function of the jet multiplicity in the event for different jet transverse momentum thresholds and the kinematic properties of the leading additional jets. The differential [Formula: see text] and [Formula: see text] cross sections are presented for the first time as a function of the kinematic properties of the leading additional [Formula: see text] jets. Furthermore, the fraction of events without additional jets above a threshold is measured as a function of the transverse momenta of the leading additional jets and the scalar sum of the transverse momenta of all additional jets. The data are compared and found to be consistent with predictions from several perturbative quantum chromodynamics event generators and a next-to-leading order calculation.

  10. Applications for cyber security - System and application monitoring

    SciTech Connect

    Marron, J. E.

    2006-07-01

    Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

  11. Effects of chronic job insecurity and change in job security on self reported health, minor psychiatric morbidity, physiological measures, and health related behaviours in British civil servants: the Whitehall II study

    PubMed Central

    Ferrie, J; Shipley, M; Stansfeld, S; Marmot, M

    2002-01-01

    Study objective: To determine the effect of chronic job insecurity and changes in job security on self reported health, minor psychiatric morbidity, physiological measures, and health related behaviours. Design: Self reported health, minor psychiatric morbidity, physiological measures, and health related behaviours were determined in 931 women and 2429 men who responded to a question on job insecurity in 1995/96 and again in 1997/99. Self reported health status, clinical screening measures, and health related behaviours for participants whose job security had changed or who remained insecure were compared with those whose jobs had remained secure. Setting: Prospective cohort study, Whitehall II, all participants were white collar office workers in the British Civil Service on entry to the study. Main results: Self reported morbidity was higher among participants who lost job security. Among those who gained job security residual negative effects, particularly in the psychological sphere were observed. Those exposed to chronic job insecurity had the highest self reported morbidity. Changes in the physiological measures were limited to an increase in blood pressure among women who lost job security and a decrease in body mass index among women reporting chronic job insecurity. There were no significant differences between any of the groups for alcohol over the recommended limits or smoking. Conclusion: Loss of job security has adverse effects on self reported health and minor psychiatric morbidity, which are not completely reversed by removal of the threat and which tend to increase with chronic exposure to the stressor. PMID:12011203

  12. Transit Timing Variation Measurements of WASP-12b and Qatar-1b: No Evidence Of Additional Planets

    NASA Astrophysics Data System (ADS)

    Collins, Karen A.; Kielkopf, John F.; Stassun, Keivan G.

    2017-02-01

    WASP-12b and Qatar-1b are transiting hot Jupiters for which previous works have suggested the presence of transit timing variations (TTVs) indicative of additional bodies in these systems—an Earth-mass planet in WASP-12 and a brown-dwarf mass object in Qatar-1. Here, we present 23 new WASP-12b and 18 new Qatar-1b complete (or nearly complete) transit observations. We perform global system fits to all of our light curves for each system, as well as RV and stellar spectroscopic parameters from the literature. The global fits provide refined system parameters and uncertainties for each system, including precise transit center times for each transit. The transit model residuals of the combined and five minute binned light curves have an rms of 183 and 255 parts per million (ppm) for WASP-12b and Qatar-1b, respectively. Most of the WASP-12b system parameter values from this work are consistent with values from previous studies, but have ∼40%–50% smaller uncertainties. Most of the Qatar-1b system parameter values and uncertainties from this work are consistent with values recently reported in the literature. We find no convincing evidence for sinusoidal TTVs with a semi-amplitude of more than ∼35 and ∼25 s in the WASP-12b and Qatar-1b systems, respectively.

  13. To amend the Immigration and Nationality Act to extend the authority of the Secretary of Homeland Security to waive certain requirements under the visa waiver program for an additional 2 years.

    THOMAS, 111th Congress

    Rep. Quigley, Mike [D-IL-5

    2009-06-18

    07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. 7 CFR 1738.22 - Loan security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 11 2011-01-01 2011-01-01 false Loan security. 1738.22 Section 1738.22 Agriculture... security. (a) RUS makes loans only if, in the judgment of the Administrator, the security therefore is...'s property and such additional security as RUS may require. If necessary, RUS will share in...

  15. The Additive Effects of Values Clarification Training to an Online Goal-Setting Procedure on Measures of Student Retention and Performance

    ERIC Educational Resources Information Center

    Chase, Jared A.

    2010-01-01

    The purpose of this study was to provide individuals with online tutorials to help participants generate strategies to achieve their academic goals and clarify their academic values to assess the additive effects of values clarification training to an online goal-setting training procedure on (1) measures of academic performance and (2) student…

  16. Food security in the context of HIV: towards harmonized definitions and indicators.

    PubMed

    Anema, Aranka; Fielden, Sarah J; Castleman, Tony; Grede, Nils; Heap, Amie; Bloem, Martin

    2014-10-01

    Integration of HIV and food security services is imperative to improving the health and well-being of people living with HIV. However, consensus does not exist on definitions and measures of food security to guide service delivery and evaluation in the context of HIV. This paper reviews definitions and indicators of food security used by key agencies; outlines their relevance in the context of HIV; highlights opportunities for harmonized monitoring and evaluation indicators; and discusses promising developments in data collection and management. In addition to the commonly used dimensions of food availability, access, utilization and stability, we identify three components of food security-food sufficiency, dietary quality, and food safety-that are useful for understanding and measuring food security needs of HIV-affected and other vulnerable people. Harmonization across agencies of food security indicators in the context of HIV offers opportunities to improve measurement and tracking, strengthen coordination, and inform evidence-based programming.

  17. The CSCE forum for security cooperation

    SciTech Connect

    Borawski, J.; George, B.

    1993-10-01

    What are the next steps for arms control in Europe, given the tectonic changes that have shaken the continent over the past four years? Negotiators in Europe, who labored for nearly two decades on the details of conventional force reductions and confidence-building measures, are grappling with that question. On September 22, 1992, a fresh, if perhaps belated, attempt to adapt to the new conditions of the post-Cold War era began in Vienna with the creation of the 54-member Forum for Security Cooperation (FSC). The FSC is the security component of the multifaceted Conference on Security and Cooperation in Europe (CSCEO), which deals with a range of issues, including human rights, in addition to the various items on the security agenda. The forum is facing a task unprecedented in the scope of the CSCE: it is simultaneously trying to address arms control negotiations, security enhancement and cooperation, and conflict prevention. The primary objective of the forum will be to adapt the traditional tools of arms control, including those applied to military activity, to the contemporary {open_quotes}security parlance{close_quotes} of preventive diplomacy, peacemaking, peacekeeping, peace enforcement and peace building.

  18. Telemedicine Security: A Systematic Review

    PubMed Central

    Garg, Vaibhav; Brewer, Jeffrey

    2011-01-01

    Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards. PMID:21722592

  19. Telemedicine security: a systematic review.

    PubMed

    Garg, Vaibhav; Brewer, Jeffrey

    2011-05-01

    Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards.

  20. Design of the national health security preparedness index.

    PubMed

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  1. The Cloud's Core Virtual Infrastructure Security

    NASA Astrophysics Data System (ADS)

    Tolnai, Annette; von Solms, Sebastiaan

    Cloud service providers (CSPs) should institute the necessary security controls, including restricting physical and logical access to hypervisor and other forms of employed virtualization layers. To enact relevant security measures, the core elements communicating with the hypervisor need to be secured. A proposed security model will introduce some of the aspects that need to be secured in the virtual environment to ensure a secure and sound cloud computing environment. This paper will discuss the core aspects of the virtualized architecture explaining the security risks, including a discussion pertaining to the relevant security core concepts to mitigate the risks.

  2. Physical Security

    SciTech Connect

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  3. Social Security.

    ERIC Educational Resources Information Center

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  4. School Security.

    ERIC Educational Resources Information Center

    Bete, Tim, Ed.

    1998-01-01

    Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…

  5. Food additives

    PubMed Central

    Spencer, Michael

    1974-01-01

    Food additives are discussed from the food technology point of view. The reasons for their use are summarized: (1) to protect food from chemical and microbiological attack; (2) to even out seasonal supplies; (3) to improve their eating quality; (4) to improve their nutritional value. The various types of food additives are considered, e.g. colours, flavours, emulsifiers, bread and flour additives, preservatives, and nutritional additives. The paper concludes with consideration of those circumstances in which the use of additives is (a) justified and (b) unjustified. PMID:4467857

  6. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against...

  7. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against...

  8. 30 CFR 250.1205 - Site security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 2 2011-07-01 2011-07-01 false Site security. 250.1205 Section 250.1205... Measurement, Surface Commingling, and Security § 250.1205 Site security. (a) What are the requirements for site security? You must: (1) Protect Federal production against production loss or theft; (2) Post...

  9. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against...

  10. 27 CFR 19.281 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Security. 19.281 Section... THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Construction, Equipment and Security § 19.281 Security. (a) General. The proprietor shall provide adequate security measures at the distilled spirits...

  11. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against...

  12. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1979-12-05

    The airline and airport security measures currently in effect continue to provide increased safety for airline passengers and crews as well as...107 governing airport security . other ongoing programs which contributed significantly to airport security included the training of law enforce- ment...officers supporting airport security programs and the explosives detection K(9 team program. Highlights of these actions and programs are summarized

  13. Need for a gender-sensitive human security framework: results of a quantitative study of human security and sexual violence in Djohong District, Cameroon

    PubMed Central

    2014-01-01

    Background Human security shifts traditional concepts of security from interstate conflict and the absence of war to the security of the individual. Broad definitions of human security include livelihoods and food security, health, psychosocial well-being, enjoyment of civil and political rights and freedom from oppression, and personal safety, in addition to absence of conflict. Methods In March 2010, we undertook a population-based health and livelihood study of female refugees from conflict-affected Central African Republic living in Djohong District, Cameroon and their female counterparts within the Cameroonian host community. Embedded within the survey instrument were indicators of human security derived from the Leaning-Arie model that defined three domains of psychosocial stability suggesting individuals and communities are most stable when their core attachments to home, community and the future are intact. Results While the female refugee human security outcomes describe a population successfully assimilated and thriving in their new environments based on these three domains, the ability of human security indicators to predict the presence or absence of lifetime and six-month sexual violence was inadequate. Using receiver operating characteristic (ROC) analysis, the study demonstrates that common human security indicators do not uncover either lifetime or recent prevalence of sexual violence. Conclusions These data suggest that current gender-blind approaches of describing human security are missing serious threats to the safety of one half of the population and that efforts to develop robust human security indicators should include those that specifically measure violence against women. PMID:24829613

  14. Camouflaging in Digital Image for Secure Communication

    NASA Astrophysics Data System (ADS)

    Jindal, B.; Singh, A. P.

    2013-06-01

    The present paper reports on a new type of camouflaging in digital image for hiding crypto-data using moderate bit alteration in the pixel. In the proposed method, cryptography is combined with steganography to provide a two layer security to the hidden data. The novelty of the algorithm proposed in the present work lies in the fact that the information about hidden bit is reflected by parity condition in one part of the image pixel. The remaining part of the image pixel is used to perform local pixel adjustment to improve the visual perception of the cover image. In order to examine the effectiveness of the proposed method, image quality measuring parameters are computed. In addition to this, security analysis is also carried by comparing the histograms of cover and stego images. This scheme provides a higher security as well as robustness to intentional as well as unintentional attacks.

  15. National Security Technology Incubator Action Plan

    SciTech Connect

    None, None

    2008-02-28

    This report documents the action plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). This action plan serves as a tool in measuring progress in the development process and delivery of services for the NSTI program. Continuous review and evaluation of the action plan is necessary in the development process of the NSTI. The action plan includes detailed steps in developing the NSTI program based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Included are tasks required to implement the NSTI, developed within a work breakdown structure. In addition, a timeline is identified for each task.

  16. Measurements of Water and B4C Content of Rackable Can Storage Boxes for HEU Storage at the HEUMF at the Y-12 National Security Complex

    SciTech Connect

    Neal, JS

    2003-03-24

    Extensive measurements at the Oak Ridge National Laboratory (ORNL) with BoroBond{trademark} blocks of varying thickness, natural boron carbide (B{sub 4}C) content, and water content, and with a simplified mockup of the Rackable Can Storage Box (RCSB) of fixed natural B{sub 4}C and water content, have led to a method of quantifying the water content of RCSBs by fast neutron time-of-flight transmission measurements (NMIS)* and quantifying the B{sub 4}C content with gamma ray spectrometry assuming the water content is known. The time-of-flight transmission measurements results can also be used to assess the uniformity of the BoroBond{trademark} in the RCSB. The data from both measurements will be stored for future comparisons to initial measurements. These methods can also be implemented at the RCSB production site, or subsequently at the Y-12 National Security Complex during the operating lifetime of the RCSBs at the Highly Enriched Uranium Materials Facility.

  17. Long-term measurement of gastric motility using passive telemetry and effect of guar and cellulose as food additives in dogs.

    PubMed

    Burger, D M; Wiestner, T; Montavon, P M; Kündig, H; Hubler, M; Binder, H; Arnold, S

    2006-03-01

    The suitability of passive telemetry for long-term measurements of gastric motility in two groups of dogs with different body weights, four Beagles and four Labrador Retrievers, was investigated. An intra-abdominal measuring device, with a pressure sensor and electrodes within the gastric wall, allowed the continuous recording of the intensity and frequency of contractions simultaneously with an electromyogram (EMG). In fasting dogs a typical inter-digestive motility cycle was reproducible. Within 15 min of feeding the integral of the pressure curve increased significantly, reaching its maximum 30-45 min post-prandially. The peak frequency also significantly increased immediately after feeding, reaching the maximum of 22 contractions per 5 min. The post-prandial motility patterns of the groups were significantly different. The pressure amplitudes of the Labradors were significantly higher and the peak frequencies significantly lower than the Beagles. The addition of guar to the food (2.5% or 5%) leads to a significant reduction of the intensity of the antral contractions, whereas the frequency was hardly affected. In comparison, the effect of cellulose, as a food additive (2.5% or 5%), was rather modest. The intensity of the post-prandial contractions, influenced by cellulose, was significantly increased in Beagles, but was decreased in Labradors. Passive telemetry has been proven to be a suitable method for the long-term investigation of the physiological gastric motility and the effect of food additives. The measuring device was still functional after removal 8 weeks later.

  18. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  19. The short- to medium-term predictive accuracy of static and dynamic risk assessment measures in a secure forensic hospital.

    PubMed

    Chu, Chi Meng; Thomas, Stuart D M; Ogloff, James R P; Daffern, Michael

    2013-04-01

    Although violence risk assessment knowledge and practice has advanced over the past few decades, it remains practically difficult to decide which measures clinicians should use to assess and make decisions about the violence potential of individuals on an ongoing basis, particularly in the short to medium term. Within this context, this study sought to compare the predictive accuracy of dynamic risk assessment measures for violence with static risk assessment measures over the short term (up to 1 month) and medium term (up to 6 months) in a forensic psychiatric inpatient setting. Results showed that dynamic measures were generally more accurate than static measures for short- to medium-term predictions of inpatient aggression. These findings highlight the necessity of using risk assessment measures that are sensitive to important clinical risk state variables to improve the short- to medium-term prediction of aggression within the forensic inpatient setting. Such knowledge can assist with the development of more accurate and efficient risk assessment procedures, including the selection of appropriate risk assessment instruments to manage and prevent the violence of offenders with mental illnesses during inpatient treatment.

  20. Secure PVM

    SciTech Connect

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  1. Assessment of the improvements in accuracy of aerosol characterization resulted from additions of polarimetric measurements to intensity-only observations using GRASP algorithm (Invited)

    NASA Astrophysics Data System (ADS)

    Dubovik, O.; Litvinov, P.; Lapyonok, T.; Herman, M.; Fedorenko, A.; Lopatin, A.; Goloub, P.; Ducos, F.; Aspetsberger, M.; Planer, W.; Federspiel, C.

    2013-12-01

    During last few years we were developing GRASP (Generalized Retrieval of Aerosol and Surface Properties) algorithm designed for the enhanced characterization of aerosol properties from spectral, multi-angular polarimetric remote sensing observations. The concept of GRASP essentially relies on the accumulated positive research heritage from previous remote sensing aerosol retrieval developments, in particular those from the AERONET and POLDER retrieval activities. The details of the algorithm are described by Dubovik et al. (Atmos. Meas. Tech., 4, 975-1018, 2011). The GRASP retrieves properties of both aerosol and land surface reflectance in cloud-free environments. It is based on highly advanced statistically optimized fitting and deduces nearly 50 unknowns for each observed site. The algorithm derives a similar set of aerosol parameters as AERONET including detailed particle size distribution, the spectrally dependent the complex index of refraction and the fraction of non-spherical particles. The algorithm uses detailed aerosol and surface models and fully accounts for all multiple interactions of scattered solar light with aerosol, gases and the underlying surface. All calculations are done on-line without using traditional look-up tables. In addition, the algorithm uses the new multi-pixel retrieval concept - a simultaneous fitting of a large group of pixels with additional constraints limiting the time variability of surface properties and spatial variability of aerosol properties. This principle is expected to result in higher consistency and accuracy of aerosol products compare to conventional approaches especially over bright surfaces where information content of satellite observations in respect to aerosol properties is limited. The GRASP is a highly versatile algorithm that allows input from both satellite and ground-based measurements. It also has essential flexibility in measurement processing. For example, if observation data set includes spectral

  2. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    ERIC Educational Resources Information Center

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  3. Measuring the Immeasurable: An Approach to Assessing the Effectiveness of Engineering Civic Assistance Projects Towards Achieving National Security Objectives

    DTIC Science & Technology

    2015-06-12

    wider audiences. I am indebted to my entire committee for their patience as I, at times, seemed to meander through this process to complete the “air...effectiveness or measure of performance.”20 Output: “A final product or service delivered by a program or project to beneficiaries, such as goods...

  4. The Short- to Medium-Term Predictive Accuracy of Static and Dynamic Risk Assessment Measures in a Secure Forensic Hospital

    ERIC Educational Resources Information Center

    Chu, Chi Meng; Thomas, Stuart D. M.; Ogloff, James R. P.; Daffern, Michael

    2013-01-01

    Although violence risk assessment knowledge and practice has advanced over the past few decades, it remains practically difficult to decide which measures clinicians should use to assess and make decisions about the violence potential of individuals on an ongoing basis, particularly in the short to medium term. Within this context, this study…

  5. Security Detail.

    ERIC Educational Resources Information Center

    Epstein, Marc A.

    2003-01-01

    Describes problems of maintaining discipline and security at Jamaica High School in Queens, New York. Argues that court decisions and school regulations have allowed minority of aggressive and disruptive students to destabilize the learning environment. (PKP)

  6. Secure portal.

    SciTech Connect

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal

  7. Food additives

    MedlinePlus

    ... or natural. Natural food additives include: Herbs or spices to add flavor to foods Vinegar for pickling ... Certain colors improve the appearance of foods. Many spices, as well as natural and man-made flavors, ...

  8. [Food security in Mexico].

    PubMed

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  9. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1981-11-09

    which have been prevented or deterred by airline and airport security procedures cannot be determined with certainty. The Federal Aviation Administration...finalized and issued. The new FAR Part 108, Air Carrier Security and complementary changes to FAR Part 107, Airport Security , and FAR Part 129, Operations...initiated audit of the claims and, if verified, action will be taken to seek funding for payment. Airport Security . Airport security measures continue to be

  10. Measurement of [Formula: see text] production with a veto on additional central jet activity in pp collisions at [Formula: see text] TeV using the ATLAS detector.

    PubMed

    Aad, G; Abbott, B; Abdallah, J; Abdel Khalek, S; Abdelalim, A A; Abdesselam, A; Abdinov, O; Abi, B; Abolins, M; AbouZeid, O S; Abramowicz, H; Abreu, H; Acerbi, E; Acharya, B S; Adamczyk, L; Adams, D L; Addy, T N; Adelman, J; Aderholz, M; Adomeit, S; Adragna, P; Adye, T; Aefsky, S; Aguilar-Saavedra, J A; Aharrouche, M; Ahlen, S P; Ahles, F; Ahmad, A; Ahsan, M; Aielli, G; Akdogan, T; Åkesson, T P A; Akimoto, G; Akimov, A V; Akiyama, A; Alam, M S; Alam, M A; Albert, J; Albrand, S; Aleksa, M; Aleksandrov, I N; Alessandria, F; Alexa, C; Alexander, G; Alexandre, G; Alexopoulos, T; Alhroob, M; Aliev, M; Alimonti, G; Alison, J; Aliyev, M; Allbrooke, B M M; Allport, P P; Allwood-Spiers, S E; Almond, J; Aloisio, A; Alon, R; Alonso, A; Alvarez Gonzalez, B; Alviggi, M G; Amako, K; Amaral, P; Amelung, C; Ammosov, V V; Amorim, A; Amorós, G; Amram, N; Anastopoulos, C; Ancu, L S; Andari, N; Andeen, T; Anders, C F; Anders, G; Anderson, K J; Andreazza, A; Andrei, V; Andrieux, M-L; Anduaga, X S; Angerami, A; Anghinolfi, F; Anisenkov, A; Anjos, N; Annovi, A; Antonaki, A; Antonelli, M; Antonov, A; Antos, J; Anulli, F; Aoun, S; Aperio Bella, L; Apolle, R; Arabidze, G; Aracena, I; Arai, Y; Arce, A T H; Arfaoui, S; Arguin, J-F; Arik, E; Arik, M; Armbruster, A J; Arnaez, O; Arnal, V; Arnault, C; Artamonov, A; Artoni, G; Arutinov, D; Asai, S; Asfandiyarov, R; Ask, S; Åsman, B; Asquith, L; Assamagan, K; Astbury, A; Aubert, B; Auge, E; Augsten, K; Aurousseau, M; Avolio, G; Avramidou, R; Axen, D; Ay, C; Azuelos, G; Azuma, Y; Baak, M A; Baccaglioni, G; Bacci, C; Bach, A M; Bachacou, H; Bachas, K; Backes, M; Backhaus, M; Badescu, E; Bagnaia, P; Bahinipati, S; Bai, Y; Bailey, D C; Bain, T; Baines, J T; Baker, O K; Baker, M D; Baker, S; Banas, E; Banerjee, P; Banerjee, Sw; Banfi, D; Bangert, A; Bansal, V; Bansil, H S; Barak, L; Baranov, S P; Barashkou, A; Barbaro Galtieri, A; Barber, T; Barberio, E L; Barberis, D; Barbero, M; Bardin, D Y; Barillari, T; Barisonzi, M; Barklow, T; Barlow, N; Barnett, B M; Barnett, R M; Baroncelli, A; Barone, G; Barr, A J; Barreiro, F; Barreiro Guimarães da Costa, J; Barrillon, P; Bartoldus, R; Barton, A E; Bartsch, V; Bates, R L; Batkova, L; Batley, J R; Battaglia, A; Battistin, M; Bauer, F; Bawa, H S; Beale, S; Beau, T; Beauchemin, P H; Beccherle, R; Bechtle, P; Beck, H P; Becker, S; Beckingham, M; Becks, K H; Beddall, A J; Beddall, A; Bedikian, S; Bednyakov, V A; Bee, C P; Begel, M; Behar Harpaz, S; Behera, P K; Beimforde, M; Belanger-Champagne, C; Bell, P J; Bell, W H; Bella, G; Bellagamba, L; Bellina, F; Bellomo, M; Belloni, A; Beloborodova, O; Belotskiy, K; Beltramello, O; Benary, O; Benchekroun, D; Bendel, M; Bendtz, K; Benekos, N; Benhammou, Y; Benhar Noccioli, E; Benitez Garcia, J A; Benjamin, D P; Benoit, M; Bensinger, J R; Benslama, K; Bentvelsen, S; Berge, D; Bergeaas Kuutmann, E; Berger, N; Berghaus, F; Berglund, E; Beringer, J; Bernat, P; Bernhard, R; Bernius, C; Berry, T; Bertella, C; Bertin, A; Bertinelli, F; Bertolucci, F; Besana, M I; Besson, N; Bethke, S; Bhimji, W; Bianchi, R M; Bianco, M; Biebel, O; Bieniek, S P; Bierwagen, K; Biesiada, J; Biglietti, M; Bilokon, H; Bindi, M; Binet, S; Bingul, A; Bini, C; Biscarat, C; Bitenc, U; Black, K M; Blair, R E; Blanchard, J-B; Blanchot, G; Blazek, T; Blocker, C; Blocki, J; Blondel, A; Blum, W; Blumenschein, U; Bobbink, G J; Bobrovnikov, V B; Bocchetta, S S; Bocci, A; Boddy, C R; Boehler, M; Boek, J; Boelaert, N; Bogaerts, J A; Bogdanchikov, A; Bogouch, A; Bohm, C; Bohm, J; Boisvert, V; Bold, T; Boldea, V; Bolnet, N M; Bomben, M; Bona, M; Bondarenko, V G; Bondioli, M; Boonekamp, M; Booth, C N; Bordoni, S; Borer, C; Borisov, A; Borissov, G; Borjanovic, I; Borri, M; Borroni, S; Bortolotto, V; Bos, K; Boscherini, D; Bosman, M; Boterenbrood, H; Botterill, D; Bouchami, J; Boudreau, J; Bouhova-Thacker, E V; Boumediene, D; Bourdarios, C; Bousson, N; Boveia, A; Boyd, J; Boyko, I R; Bozhko, N I; Bozovic-Jelisavcic, I; Bracinik, J; Braem, A; Branchini, P; Brandenburg, G W; Brandt, A; Brandt, G; Brandt, O; Bratzler, U; Brau, B; Brau, J E; Braun, H M; Brelier, B; Bremer, J; Brendlinger, K; Brenner, R; Bressler, S; Britton, D; Brochu, F M; Brock, I; Brock, R; Brodbeck, T J; Brodet, E; Broggi, F; Bromberg, C; Bronner, J; Brooijmans, G; Brooks, W K; Brown, G; Brown, H; Bruckman de Renstrom, P A; Bruncko, D; Bruneliere, R; Brunet, S; Bruni, A; Bruni, G; Bruschi, M; Buanes, T; Buat, Q; Bucci, F; Buchanan, J; Buchanan, N J; Buchholz, P; Buckingham, R M; Buckley, A G; Buda, S I; Budagov, I A; Budick, B; Büscher, V; Bugge, L; Bulekov, O; Bundock, A C; Bunse, M; Buran, T; Burckhart, H; Burdin, S; Burgess, T; Burke, S; Busato, E; Bussey, P; Buszello, C P; Butin, F; Butler, B; Butler, J M; Buttar, C M; Butterworth, J M; Buttinger, W; Cabrera Urbán, S; Caforio, D; Cakir, O; Calafiura, P; Calderini, G; Calfayan, P; Calkins, R; Caloba, L P; Caloi, R; Calvet, D; Calvet, S; Camacho Toro, R; Camarri, P; Cambiaghi, M; Cameron, D; Caminada, L M; Campana, S; Campanelli, M; Canale, V; Canelli, F; Canepa, A; Cantero, J; Capasso, L; Capeans Garrido, M D M; Caprini, I; Caprini, M; Capriotti, D; Capua, M; Caputo, R; Cardarelli, R; Carli, T; Carlino, G; Carminati, L; Caron, B; Caron, S; Carquin, E; Carrillo Montoya, G D; Carter, A A; Carter, J R; Carvalho, J; Casadei, D; Casado, M P; Cascella, M; Caso, C; Castaneda Hernandez, A M; Castaneda-Miranda, E; Castillo Gimenez, V; Castro, N F; Cataldi, G; Catastini, P; Catinaccio, A; Catmore, J R; Cattai, A; Cattani, G; Caughron, S; Cauz, D; Cavalleri, P; Cavalli, D; Cavalli-Sforza, M; Cavasinni, V; Ceradini, F; Cerqueira, A S; Cerri, A; Cerrito, L; Cerutti, F; Cetin, S A; Cevenini, F; Chafaq, A; Chakraborty, D; Chalupkova, I; Chan, K; Chapleau, B; Chapman, J D; Chapman, J W; Chareyre, E; Charlton, D G; Chavda, V; Chavez Barajas, C A; Cheatham, S; Chekanov, S; Chekulaev, S V; Chelkov, G A; Chelstowska, M A; Chen, C; Chen, H; Chen, S; Chen, T; Chen, X; Cheng, S; Cheplakov, A; Chepurnov, V F; Cherkaoui El Moursli, R; Chernyatin, V; Cheu, E; Cheung, S L; Chevalier, L; Chiefari, G; Chikovani, L; Childers, J T; Chilingarov, A; Chiodini, G; Chisholm, A S; Chislett, R T; Chizhov, M V; Choudalakis, G; Chouridou, S; Christidi, I A; Christov, A; Chromek-Burckhart, D; Chu, M L; Chudoba, J; Ciapetti, G; Ciftci, A K; Ciftci, R; Cinca, D; Cindro, V; Ciocca, C; Ciocio, A; Cirilli, M; Citterio, M; Ciubancan, M; Clark, A; Clark, P J; Cleland, W; Clemens, J C; Clement, B; Clement, C; Clifft, R W; Coadou, Y; Cobal, M; Coccaro, A; Cochran, J; Coe, P; Cogan, J G; Coggeshall, J; Cogneras, E; Colas, J; Colijn, A P; Collins, N J; Collins-Tooth, C; Collot, J; Colon, G; Conde Muiño, P; Coniavitis, E; Conidi, M C; Consonni, M; Consonni, S M; Consorti, V; Constantinescu, S; Conta, C; Conti, G; Conventi, F; Cook, J; Cooke, M; Cooper, B D; Cooper-Sarkar, A M; Copic, K; Cornelissen, T; Corradi, M; Corriveau, F; Cortes-Gonzalez, A; Cortiana, G; Costa, G; Costa, M J; Costanzo, D; Costin, T; Côté, D; Courneyea, L; Cowan, G; Cowden, C; Cox, B E; Cranmer, K; Crescioli, F; Cristinziani, M; Crosetti, G; Crupi, R; Crépé-Renaudin, S; Cuciuc, C-M; Cuenca Almenar, C; Cuhadar Donszelmann, T; Curatolo, M; Curtis, C J; Cuthbert, C; Cwetanski, P; Czirr, H; Czodrowski, P; Czyczula, Z; D'Auria, S; D'Onofrio, M; D'Orazio, A; Da Silva, P V M; Da Via, C; Dabrowski, W; Dafinca, A; Dai, T; Dallapiccola, C; Dam, M; Dameri, M; Damiani, D S; Danielsson, H O; Dannheim, D; Dao, V; Darbo, G; Darlea, G L; Davey, W; Davidek, T; Davidson, N; Davidson, R; Davies, E; Davies, M; Davison, A R; Davygora, Y; Dawe, E; Dawson, I; Dawson, J W; Daya-Ishmukhametova, R K; De, K; de Asmundis, R; De Castro, S; De Castro Faria Salgado, P E; De Cecco, S; de Graat, J; De Groot, N; de Jong, P; De La Taille, C; De la Torre, H; De Lotto, B; de Mora, L; De Nooij, L; De Pedis, D; De Salvo, A; De Sanctis, U; De Santo, A; De Vivie De Regie, J B; De Zorzi, G; Dean, S; Dearnaley, W J; Debbe, R; Debenedetti, C; Dechenaux, B; Dedovich, D V; Degenhardt, J; Del Papa, C; Del Peso, J; Del Prete, T; Delemontex, T; Deliyergiyev, M; Dell'Acqua, A; Dell'Asta, L; Della Pietra, M; Della Volpe, D; Delmastro, M; Delruelle, N; Delsart, P A; Deluca, C; Demers, S; Demichev, M; Demirkoz, B; Deng, J; Denisov, S P; Derendarz, D; Derkaoui, J E; Derue, F; Dervan, P; Desch, K; Devetak, E; Deviveiros, P O; Dewhurst, A; DeWilde, B; Dhaliwal, S; Dhullipudi, R; Di Ciaccio, A; Di Ciaccio, L; Di Girolamo, A; Di Girolamo, B; Di Luise, S; Di Mattia, A; Di Micco, B; Di Nardo, R; Di Simone, A; Di Sipio, R; Diaz, M A; Diblen, F; Diehl, E B; Dietrich, J; Dietzsch, T A; Diglio, S; Dindar Yagci, K; Dingfelder, J; Dionisi, C; Dita, P; Dita, S; Dittus, F; Djama, F; Djobava, T; do Vale, M A B; Do Valle Wemans, A; Doan, T K O; Dobbs, M; Dobinson, R; Dobos, D; Dobson, E; Dodd, J; Doglioni, C; Doherty, T; Doi, Y; Dolejsi, J; Dolenc, I; Dolezal, Z; Dolgoshein, B A; Dohmae, T; Donadelli, M; Donega, M; Donini, J; Dopke, J; Doria, A; Dos Anjos, A; Dosil, M; Dotti, A; Dova, M T; Doxiadis, A D; Doyle, A T; Drasal, Z; Drees, J; Dressnandt, N; Drevermann, H; Driouichi, C; Dris, M; Dubbert, J; Dube, S; Duchovni, E; Duckeck, G; Dudarev, A; Dudziak, F; Dührssen, M; Duerdoth, I P; Duflot, L; Dufour, M-A; Dunford, M; Duran Yildiz, H; Duxfield, R; Dwuznik, M; Dydak, F; Düren, M; Ebenstein, W L; Ebke, J; Eckweiler, S; Edmonds, K; Edwards, C A; Edwards, N C; Ehrenfeld, W; Ehrich, T; Eifert, T; Eigen, G; Einsweiler, K; Eisenhandler, E; Ekelof, T; El Kacimi, M; Ellert, M; Elles, S; Ellinghaus, F; Ellis, K; Ellis, N; Elmsheuser, J; Elsing, M; Emeliyanov, D; Engelmann, R; Engl, A; Epp, B; Eppig, A; Erdmann, J; Ereditato, A; Eriksson, D; Ernst, J; Ernst, M; Ernwein, J; Errede, D; Errede, S; Ertel, E; Escalier, M; Escobar, C; Espinal Curull, X; Esposito, B; Etienne, F; Etienvre, A I; Etzion, E; Evangelakou, D; Evans, H; Fabbri, L; Fabre, C; Fakhrutdinov, R M; Falciano, S; Fang, Y; Fanti, M; Farbin, A; Farilla, A; Farley, J; Farooque, T; Farrell, S; Farrington, S M; Farthouat, P; Fassnacht, P; Fassouliotis, D; Fatholahzadeh, B; Favareto, A; Fayard, L; Fazio, S; Febbraro, R; Federic, P; Fedin, O L; Fedorko, W; Fehling-Kaschek, M; Feligioni, L; Fellmann, D; Feng, C; Feng, E J; Fenyuk, A B; Ferencei, J; Ferland, J; Fernando, W; Ferrag, S; Ferrando, J; Ferrara, V; Ferrari, A; Ferrari, P; Ferrari, R; Ferreira de Lima, D E; Ferrer, A; Ferrer, M L; Ferrere, D; Ferretti, C; Ferretto Parodi, A; Fiascaris, M; Fiedler, F; Filipčič, A; Filippas, A; Filthaut, F; Fincke-Keeler, M; Fiolhais, M C N; Fiorini, L; Firan, A; Fischer, G; Fischer, P; Fisher, M J; Flechl, M; Fleck, I; Fleckner, J; Fleischmann, P; Fleischmann, S; Flick, T; Floderus, A; Flores Castillo, L R; Flowerdew, M J; Fokitis, M; Fonseca Martin, T; Forbush, D A; Formica, A; Forti, A; Fortin, D; Foster, J M; Fournier, D; Foussat, A; Fowler, A J; Fowler, K; Fox, H; Francavilla, P; Franchino, S; Francis, D; Frank, T; Franklin, M; Franz, S; Fraternali, M; Fratina, S; French, S T; Friedrich, C; Friedrich, F; Froeschl, R; Froidevaux, D; Frost, J A; Fukunaga, C; Fullana Torregrosa, E; Fulsom, B G; Fuster, J; Gabaldon, C; Gabizon, O; Gadfort, T; Gadomski, S; Gagliardi, G; Gagnon, P; Galea, C; Gallas, E J; Gallo, V; Gallop, B J; Gallus, P; Gan, K K; Gao, Y S; Gapienko, V A; Gaponenko, A; Garberson, F; Garcia-Sciveres, M; García, C; García Navarro, J E; Gardner, R W; Garelli, N; Garitaonandia, H; Garonne, V; Garvey, J; Gatti, C; Gaudio, G; Gaur, B; Gauthier, L; Gauzzi, P; Gavrilenko, I L; Gay, C; Gaycken, G; Gayde, J-C; Gazis, E N; Ge, P; Gecse, Z; Gee, C N P; Geerts, D A A; Geich-Gimbel, Ch; Gellerstedt, K; Gemme, C; Gemmell, A; Genest, M H; Gentile, S; George, M; George, S; Gerlach, P; Gershon, A; Geweniger, C; Ghazlane, H; Ghodbane, N; Giacobbe, B; Giagu, S; Giakoumopoulou, V; Giangiobbe, V; Gianotti, F; Gibbard, B; Gibson, A; Gibson, S M; Gilbert, L M; Gilewsky, V; Gillberg, D; Gillman, A R; Gingrich, D M; Ginzburg, J; Giokaris, N; Giordani, M P; Giordano, R; Giorgi, F M; Giovannini, P; Giraud, P F; Giugni, D; Giunta, M; Giusti, P; Gjelsten, B K; Gladilin, L K; Glasman, C; Glatzer, J; Glazov, A; Glitza, K W; Glonti, G L; Goddard, J R; Godfrey, J; Godlewski, J; Goebel, M; Göpfert, T; Goeringer, C; Gössling, C; Göttfert, T; Goldfarb, S; Golling, T; Gomes, A; Gomez Fajardo, L S; Gonçalo, R; Goncalves Pinto Firmino Da Costa, J; Gonella, L; Gonidec, A; Gonzalez, S; González de la Hoz, S; Gonzalez Parra, G; Gonzalez Silva, M L; Gonzalez-Sevilla, S; Goodson, J J; Goossens, L; Gorbounov, P A; Gordon, H A; Gorelov, I; Gorfine, G; Gorini, B; Gorini, E; Gorišek, A; Gornicki, E; Goryachev, V N; Gosdzik, B; Goshaw, A T; Gosselink, M; Gostkin, M I; Gough Eschrich, I; Gouighri, M; Goujdami, D; Goulette, M P; Goussiou, A G; Goy, C; Gozpinar, S; Grabowska-Bold, I; Grafström, P; Grahn, K-J; Grancagnolo, F; Grancagnolo, S; Grassi, V; Gratchev, V; Grau, N; Gray, H M; Gray, J A; Graziani, E; Grebenyuk, O G; Greenshaw, T; Greenwood, Z D; Gregersen, K; Gregor, I M; Grenier, P; Griffiths, J; Grigalashvili, N; Grillo, A A; Grinstein, S; Grishkevich, Y V; Grivaz, J-F; Gross, E; Grosse-Knetter, J; Groth-Jensen, J; Grybel, K; Guarino, V J; Guest, D; Guicheney, C; Guida, A; Guindon, S; Guler, H; Gunther, J; Guo, B; Guo, J; Gupta, A; Gusakov, Y; Gushchin, V N; Gutierrez, P; Guttman, N; Gutzwiller, O; Guyot, C; Gwenlan, C; Gwilliam, C B; Haas, A; Haas, S; Haber, C; Hadavand, H K; Hadley, D R; Haefner, P; Hahn, F; Haider, S; Hajduk, Z; Hakobyan, H; Hall, D; Haller, J; Hamacher, K; Hamal, P; Hamer, M; Hamilton, A; Hamilton, S; Han, H; Han, L; Hanagaki, K; Hanawa, K; Hance, M; Handel, C; Hanke, P; Hansen, J R; Hansen, J B; Hansen, J D; Hansen, P H; Hansson, P; Hara, K; Hare, G A; Harenberg, T; Harkusha, S; Harper, D; Harrington, R D; Harris, O M; Harrison, K; Hartert, J; Hartjes, F; Haruyama, T; Harvey, A; Hasegawa, S; Hasegawa, Y; Hassani, S; Hatch, M; Hauff, D; Haug, S; Hauschild, M; Hauser, R; Havranek, M; Hawes, B M; Hawkes, C M; Hawkings, R J; Hawkins, A D; Hawkins, D; Hayakawa, T; Hayashi, T; Hayden, D; Hayward, H S; Haywood, S J; Hazen, E; He, M; Head, S J; Hedberg, V; Heelan, L; Heim, S; Heinemann, B; Heisterkamp, S; Helary, L; Heller, C; Heller, M; Hellman, S; Hellmich, D; Helsens, C; Henderson, R C W; Henke, M; Henrichs, A; Henriques Correia, A M; Henrot-Versille, S; Henry-Couannier, F; Hensel, C; Henß, T; Hernandez, C M; Hernández Jiménez, Y; Herrberg, R; Herten, G; Hertenberger, R; Hervas, L; Hesketh, G G; Hessey, N P; Higón-Rodriguez, E; Hill, D; Hill, J C; Hill, N; Hiller, K H; Hillert, S; Hillier, S J; Hinchliffe, I; Hines, E; Hirose, M; Hirsch, F; Hirschbuehl, D; Hobbs, J; Hod, N; Hodgkinson, M C; Hodgson, P; Hoecker, A; Hoeferkamp, M R; Hoffman, J; Hoffmann, D; Hohlfeld, M; Holder, M; Holmgren, S O; Holy, T; Holzbauer, J L; Homma, Y; Hong, T M; Hooft van Huysduynen, L; Horazdovsky, T; Horn, C; Horner, S; Hostachy, J-Y; Hou, S; Houlden, M A; Hoummada, A; Howarth, J; Howell, D F; Hristova, I; Hrivnac, J; Hruska, I; Hryn'ova, T; Hsu, P J; Hsu, S-C; Huang, G S; Hubacek, Z; Hubaut, F; Huegging, F; Huettmann, A; Huffman, T B; Hughes, E W; Hughes, G; Hughes-Jones, R E; Huhtinen, M; Hurst, P; Hurwitz, M; Husemann, U; Huseynov, N; Huston, J; Huth, J; Iacobucci, G; Iakovidis, G; Ibbotson, M; Ibragimov, I; Ichimiya, R; Iconomidou-Fayard, L; Idarraga, J; Iengo, P; Igonkina, O; Ikegami, Y; Ikeno, M; Ilchenko, Y; Iliadis, D; Ilic, N; Imori, M; Ince, T; Inigo-Golfin, J; Ioannou, P; Iodice, M; Iordanidou, K; Ippolito, V; Irles Quiles, A; Isaksson, C; Ishikawa, A; Ishino, M; Ishmukhametov, R; Issever, C; Istin, S; Ivashin, A V; Iwanski, W; Iwasaki, H; Izen, J M; Izzo, V; Jackson, B; Jackson, J N; Jackson, P; Jaekel, M R; Jain, V; Jakobs, K; Jakobsen, S; Jakubek, J; Jana, D K; Jansen, E; Jansen, H; Jantsch, A; Janus, M; Jarlskog, G; Jeanty, L; Jelen, K; Jen-La Plante, I; Jenni, P; Jeremie, A; Jež, P; Jézéquel, S; Jha, M K; Ji, H; Ji, W; Jia, J; Jiang, Y; Jimenez Belenguer, M; Jin, G; Jin, S; Jinnouchi, O; Joergensen, M D; Joffe, D; Johansen, L G; Johansen, M; Johansson, K E; Johansson, P; Johnert, S; Johns, K A; Jon-And, K; Jones, G; Jones, R W L; Jones, T W; Jones, T J; Jonsson, O; Joram, C; Jorge, P M; Joseph, J; Joshi, K D; Jovicevic, J; Jovin, T; Ju, X; Jung, C A; Jungst, R M; Juranek, V; Jussel, P; Juste Rozas, A; Kabachenko, V V; Kabana, S; Kaci, M; Kaczmarska, A; Kadlecik, P; Kado, M; Kagan, H; Kagan, M; Kaiser, S; Kajomovitz, E; Kalinin, S; Kalinovskaya, L V; Kama, S; Kanaya, N; Kaneda, M; Kaneti, S; Kanno, T; Kantserov, V A; Kanzaki, J; Kaplan, B; Kapliy, A; Kaplon, J; Kar, D; Karagounis, M; Karagoz, M; Karnevskiy, M; Kartvelishvili, V; Karyukhin, A N; Kashif, L; Kasieczka, G; Kass, R D; Kastanas, A; Kataoka, M; Kataoka, Y; Katsoufis, E; Katzy, J; Kaushik, V; Kawagoe, K; Kawamoto, T; Kawamura, G; Kayl, M S; Kazanin, V A; Kazarinov, M Y; Keeler, R; Kehoe, R; Keil, M; Kekelidze, G D; Keller, J S; Kennedy, J; Kenyon, M; Kepka, O; Kerschen, N; Kerševan, B P; Kersten, S; Kessoku, K; Keung, J; Khalil-Zada, F; Khandanyan, H; Khanov, A; Kharchenko, D; Khodinov, A; Kholodenko, A G; Khomich, A; Khoo, T J; Khoriauli, G; Khoroshilov, A; Khovanskiy, N; Khovanskiy, V; Khramov, E; Khubua, J; Kim, H; Kim, M S; Kim, S H; Kimura, N; Kind, O; King, B T; King, M; King, R S B; Kirk, J; Kirsch, L E; Kiryunin, A E; Kishimoto, T; Kisielewska, D; Kittelmann, T; Kiver, A M; Kladiva, E; Klein, M; Klein, U; Kleinknecht, K; Klemetti, M; Klier, A; Klimek, P; Klimentov, A; Klingenberg, R; Klinger, J A; Klinkby, E B; Klioutchnikova, T; Klok, P F; Klous, S; Kluge, E-E; Kluge, T; Kluit, P; Kluth, S; Knecht, N S; Kneringer, E; Knobloch, J; Knoops, E B F G; Knue, A; Ko, B R; Kobayashi, T; Kobel, M; Kocian, M; Kodys, P; Köneke, K; König, A C; Koenig, S; Köpke, L; Koetsveld, F; Koevesarki, P; Koffas, T; Koffeman, E; Kogan, L A; Kohlmann, S; Kohn, F; Kohout, Z; Kohriki, T; Koi, T; Kokott, T; Kolachev, G M; Kolanoski, H; Kolesnikov, V; Koletsou, I; Koll, J; Kollefrath, M; Kolya, S D; Komar, A A; Komori, Y; Kondo, T; Kono, T; Kononov, A I; Konoplich, R; Konstantinidis, N; Kootz, A; Koperny, S; Korcyl, K; Kordas, K; Koreshev, V; Korn, A; Korol, A; Korolkov, I; Korolkova, E V; Korotkov, V A; Kortner, O; Kortner, S; Kostyukhin, V V; Kotamäki, M J; Kotov, S; Kotov, V M; Kotwal, A; Kourkoumelis, C; Kouskoura, V; Koutsman, A; Kowalewski, R; Kowalski, T Z; Kozanecki, W; Kozhin, A S; Kral, V; Kramarenko, V A; Kramberger, G; Krasny, M W; Krasznahorkay, A; Kraus, J; Kraus, J K; Krejci, F; Kretzschmar, J; Krieger, N; Krieger, P; Kroeninger, K; Kroha, H; Kroll, J; Kroseberg, J; Krstic, J; Kruchonak, U; Krüger, H; Kruker, T; Krumnack, N; Krumshteyn, Z V; Kruth, A; Kubota, T; Kuday, S; Kuehn, S; Kugel, A; Kuhl, T; Kuhn, D; Kukhtin, V; Kulchitsky, Y; Kuleshov, S; Kummer, C; Kuna, M; Kundu, N; Kunkle, J; Kupco, A; Kurashige, H; Kurata, M; Kurochkin, Y A; Kus, V; Kuwertz, E S; Kuze, M; Kvita, J; Kwee, R; La Rosa, A; La Rotonda, L; Labarga, L; Labbe, J; Lablak, S; Lacasta, C; Lacava, F; Lacker, H; Lacour, D; Lacuesta, V R; Ladygin, E; Lafaye, R; Laforge, B; Lagouri, T; Lai, S; Laisne, E; Lamanna, M; Lambourne, L; Lampen, C L; Lampl, W; Lancon, E; Landgraf, U; Landon, M P J; Lane, J L; Lange, C; Lankford, A J; Lanni, F; Lantzsch, K; Laplace, S; Lapoire, C; Laporte, J F; Lari, T; Larionov, A V; Larner, A; Lasseur, C; Lassnig, M; Laurelli, P; Lavorini, V; Lavrijsen, W; Laycock, P; Lazarev, A B; Le Dortz, O; Le Guirriec, E; Le Maner, C; Le Menedeu, E; Lebel, C; LeCompte, T; Ledroit-Guillon, F; Lee, H; Lee, J S H; Lee, S C; Lee, L; Lefebvre, M; Legendre, M; Leger, A; LeGeyt, B C; Legger, F; Leggett, C; Lehmacher, M; Lehmann Miotto, G; Lei, X; Leite, M A L; Leitner, R; Lellouch, D; Leltchouk, M; Lemmer, B; Lendermann, V; Leney, K J C; Lenz, T; Lenzen, G; Lenzi, B; Leonhardt, K; Leontsinis, S; Lepold, F; Leroy, C; Lessard, J-R; Lesser, J; Lester, C G; Lester, C M; Levêque, J; Levin, D; Levinson, L J; Levitski, M S; Lewis, A; Lewis, G H; Leyko, A M; Leyton, M; Li, B; Li, H; Li, S; Li, X; Liang, Z; Liao, H; Liberti, B; Lichard, P; Lichtnecker, M; Lie, K; Liebig, W; Limbach, C; Limosani, A; Limper, M; Lin, S C; Linde, F; Linnemann, J T; Lipeles, E; Lipinsky, L; Lipniacka, A; Liss, T M; Lissauer, D; Lister, A; Litke, A M; Liu, C; Liu, D; Liu, H; Liu, J B; Liu, M; Liu, Y; Livan, M; Livermore, S S A; Lleres, A; Llorente Merino, J; Lloyd, S L; Lobodzinska, E; Loch, P; Lockman, W S; Loddenkoetter, T; Loebinger, F K; Loginov, A; Loh, C W; Lohse, T; Lohwasser, K; Lokajicek, M; Loken, J; Lombardo, V P; Long, R E; Lopes, L; Lopez Mateos, D; Lorenz, J; Lorenzo Martinez, N; Losada, M; Loscutoff, P; Lo Sterzo, F; Losty, M J; Lou, X; Lounis, A; Loureiro, K F; Love, J; Love, P A; Lowe, A J; Lu, F; Lubatti, H J; Luci, C; Lucotte, A; Ludwig, A; Ludwig, D; Ludwig, I; Ludwig, J; Luehring, F; Luijckx, G; Lukas, W; Lumb, D; Luminari, L; Lund, E; Lund-Jensen, B; Lundberg, B; Lundberg, J; Lundquist, J; Lungwitz, M; Lutz, G; Lynn, D; Lys, J; Lytken, E; Ma, H; Ma, L L; Macana Goia, J A; Maccarrone, G; Macchiolo, A; Maček, B; Machado Miguens, J; Mackeprang, R; Madaras, R J; Mader, W F; Maenner, R; Maeno, T; Mättig, P; Mättig, S; Magnoni, L; Magradze, E; Mahalalel, Y; Mahboubi, K; Mahmoud, S; Mahout, G; Maiani, C; Maidantchik, C; Maio, A; Majewski, S; Makida, Y; Makovec, N; Mal, P; Malaescu, B; Malecki, Pa; Malecki, P; Maleev, V P; Malek, F; Mallik, U; Malon, D; Malone, C; Maltezos, S; Malyshev, V; Malyukov, S; Mameghani, R; Mamuzic, J; Manabe, A; Mandelli, L; Mandić, I; Mandrysch, R; Maneira, J; Mangeard, P S; Manhaes de Andrade Filho, L; Manjavidze, I D; Mann, A; Manning, P M; Manousakis-Katsikakis, A; Mansoulie, B; Manz, A; Mapelli, A; Mapelli, L; March, L; Marchand, J F; Marchese, F; Marchiori, G; Marcisovsky, M; Marino, C P; Marroquim, F; Marshall, R; Marshall, Z; Martens, F K; Marti-Garcia, S; Martin, A J; Martin, B; Martin, B; Martin, F F; Martin, J P; Martin, Ph; Martin, T A; Martin, V J; Martin Dit Latour, B; Martin-Haugh, S; Martinez, M; Martinez Outschoorn, V; Martyniuk, A C; Marx, M; Marzano, F; Marzin, A; Masetti, L; Mashimo, T; Mashinistov, R; Masik, J; Maslennikov, A L; Massa, I; Massaro, G; Massol, N; Mastrandrea, P; Mastroberardino, A; Masubuchi, T; Matricon, P; Matsumoto, H; Matsunaga, H; Matsushita, T; Mattravers, C; Maugain, J M; Maurer, J; Maxfield, S J; May, E N; Mayne, A; Mazini, R; Mazur, M; Mazzaferro, L; Mazzanti, M; Mc Kee, S P; McCarn, A; McCarthy, R L; McCarthy, T G; McCubbin, N A; McFarlane, K W; Mcfayden, J A; McGlone, H; Mchedlidze, G; McLaren, R A; Mclaughlan, T; McMahon, S J; McPherson, R A; Meade, A; Mechnich, J; Mechtel, M; Medinnis, M; Meera-Lebbai, R; Meguro, T; Mehdiyev, R; Mehlhase, S; Mehta, A; Meier, K; Meirose, B; Melachrinos, C; Mellado Garcia, B R; Meloni, F; Mendoza Navas, L; Meng, Z; Mengarelli, A; Menke, S; Menot, C; Meoni, E; Mercurio, K M; Mermod, P; Merola, L; Meroni, C; Merritt, F S; Merritt, H; Messina, A; Metcalfe, J; Mete, A S; Meyer, C; Meyer, C; Meyer, J-P; Meyer, J; Meyer, J; Meyer, T C; Meyer, W T; Miao, J; Michal, S; Micu, L; Middleton, R P; Migas, S; Mijović, L; Mikenberg, G; Mikestikova, M; Mikuž, M; Miller, D W; Miller, R J; Mills, W J; Mills, C; Milov, A; Milstead, D A; Milstein, D; Minaenko, A A; Miñano Moya, M; Minashvili, I A; Mincer, A I; Mindur, B; Mineev, M; Ming, Y; Mir, L M; Mirabelli, G; Miralles Verge, L; Misiejuk, A; Mitrevski, J; Mitrofanov, G Y; Mitsou, V A; Mitsui, S; Miyagawa, P S; Miyazaki, K; Mjörnmark, J U; Moa, T; Mockett, P; Moed, S; Moeller, V; Mönig, K; Möser, N; Mohapatra, S; Mohr, W; Mohrdieck-Möck, S; Moles-Valls, R; Molina-Perez, J; Monk, J; Monnier, E; Montesano, S; Monticelli, F; Monzani, S; Moore, R W; Moorhead, G F; Mora Herrera, C; Moraes, A; Morange, N; Morel, J; Morello, G; Moreno, D; Moreno Llácer, M; Morettini, P; Morgenstern, M; Morii, M; Morin, J; Morley, A K; Mornacchi, G; Morozov, S V; Morris, J D; Morvaj, L; Moser, H G; Mosidze, M; Moss, J; Mount, R; Mountricha, E; Mouraviev, S V; Moyse, E J W; Mudrinic, M; Mueller, F; Mueller, J; Mueller, K; Müller, T A; Mueller, T; Muenstermann, D; Munwes, Y; Murray, W J; Mussche, I; Musto, E; Myagkov, A G; Myska, M; Nadal, J; Nagai, K; Nagano, K; Nagarkar, A; Nagasaka, Y; Nagel, M; Nairz, A M; Nakahama, Y; Nakamura, K; Nakamura, T; Nakano, I; Nanava, G; Napier, A; Narayan, R; Nash, M; Nation, N R; Nattermann, T; Naumann, T; Navarro, G; Neal, H A; Nebot, E; Nechaeva, P Yu; Neep, T J; Negri, A; Negri, G; Nektarijevic, S; Nelson, A; Nelson, T K; Nemecek, S; Nemethy, P; Nepomuceno, A A; Nessi, M; Neubauer, M S; Neusiedl, A; Neves, R M; Nevski, P; Newman, P R; Nguyen Thi Hong, V; Nickerson, R B; Nicolaidou, R; Nicolas, L; Nicquevert, B; Niedercorn, F; Nielsen, J; Niinikoski, T; Nikiforou, N; Nikiforov, A; Nikolaenko, V; Nikolaev, K; Nikolic-Audit, I; Nikolics, K; Nikolopoulos, K; Nilsen, H; Nilsson, P; Ninomiya, Y; Nisati, A; Nishiyama, T; Nisius, R; Nodulman, L; Nomachi, M; Nomidis, I; Nordberg, M; Norton, P R; Novakova, J; Nozaki, M; Nozka, L; Nugent, I M; Nuncio-Quiroz, A-E; Nunes Hanninger, G; Nunnemann, T; Nurse, E; O'Brien, B J; O'Neale, S W; O'Neil, D C; O'Shea, V; Oakes, L B; Oakham, F G; Oberlack, H; Ocariz, J; Ochi, A; Oda, S; Odaka, S; Odier, J; Ogren, H; Oh, A; Oh, S H; Ohm, C C; Ohshima, T; Ohshita, H; Okada, S; Okawa, H; Okumura, Y; Okuyama, T; Olariu, A; Olcese, M; Olchevski, A G; Olivares Pino, S A; Oliveira, M; Oliveira Damazio, D; Oliver Garcia, E; Olivito, D; Olszewski, A; Olszowska, J; Omachi, C; Onofre, A; Onyisi, P U E; Oram, C J; Oreglia, M J; Oren, Y; Orestano, D; Orlando, N; Orlov, I; Oropeza Barrera, C; Orr, R S; Osculati, B; Ospanov, R; Osuna, C; Otero Y Garzon, G; Ottersbach, J P; Ouchrif, M; Ouellette, E A; Ould-Saada, F; Ouraou, A; Ouyang, Q; Ovcharova, A; Owen, M; Owen, S; Ozcan, V E; Ozturk, N; Pacheco Pages, A; Padilla Aranda, C; Pagan Griso, S; Paganis, E; Paige, F; Pais, P; Pajchel, K; Palacino, G; Paleari, C P; Palestini, S; Pallin, D; Palma, A; Palmer, J D; Pan, Y B; Panagiotopoulou, E; Panes, B; Panikashvili, N; Panitkin, S; Pantea, D; Panuskova, M; Paolone, V; Papadelis, A; Papadopoulou, Th D; Paramonov, A; Paredes Hernandez, D; Park, W; Parker, M A; Parodi, F; Parsons, J A; Parzefall, U; Pashapour, S; Pasqualucci, E; Passaggio, S; Passeri, A; Pastore, F; Pastore, Fr; Pásztor, G; Pataraia, S; Patel, N; Pater, J R; Patricelli, S; Pauly, T; Pecsy, M; Pedraza Morales, M I; Peleganchuk, S V; Pelikan, D; Peng, H; Penning, B; Penson, A; Penwell, J; Perantoni, M; Perez, K; Perez Cavalcanti, T; Perez Codina, E; Pérez García-Estañ, M T; Perez Reale, V; Perini, L; Pernegger, H; Perrino, R; Perrodo, P; Persembe, S; Peshekhonov, V D; Peters, K; Petersen, B A; Petersen, J; Petersen, T C; Petit, E; Petridis, A; Petridou, C; Petrolo, E; Petrucci, F; Petschull, D; Petteni, M; Pezoa, R; Phan, A; Phillips, P W; Piacquadio, G; Picazio, A; Piccaro, E; Piccinini, M; Piec, S M; Piegaia, R; Pignotti, D T; Pilcher, J E; Pilkington, A D; Pina, J; Pinamonti, M; Pinder, A; Pinfold, J L; Ping, J; Pinto, B; Pirotte, O; Pizio, C; Placakyte, R; Plamondon, M; Pleier, M-A; Pleskach, A V; Plotnikova, E; Poblaguev, A; Poddar, S; Podlyski, F; Poggioli, L; Poghosyan, T; Pohl, M; Polci, F; Polesello, G; Policicchio, A; Polini, A; Poll, J; Polychronakos, V; Pomarede, D M; Pomeroy, D; Pommès, K; Pontecorvo, L; Pope, B G; Popeneciu, G A; Popovic, D S; Poppleton, A; Portell Bueso, X; Posch, C; Pospelov, G E; Pospisil, S; Potrap, I N; Potter, C J; Potter, C T; Poulard, G; Poveda, J; Pozdnyakov, V; Prabhu, R; Pralavorio, P; Pranko, A; Prasad, S; Pravahan, R; Prell, S; Pretzl, K; Pribyl, L; Price, D; Price, J; Price, L E; Price, M J; Prieur, D; Primavera, M; Prokofiev, K; Prokoshin, F; Protopopescu, S; Proudfoot, J; Prudent, X; Przybycien, M; Przysiezniak, H; Psoroulas, S; Ptacek, E; Pueschel, E; Purdham, J; Purohit, M; Puzo, P; Pylypchenko, Y; Qian, J; Qian, Z; Qin, Z; Quadt, A; Quarrie, D R; Quayle, W B; Quinonez, F; Raas, M; Radescu, V; Radics, B; Radloff, P; Rador, T; Ragusa, F; Rahal, G; Rahimi, A M; Rahm, D; Rajagopalan, S; Rammensee, M; Rammes, M; Randle-Conde, A S; Randrianarivony, K; Ratoff, P N; Rauscher, F; Rave, T C; Raymond, M; Read, A L; Rebuzzi, D M; Redelbach, A; Redlinger, G; Reece, R; Reeves, K; Reichold, A; Reinherz-Aronis, E; Reinsch, A; Reisinger, I; Rembser, C; Ren, Z L; Renaud, A; Rescigno, M; Resconi, S; Resende, B; Reznicek, P; Rezvani, R; Richards, A; Richter, R; Richter-Was, E; Ridel, M; Rijpstra, M; Rijssenbeek, M; Rimoldi, A; Rinaldi, L; Rios, R R; Riu, I; Rivoltella, G; Rizatdinova, F; Rizvi, E; Robertson, S H; Robichaud-Veronneau, A; Robinson, D; Robinson, J E M; Robson, A; Rocha de Lima, J G; Roda, C; Roda Dos Santos, D; Rodriguez, D; Roe, A; Roe, S; Røhne, O; Rojo, V; Rolli, S; Romaniouk, A; Romano, M; Romanov, V M; Romeo, G; Romero Adam, E; Roos, L; Ros, E; Rosati, S; Rosbach, K; Rose, A; Rose, M; Rosenbaum, G A; Rosenberg, E I; Rosendahl, P L; Rosenthal, O; Rosselet, L; Rossetti, V; Rossi, E; Rossi, L P; Rotaru, M; Roth, I; Rothberg, J; Rousseau, D; Royon, C R; Rozanov, A; Rozen, Y; Ruan, X; Rubbo, F; Rubinskiy, I; Ruckert, B; Ruckstuhl, N; Rud, V I; Rudolph, C; Rudolph, G; Rühr, F; Ruggieri, F; Ruiz-Martinez, A; Rumiantsev, V; Rumyantsev, L; Runge, K; Rurikova, Z; Rusakovich, N A; Rutherfoord, J P; Ruwiedel, C; Ruzicka, P; Ryabov, Y F; Ryadovikov, V; Ryan, P; Rybar, M; Rybkin, G; Ryder, N C; Rzaeva, S; Saavedra, A F; Sadeh, I; Sadrozinski, H F-W; Sadykov, R; Safai Tehrani, F; Sakamoto, H; Salamanna, G; Salamon, A; Saleem, M; Salek, D; Salihagic, D; Salnikov, A; Salt, J; Salvachua Ferrando, B M; Salvatore, D; Salvatore, F; Salvucci, A; Salzburger, A; Sampsonidis, D; Samset, B H; Sanchez, A; Sanchez Martinez, V; Sandaker, H; Sander, H G; Sanders, M P; Sandhoff, M; Sandoval, T; Sandoval, C; Sandstroem, R; Sandvoss, S; Sankey, D P C; Sansoni, A; Santamarina Rios, C; Santoni, C; Santonico, R; Santos, H; Saraiva, J G; Sarangi, T; Sarkisyan-Grinbaum, E; Sarri, F; Sartisohn, G; Sasaki, O; Sasao, N; Satsounkevitch, I; Sauvage, G; Sauvan, E; Sauvan, J B; Savard, P; Savinov, V; Savu, D O; Sawyer, L; Saxon, D H; Saxon, J; Says, L P; Sbarra, C; Sbrizzi, A; Scallon, O; Scannicchio, D A; Scarcella, M; Schaarschmidt, J; Schacht, P; Schaefer, D; Schäfer, U; Schaepe, S; Schaetzel, S; Schaffer, A C; Schaile, D; Schamberger, R D; Schamov, A G; Scharf, V; Schegelsky, V A; Scheirich, D; Schernau, M; Scherzer, M I; Schiavi, C; Schieck, J; Schioppa, M; Schlenker, S; Schlereth, J L; Schmidt, E; Schmieden, K; Schmitt, C; Schmitt, S; Schmitz, M; Schöning, A; Schott, M; Schouten, D; Schovancova, J; Schram, M; Schroeder, C; Schroer, N; Schuler, G; Schultens, M J; Schultes, J; Schultz-Coulon, H-C; Schulz, H; Schumacher, J W; Schumacher, M; Schumm, B A; Schune, Ph; Schwanenberger, C; Schwartzman, A; Schwemling, Ph; Schwienhorst, R; Schwierz, R; Schwindling, J; Schwindt, T; Schwoerer, M; Sciolla, G; Scott, W G; Searcy, J; Sedov, G; Sedykh, E; Segura, E; Seidel, S C; Seiden, A; Seifert, F; Seixas, J M; Sekhniaidze, G; Sekula, S J; Selbach, K E; Seliverstov, D M; Sellden, B; Sellers, G; Seman, M; Semprini-Cesari, N; Serfon, C; Serin, L; Serkin, L; Seuster, R; Severini, H; Sevior, M E; Sfyrla, A; Shabalina, E; Shamim, M; Shan, L Y; Shank, J T; Shao, Q T; Shapiro, M; Shatalov, P B; Shaver, L; Shaw, K; Sherman, D; Sherwood, P; Shibata, A; Shichi, H; Shimizu, S; Shimojima, M; Shin, T; Shiyakova, M; Shmeleva, A; Shochet, M J; Short, D; Shrestha, S; Shulga, E; Shupe, M A; Sicho, P; Sidoti, A; Siegert, F; Sijacki, Dj; Silbert, O; Silva, J; Silver, Y; Silverstein, D; Silverstein, S B; Simak, V; Simard, O; Simic, Lj; Simion, S; Simmons, B; Simoniello, R; Simonyan, M; Sinervo, P; Sinev, N B; Sipica, V; Siragusa, G; Sircar, A; Sisakyan, A N; Sivoklokov, S Yu; Sjölin, J; Sjursen, T B; Skinnari, L A; Skottowe, H P; Skovpen, K; Skubic, P; Skvorodnev, N; Slater, M; Slavicek, T; Sliwa, K; Sloper, J; Smakhtin, V; Smart, B H; Smirnov, S Yu; Smirnov, Y; Smirnova, L N; Smirnova, O; Smith, B C; Smith, D; Smith, K M; Smizanska, M; Smolek, K; Snesarev, A A; Snow, S W; Snow, J; Snyder, S; Soares, M; Sobie, R; Sodomka, J; Soffer, A; Solans, C A; Solar, M; Solc, J; Soldatov, E; Soldevila, U; Solfaroli Camillocci, E; Solodkov, A A; Solovyanov, O V; Soni, N; Sopko, V; Sopko, B; Sosebee, M; Soualah, R; Soukharev, A; Spagnolo, S; Spanò, F; Spighi, R; Spigo, G; Spila, F; Spiwoks, R; Spousta, M; Spreitzer, T; Spurlock, B; St Denis, R D; Stahlman, J; Stamen, R; Stanecka, E; Stanek, R W; Stanescu, C; Stanescu-Bellu, M; Stapnes, S; Starchenko, E A; Stark, J; Staroba, P; Starovoitov, P; Staude, A; Stavina, P; Steele, G; Steinbach, P; Steinberg, P; Stekl, I; Stelzer, B; Stelzer, H J; Stelzer-Chilton, O; Stenzel, H; Stern, S; Stevenson, K; Stewart, G A; Stillings, J A; Stockton, M C; Stoerig, K; Stoicea, G; Stonjek, S; Strachota, P; Stradling, A R; Straessner, A; Strandberg, J; Strandberg, S; Strandlie, A; Strang, M; Strauss, E; Strauss, M; Strizenec, P; Ströhmer, R; Strom, D M; Strong, J A; Stroynowski, R; Strube, J; Stugu, B; Stumer, I; Stupak, J; Sturm, P; Styles, N A; Soh, D A; Su, D; Subramania, Hs; Succurro, A; Sugaya, Y; Sugimoto, T; Suhr, C; Suita, K; Suk, M; Sulin, V V; Sultansoy, S; Sumida, T; Sun, X; Sundermann, J E; Suruliz, K; Sushkov, S; Susinno, G; Sutton, M R; Suzuki, Y; Suzuki, Y; Svatos, M; Sviridov, Yu M; Swedish, S; Sykora, I; Sykora, T; Szeless, B; Sánchez, J; Ta, D; Tackmann, K; Taffard, A; Tafirout, R; Taiblum, N; Takahashi, Y; Takai, H; Takashima, R; Takeda, H; Takeshita, T; Takubo, Y; Talby, M; Talyshev, A; Tamsett, M C; Tanaka, J; Tanaka, R; Tanaka, S; Tanaka, S; Tanaka, Y; Tanasijczuk, A J; Tani, K; Tannoury, N; Tappern, G P; Tapprogge, S; Tardif, D; Tarem, S; Tarrade, F; Tartarelli, G F; Tas, P; Tasevsky, M; Tassi, E; Tatarkhanov, M; Tayalati, Y; Taylor, C; Taylor, F E; Taylor, G N; Taylor, W; Teinturier, M; Teixeira Dias Castanheira, M; Teixeira-Dias, P; Temming, K K; Ten Kate, H; Teng, P K; Terada, S; Terashi, K; Terron, J; Testa, M; Teuscher, R J; Thadome, J; Therhaag, J; Theveneaux-Pelzer, T; Thioye, M; Thoma, S; Thomas, J P; Thompson, E N; Thompson, P D; Thompson, P D; Thompson, A S; Thomsen, L A; Thomson, E; Thomson, M; Thun, R P; Tian, F; Tibbetts, M J; Tic, T; Tikhomirov, V O; Tikhonov, Y A; Timoshenko, S; Tipton, P; Tique Aires Viegas, F J; Tisserant, S; Toczek, B; Todorov, T; Todorova-Nova, S; Toggerson, B; Tojo, J; Tokár, S; Tokunaga, K; Tokushuku, K; Tollefson, K; Tomoto, M; Tompkins, L; Toms, K; Tong, G; Tonoyan, A; Topfel, C; Topilin, N D; Torchiani, I; Torrence, E; Torres, H; Torró Pastor, E; Toth, J; Touchard, F; Tovey, D R; Trefzger, T; Tremblet, L; Tricoli, A; Trigger, I M; Trincaz-Duvoid, S; Tripiana, M F; Trischuk, W; Trivedi, A; Trocmé, B; Troncon, C; Trottier-McDonald, M; Trzebinski, M; Trzupek, A; Tsarouchas, C; Tseng, J C-L; Tsiakiris, M; Tsiareshka, P V; Tsionou, D; Tsipolitis, G; Tsiskaridze, V; Tskhadadze, E G; Tsukerman, I I; Tsulaia, V; Tsung, J-W; Tsuno, S; Tsybychev, D; Tua, A; Tudorache, A; Tudorache, V; Tuggle, J M; Turala, M; Turecek, D; Turk Cakir, I; Turlay, E; Turra, R; Tuts, P M; Tykhonov, A; Tylmad, M; Tyndel, M; Tzanakos, G; Uchida, K; Ueda, I; Ueno, R; Ugland, M; Uhlenbrock, M; Uhrmacher, M; Ukegawa, F; Unal, G; Underwood, D G; Undrus, A; Unel, G; Unno, Y; Urbaniec, D; Usai, G; Uslenghi, M; Vacavant, L; Vacek, V; Vachon, B; Vahsen, S; Valenta, J; Valente, P; Valentinetti, S; Valkar, S; Valladolid Gallego, E; Vallecorsa, S; Valls Ferrer, J A; van der Graaf, H; van der Kraaij, E; Van Der Leeuw, R; van der Poel, E; van der Ster, D; van Eldik, N; van Gemmeren, P; van Kesteren, Z; van Vulpen, I; Vanadia, M; Vandelli, W; Vandoni, G; Vaniachine, A; Vankov, P; Vannucci, F; Varela Rodriguez, F; Vari, R; Varol, T; Varouchas, D; Vartapetian, A; Varvell, K E; Vassilakopoulos, V I; Vazeille, F; Vazquez Schroeder, T; Vegni, G; Veillet, J J; Vellidis, C; Veloso, F; Veness, R; Veneziano, S; Ventura, A; Ventura, D; Venturi, M; Venturi, N; Vercesi, V; Verducci, M; Verkerke, W; Vermeulen, J C; Vest, A; Vetterli, M C; Vichou, I; Vickey, T; Vickey Boeriu, O E; Viehhauser, G H A; Viel, S; Villa, M; Villaplana Perez, M; Vilucchi, E; Vincter, M G; Vinek, E; Vinogradov, V B; Virchaux, M; Virzi, J; Vitells, O; Viti, M; Vivarelli, I; Vives Vaque, F; Vlachos, S; Vladoiu, D; Vlasak, M; Vlasov, N; Vogel, A; Vokac, P; Volpi, G; Volpi, M; Volpini, G; von der Schmitt, H; von Loeben, J; von Radziewski, H; von Toerne, E; Vorobel, V; Vorobiev, A P; Vorwerk, V; Vos, M; Voss, R; Voss, T T; Vossebeld, J H; Vranjes, N; Vranjes Milosavljevic, M; Vrba, V; Vreeswijk, M; Vu Anh, T; Vuillermet, R; Vukotic, I; Wagner, W; Wagner, P; Wahlen, H; Wakabayashi, J; Walch, S; Walder, J; Walker, R; Walkowiak, W; Wall, R; Waller, P; Wang, C; Wang, H; Wang, H; Wang, J; Wang, J; Wang, J C; Wang, R; Wang, S M; Wang, T; Warburton, A; Ward, C P; Warsinsky, M; Washbrook, A; Wasicki, C; Watkins, P M; Watson, A T; Watson, I J; Watson, M F; Watts, G; Watts, S; Waugh, A T; Waugh, B M; Weber, M; Weber, M S; Weber, P; Weidberg, A R; Weigell, P; Weingarten, J; Weiser, C; Wellenstein, H; Wells, P S; Wenaus, T; Wendland, D; Wendler, S; Weng, Z; Wengler, T; Wenig, S; Wermes, N; Werner, M; Werner, P; Werth, M; Wessels, M; Wetter, J; Weydert, C; Whalen, K; Wheeler-Ellis, S J; Whitaker, S P; White, A; White, M J; White, S; Whitehead, S R; Whiteson, D; Whittington, D; Wicek, F; Wicke, D; Wickens, F J; Wiedenmann, W; Wielers, M; Wienemann, P; Wiglesworth, C; Wiik-Fuchs, L A M; Wijeratne, P A; Wildauer, A; Wildt, M A; Wilhelm, I; Wilkens, H G; Will, J Z; Williams, E; Williams, H H; Willis, W; Willocq, S; Wilson, J A; Wilson, M G; Wilson, A; Wingerter-Seez, I; Winkelmann, S; Winklmeier, F; Wittgen, M; Wolter, M W; Wolters, H; Wong, W C; Wooden, G; Wosiek, B K; Wotschack, J; Woudstra, M J; Wozniak, K W; Wraight, K; Wright, C; Wright, M; Wrona, B; Wu, S L; Wu, X; Wu, Y; Wulf, E; Wunstorf, R; Wynne, B M; Xella, S; Xiao, M; Xie, S; Xie, Y; Xu, C; Xu, D; Xu, G; Yabsley, B; Yacoob, S; Yamada, M; Yamaguchi, H; Yamamoto, A; Yamamoto, K; Yamamoto, S; Yamamura, T; Yamanaka, T; Yamaoka, J; Yamazaki, T; Yamazaki, Y; Yan, Z; Yang, H; Yang, U K; Yang, Y; Yang, Y; Yang, Z; Yanush, S; Yao, Y; Yasu, Y; Ybeles Smit, G V; Ye, J; Ye, S; Yilmaz, M; Yoosoofmiya, R; Yorita, K; Yoshida, R; Young, C; Young, C J; Youssef, S; Yu, D; Yu, J; Yu, J; Yuan, L; Yurkewicz, A; Zabinski, B; Zaets, V G; Zaidan, R; Zaitsev, A M; Zajacova, Z; Zanello, L; Zaytsev, A; Zeitnitz, C; Zeller, M; Zeman, M; Zemla, A; Zendler, C; Zenin, O; Ženiš, T; Zinonos, Z; Zenz, S; Zerwas, D; Zevi Della Porta, G; Zhan, Z; Zhang, D; Zhang, H; Zhang, J; Zhang, X; Zhang, Z; Zhao, L; Zhao, T; Zhao, Z; Zhemchugov, A; Zheng, S; Zhong, J; Zhou, B; Zhou, N; Zhou, Y; Zhu, C G; Zhu, H; Zhu, J; Zhu, Y; Zhuang, X; Zhuravlov, V; Zieminska, D; Zimmermann, R; Zimmermann, S; Zimmermann, S; Ziolkowski, M; Zitoun, R; Živković, L; Zmouchko, V V; Zobernig, G; Zoccoli, A; Zsenei, A; Zur Nedden, M; Zutshi, V; Zwalinski, L

    A measurement of the jet activity in [Formula: see text] events produced in proton-proton collisions at a centre-of-mass energy of 7 TeV is presented, using 2.05 fb(-1) of integrated luminosity collected by the ATLAS detector at the Large Hadron Collider. The [Formula: see text] events are selected in the dilepton decay channel with two identified b-jets from the top quark decays. Events are vetoed if they contain an additional jet with transverse momentum above a threshold in a central rapidity interval. The fraction of events surviving the jet veto is presented as a function of this threshold for four different central rapidity interval definitions. An alternate measurement is also performed, in which events are vetoed if the scalar transverse momentum sum of the additional jets in each rapidity interval is above a threshold. In both measurements, the data are corrected for detector effects and compared to the theoretical models implemented in MC@NLO, Powheg, Alpgen and Sherpa. The experimental uncertainties are often smaller than the spread of theoretical predictions, allowing deviations between data and theory to be observed in some regions of phase space.

  11. Proliferation Security Initiative: Agencies Have Adopted Policies and Procedures but Steps Needed to Meet Reporting Requirement and to Measure Results

    DTIC Science & Technology

    2012-03-01

    Participation, Fiscal Years 2009-2011 12 Figure Figure 1: Sample Logic Model 18 Abbreviations 9/11 Act Implementing Recommendations of the 9/11...has previously identified such frameworks, called logic models , that agencies could adopt even if they face performance measurement challenges similar...31A logic model is an evaluation tool used to describe a program’s—or initiative’s, in the case of PSI—components and

  12. Data validation and security for reprocessing.

    SciTech Connect

    Tolk, Keith Michael; Merkle, Peter Benedict; DurÔan, Felicia Angelica; Cipiti, Benjamin B.

    2008-10-01

    Next generation nuclear fuel cycle facilities will face strict requirements on security and safeguards of nuclear material. These requirements can result in expensive facilities. The purpose of this project was to investigate how to incorporate safeguards and security into one plant monitoring system early in the design process to take better advantage of all plant process data, to improve confidence in the operation of the plant, and to optimize costs. An existing reprocessing plant materials accountancy model was examined for use in evaluating integration of safeguards (both domestic and international) and security. International safeguards require independent, secure, and authenticated measurements for materials accountability--it may be best to design stand-alone systems in addition to domestic safeguards instrumentation to minimize impact on operations. In some cases, joint-use equipment may be appropriate. Existing domestic materials accountancy instrumentation can be used in conjunction with other monitoring equipment for plant security as well as through the use of material assurance indicators, a new metric for material control that is under development. Future efforts will take the results of this work to demonstrate integration on the reprocessing plant model.

  13. Information risk and security modeling

    NASA Astrophysics Data System (ADS)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  14. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    NASA Astrophysics Data System (ADS)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  15. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    SciTech Connect

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  16. Capturing security requirements for software systems.

    PubMed

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  17. Unfalsifiability of security claims.

    PubMed

    Herley, Cormac

    2016-06-07

    There is an inherent asymmetry in computer security: Things can be declared insecure by observation, but not the reverse. There is no observation that allows us to declare an arbitrary system or technique secure. We show that this implies that claims of necessary conditions for security (and sufficient conditions for insecurity) are unfalsifiable. This in turn implies an asymmetry in self-correction: Whereas the claim that countermeasures are sufficient is always subject to correction, the claim that they are necessary is not. Thus, the response to new information can only be to ratchet upward: Newly observed or speculated attack capabilities can argue a countermeasure in, but no possible observation argues one out. Further, when justifications are unfalsifiable, deciding the relative importance of defensive measures reduces to a subjective comparison of assumptions. Relying on such claims is the source of two problems: once we go wrong we stay wrong and errors accumulate, and we have no systematic way to rank or prioritize measures.

  18. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  19. Potlining Additives

    SciTech Connect

    Rudolf Keller

    2004-08-10

    In this project, a concept to improve the performance of aluminum production cells by introducing potlining additives was examined and tested. Boron oxide was added to cathode blocks, and titanium was dissolved in the metal pool; this resulted in the formation of titanium diboride and caused the molten aluminum to wet the carbonaceous cathode surface. Such wetting reportedly leads to operational improvements and extended cell life. In addition, boron oxide suppresses cyanide formation. This final report presents and discusses the results of this project. Substantial economic benefits for the practical implementation of the technology are projected, especially for modern cells with graphitized blocks. For example, with an energy savings of about 5% and an increase in pot life from 1500 to 2500 days, a cost savings of $ 0.023 per pound of aluminum produced is projected for a 200 kA pot.

  20. Phosphazene additives

    DOEpatents

    Harrup, Mason K; Rollins, Harry W

    2013-11-26

    An additive comprising a phosphazene compound that has at least two reactive functional groups and at least one capping functional group bonded to phosphorus atoms of the phosphazene compound. One of the at least two reactive functional groups is configured to react with cellulose and the other of the at least two reactive functional groups is configured to react with a resin, such as an amine resin of a polycarboxylic acid resin. The at least one capping functional group is selected from the group consisting of a short chain ether group, an alkoxy group, or an aryloxy group. Also disclosed are an additive-resin admixture, a method of treating a wood product, and a wood product.

  1. Integrated safeguards & security for material protection, accounting, and control.

    SciTech Connect

    Duran, Felicia Angelica; Cipiti, Benjamin B.

    2009-10-01

    Traditional safeguards and security design for fuel cycle facilities is done separately and after the facility design is near completion. This can result in higher costs due to retrofits and redundant use of data. Future facilities will incorporate safeguards and security early in the design process and integrate the systems to make better use of plant data and strengthen both systems. The purpose of this project was to evaluate the integration of materials control and accounting (MC&A) measurements with physical security design for a nuclear reprocessing plant. Locations throughout the plant where data overlap occurs or where MC&A data could be a benefit were identified. This mapping is presented along with the methodology for including the additional data in existing probabilistic assessments to evaluate safeguards and security systems designs.

  2. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1985-04-12

    other crimes against civil aviation prevented or deterred by airline and airport security procedures cannot be determined with certainty. However...were prevented from doing so by airline and airport security measures. As noted elsewhere in this report, 1,632 firearms were detected at screening...enforcement sQp:)t’ for airline and airport security measures. Finally, with the inc.asoDr of security costs in airline ticket prices, the passengers

  3. Port and Harbor Security

    SciTech Connect

    Saito, T; Guthmuller, H; DeWeert, M

    2004-12-15

    Port and Harbor Security is a daunting task to which optics and photonics offers significant solutions. We are pleased to report that the 2005 Defense and Security Symposium (DSS, Orlando, FL) will include reports on active and passive photonic systems operating from both airborne and subsurface platforms. In addition to imaging techniques, there are various photonic applications, such as total internal reflection fluorescence (TIRF), which can be used to ''sniff'' for traces of explosives or contaminants in marine. These non-imaging technologies are beyond the scope of this article, but will also be represented at DSS 2005. We encourage colleagues to join our technical group to help us to make our ports and harbors safer and more secure.

  4. Secure medical digital libraries.

    PubMed

    Papadakis, I; Chrissikopoulos, V; Polemi, D

    2001-12-01

    In this paper, a secure medical digital library is presented. It is based on the CORBA specifications for distributed systems. The described approach relies on a three-tier architecture. Interaction between the medical digital library and its users is achieved through a Web server. The choice of employing Web technology for the dissemination of medical data has many advantages compared to older approaches, but also poses extra requirements that need to be fulfilled. Thus, special attention is paid to the distinguished nature of such medical data, whose integrity and confidentiality should be preserved at all costs. This is achieved through the employment of Trusted Third Parties (TTP) technology for the support of the required security services. Additionally, the proposed digital library employs smartcards for the management of the various security tokens that are used from the above services.

  5. 33 CFR 104.405 - Format of the Vessel Security Plan (VSP).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) Communications; (9) Security systems and equipment maintenance; (10) Security measures for access control... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Format of the Vessel Security... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Plan (VSP) § 104.405 Format of...

  6. 33 CFR 104.405 - Format of the Vessel Security Plan (VSP).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Communications; (9) Security systems and equipment maintenance; (10) Security measures for access control... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Format of the Vessel Security... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Plan (VSP) § 104.405 Format of...

  7. 7 CFR 1738.154 - Loan security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 11 2013-01-01 2013-01-01 false Loan security. 1738.154 Section 1738.154 Agriculture... RURAL BROADBAND ACCESS LOANS AND LOAN GUARANTEES Direct Loan Terms § 1738.154 Loan security. (a) The... the applicant's property and revenues and such additional security as the Agency may require....

  8. 7 CFR 764.235 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.235 Section 764.235... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Conservation Loan Program § 764.235 Security requirements. (a... estate may be taken as additional security if needed. (c) Loans of $25,000 of less for real...

  9. Teaching Web Security Using Portable Virtual Labs

    ERIC Educational Resources Information Center

    Chen, Li-Chiou; Tao, Lixin

    2012-01-01

    We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…

  10. 7 CFR 1738.154 - Loan security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 11 2012-01-01 2012-01-01 false Loan security. 1738.154 Section 1738.154 Agriculture... RURAL BROADBAND ACCESS LOANS AND LOAN GUARANTEES Direct Loan Terms § 1738.154 Loan security. (a) The... the applicant's property and revenues and such additional security as the Agency may require....

  11. 33 CFR 104.292 - Additional requirements-passenger vessels and ferries.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.292 Additional requirements—passenger vessels and ferries. (a) At all Maritime Security (MARSEC) Levels, the... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Additional...

  12. 33 CFR 104.292 - Additional requirements-passenger vessels and ferries.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.292 Additional requirements—passenger vessels and ferries. (a) At all Maritime Security (MARSEC) Levels, the... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Additional...

  13. 33 CFR 104.292 - Additional requirements-passenger vessels and ferries.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.292 Additional requirements—passenger vessels and ferries. (a) At all Maritime Security (MARSEC) Levels, the... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Additional...

  14. 33 CFR 104.292 - Additional requirements-passenger vessels and ferries.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.292 Additional requirements—passenger vessels and ferries. (a) At all Maritime Security (MARSEC) Levels, the... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Additional...

  15. 33 CFR 104.292 - Additional requirements-passenger vessels and ferries.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.292 Additional requirements—passenger vessels and ferries. (a) At all Maritime Security (MARSEC) Levels, the... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Additional...

  16. Energy and national security.

    SciTech Connect

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  17. Development of security engineering curricula at US universities

    SciTech Connect

    Garcia, M.L.

    1998-06-01

    The Southwest Surety Institute was formed in 1996 to create unique, science-based educational programs in security engineering. The programs will integrate business, technology, and criminal justice elements to educate a new generation of security professionals. Graduates of the programs will better understand basic security system design and evaluation and contribute to strengthening of the body of knowledge in the area of security. A systematic approach incorporating people, procedures, and equipment will be taught that will emphasize basic security principles and establish the science of security engineering. The use of performance measures in the analysis of designed systems will enable effective decisions by an enterprise and provide the rationale for investment in security systems. Along with educational programs, Institute members will conduct original research and development built on existing relationships with sponsors from government and industry in areas such as counterterroism, microelectronics, banking, aviation, and sensor development. Additional information and updates on the Southwest Surety Institute are available via the Institute home page at www.emrtc.nmt.edu/ssi.

  18. Medical network security and viruses.

    PubMed

    Fernandez Del Val, C

    1991-01-01

    Medical network as connecting Hospital Information Systems are needed in order to exchange, compare and make accessible data. The use of OSI standard communication protocols (open-network environment) will allow to interconnect multiple vendor systems and to accommodate a wide range of underlaying of communication technologies. The security of information on a given host may become dependent of the security measures employed by the network and by other hosts. Computer viruses modifies the executable code and thrive in network environment filled with personal computers and third-party software. Most networks and computers, permit users to share files; this, let the viruses to bypass the security mechanisms of almost every commercial operating system. However, computer viruses axes not the only threat to the information in a network environment. Other as deliberate (passive attacks -wire-tapping-) and accidental threat (unauthorized access to the information) are potential risks to the security information. Cryptographic techniques that now are widely used can resolve the external security problems of the network and improve the internal security ones. This paper begins describing the threats to security that arise in an open-network environment, and goes to establish the security requirements of medical communication networks. This is followed by a description of security services as: confidentiality, integrity, authentication, access control, etc., that will be provided to include security mechanisms in such network. The integration of these security mechanisms into the communication protocols allows to implement secure communication systems that not only must provide the adequate security, but also must minimize the impact of security on other features as for example the efficiency. The remainder of the paper describes how the security mechanisms are formed using current cryptographic facilities as algorithms, one-way functions, cryptographic systems (symmetric

  19. Addition of posttraumatic stress and sensory hypersensitivity more accurately estimates disability and pain than fear avoidance measures alone after whiplash injury.

    PubMed

    Pedler, Ashley; Kamper, Steven J; Sterling, Michele

    2016-08-01

    The fear avoidance model (FAM) has been proposed to explain the development of chronic disability in a variety of conditions including whiplash-associated disorders (WADs). The FAM does not account for symptoms of posttraumatic stress and sensory hypersensitivity, which are associated with poor recovery from whiplash injury. The aim of this study was to explore a model for the maintenance of pain and related disability in people with WAD including symptoms of PTSD, sensory hypersensitivity, and FAM components. The relationship between individual components in the model and disability and how these relationships changed over the first 12 weeks after injury were investigated. We performed a longitudinal study of 103 (74 female) patients with WAD. Measures of pain intensity, cold and mechanical pain thresholds, symptoms of posttraumatic stress, pain catastrophising, kinesiophobia, and fear of cervical spine movement were collected within 6 weeks of injury and at 12 weeks after injury. Mixed-model analysis using Neck Disability Index (NDI) scores and average 24-hour pain intensity as the dependent variables revealed that overall model fit was greatest when measures of fear of movement, posttraumatic stress, and sensory hypersensitivity were included. The interactive effects of time with catastrophising and time with fear of activity of the cervical spine were also included in the best model for disability. These results provide preliminary support for the addition of neurobiological and stress system components to the FAM to explain poor outcome in patients with WAD.

  20. Southern Hemisphere Additional Ozonesondes (SHADOZ) 1998-2000 tropical ozone climatology 1. Comparison with Total Ozone Mapping Spectrometer (TOMS) and ground-based measurements

    NASA Astrophysics Data System (ADS)

    Thompson, Anne M.; Witte, Jacquelyn C.; McPeters, Richard D.; Oltmans, Samuel J.; Schmidlin, Francis J.; Logan, Jennifer A.; Fujiwara, Masatomo; Kirchhoff, Volker W. J. H.; Posny, FrançOise; Coetzee, Gert J. R.; Hoegger, Bruno; Kawakami, Shuji; Ogawa, Toshihiro; Johnson, Bryan J.; VöMel, Holger; Labow, Gordon

    2003-01-01

    A network of 10 southern hemisphere tropical and subtropical stations, designated the Southern Hemisphere Additional Ozonesondes (SHADOZ) project and established from operational sites, provided over 1000 ozone profiles during the period 1998-2000. Balloon-borne electrochemical concentration cell (ECC) ozonesondes, combined with standard radiosondes for pressure, temperature, and relative humidity measurements, collected profiles in the troposphere and lower to midstratosphere at: Ascension Island; Nairobi, Kenya; Irene, South Africa; Réunion Island; Watukosek, Java; Fiji; Tahiti; American Samoa; San Cristóbal, Galapagos; and Natal, Brazil. The archived data are available at: . In this paper, uncertainties and accuracies within the SHADOZ ozone data set are evaluated by analyzing: (1) imprecisions in profiles and in methods of extrapolating ozone above balloon burst; (2) comparisons of column-integrated total ozone from sondes with total ozone from the Earth-Probe/Total Ozone Mapping Spectrometer (TOMS) satellite and ground-based instruments; and (3) possible biases from station to station due to variations in ozonesonde characteristics. The key results are the following: (1) Ozonesonde precision is 5%. (2) Integrated total ozone column amounts from the sondes are usually to within 5% of independent measurements from ground-based instruments at five SHADOZ sites and overpass measurements from the TOMS satellite (version 7 data). (3) Systematic variations in TOMS-sonde offsets and in ground-based-sonde offsets from station to station reflect biases in sonde technique as well as in satellite retrieval. Discrepancies are present in both stratospheric and tropospheric ozone. (4) There is evidence for a zonal wave-one pattern in total and tropospheric ozone, but not in stratospheric ozone.

  1. Food security under climate change

    NASA Astrophysics Data System (ADS)

    Hertel, Thomas W.

    2016-01-01

    Using food prices to assess climate change impacts on food security is misleading. Differential impacts on income require a broader measure of household well-being, such as changes in absolute poverty.

  2. Security system

    DOEpatents

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  3. Image Security

    DTIC Science & Technology

    2007-11-02

    popularity, contemplates the cru- cial needs for protecting intellectual property rights on multimedia content like images, video, audio , and oth- ers...protection for still images, audio , video, and multimedia products.’ The networking environment of the future will require tools that provide m secure and fast...technique known as steganography ? Steganography , or “covered writing,” George Voyatzis and Ioannis Pitas University of Thessaloniki has a long

  4. Security seal

    DOEpatents

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  5. 78 FR 46594 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-01

    ... OMB Review: Aviation Security Customer Satisfaction Performance Measurement Passenger Survey AGENCY.... Information Collection Requirement Title: Aviation Security Customer Satisfaction Performance Measurement...; Aviation Security Customer Satisfaction Performance Measurement Passenger Survey. TSA, with OMB's...

  6. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1977-10-31

    searches. Perhaps the best evidence of the effectiveness of airline and airport security measures is the number of hijackings and related crimes...revision of the regulation that established basic airport security requirements is currently underway. One of the more significant revisions under study... airport security procedures cannot be determined with certainty. Nowever, the number of firearms detected at passenger screening points under suspicious

  7. Validating Cyber Security Requirements: A Case Study

    SciTech Connect

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, security should not be quantified by the number of vulnerabilities. Security should be managed by pursuing a policy that leads us first to the highest impact vulnerabilities. In light of these observations, we argue in favor of shifting our focus from vulnerability avoidance/removal to measurable security attributes. To this effect, we recommend a logic be used for system security, which captures/represents security properties in quantifiable, verifiable, measurable terms so that it is possible to reason about security in terms of its observable/perceptible effects rather than its hypothesized causes. This approach is orthogonal to existing techniques for vulnerability avoidance, removal, detection, and recovery, in the sense that it provides a means to assess, quantify, and combine these techniques.

  8. Secure Design Patterns

    DTIC Science & Technology

    2009-10-01

    access to the parent (s) or children of its corresponding locked node. It only contains the data specific to the node itself, that is, the data that... adopted by software development or- ganizations. While there are a number of best practices available to address the issue of software security... parent − does not gain control of a process possessing elevated privileges, thereby limiting the damage that the adversary can inflict • Additional

  9. [Food additives and healthiness].

    PubMed

    Heinonen, Marina

    2014-01-01

    Additives are used for improving food structure or preventing its spoilage, for example. Many substances used as additives are also naturally present in food. The safety of additives is evaluated according to commonly agreed principles. If high concentrations of an additive cause adverse health effects for humans, a limit of acceptable daily intake (ADI) is set for it. An additive is a risk only when ADI is exceeded. The healthiness of food is measured on the basis of nutrient density and scientifically proven effects.

  10. 33 CFR 105.296 - Additional requirements-barge fleeting facilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.296 Additional requirements-barge fleeting facilities. (a) At MARSEC Level 1, in addition to the requirements of... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Additional...

  11. 33 CFR 105.296 - Additional requirements-barge fleeting facilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.296 Additional requirements-barge fleeting facilities. (a) At MARSEC Level 1, in addition to the requirements of... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Additional...

  12. 33 CFR 105.296 - Additional requirements-barge fleeting facilities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.296 Additional requirements-barge fleeting facilities. (a) At MARSEC Level 1, in addition to the requirements of... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Additional...

  13. 33 CFR 105.296 - Additional requirements-barge fleeting facilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.296 Additional requirements-barge fleeting facilities. (a) At MARSEC Level 1, in addition to the requirements of... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Additional...

  14. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1978-03-31

    regulation that established basic airport security requirements is nearing final rulemaking action. One of the most significant revisions proposed would...prevented or deterred by airline and airport security procedures cannot be determined with certainty. However, the number of firearms detected at passenger...support for airline and airport security measures. And finally, with the inclusion of security costs in the operating expenses of U.S. air

  15. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1977-04-05

    diversions. Perhaps the best evidence of the effectiveness of airline and airport security measures is the number of hijackings and related crimes prevented...airports. Consideration is being given to include a provision in the airport security regulation which would prohibit the introduction of...Security Program. A complete revision of the regulation that established basic airport security requirements is currently underway. One of the more

  16. Employment security and health

    PubMed Central

    Virtanen, P; Vahtera, J; Kivimaki, M; Pentti, J; Ferrie, J

    2002-01-01

    Design: Cross sectional survey. Setting: Municipal sector employees in eight Finnish towns. Participants: 5981 employees with a permanent contract and 2786 employees with a non-permanent contract (2194 fixed term contract, 682 government subsidised contract). Outcome measures: Poor self rated health, chronic disease, and psychological distress. Results: Compared with permanent employees, fixed term men and women had better self rated health (men odds ratio 0.70; 95% confidence intervals 0.50 to 0.98, women 0.70 (0.60 to 0.82) and less chronic disease (men 0.69; 0.52 to 0.91; women 0.89; 0.79 to 1.02), but women had more psychological distress (1.26; 1.09 to 1.45). The only difference between subsidised employees and permanent employees was the high level of psychological distress in women (1.35; 1.09 to 1.68). Low perceived employment security was associated with poor health across all three indicators. The association of low perceived security with psychological distress was significantly stronger in permanent employees than among fixed term and subsidised employees, indicating that perceived security is more important for mental health among employees with a permanent contract. Conclusions: Contractual security and perceived security of employment are differently associated with health. It is therefore important to distinguish between these aspects of employment security in studies of labour market status and health. Such studies will also need to control for health selection, which is unlikely to operate in the same way among permanent and non-permanent employees. PMID:12118045

  17. Effects of water additions, chemical amendments, and plants on in situ measures of nutrient bioavailability in calcareous soils of southeastern Utah, USA

    USGS Publications Warehouse

    Miller, M.E.; Belnap, J.; Beatty, S.W.; Webb, B.L.

    2006-01-01

    We used ion-exchange resin bags to investigate effects of water additions, chemical amendments, and plant presence on in situ measures of nutrient bioavailability in conjunction with a study examining soil controls of ecosystem invasion by the exotic annual grass Bromus tectorum L. At five dryland sites in southeastern Utah, USA, resin bags were buried in experimental plots randomly assigned to combinations of two watering treatments (wet and dry), four chemical-amendment treatments (KCl, MgO, CaO, and no amendment), and four plant treatments (B. tectorum alone, the perennial bunchgrass Stipa hymenoides R. & S. alone, B. tectorum and S. hymenoides together, and no plants). Resin bags were initially buried in September 1997; replaced in January, April, and June 1998; and removed at the end of the study in October 1998. When averaged across watering treatments, plots receiving KCl applications had lower resin-bag NO 3- than plots receiving no chemical amendments during three of four measurement periods-probably due to NO 3- displacement from resin bags by Cl- ions. During the January-April period, KCl application in wet plots (but not dry plots) decreased resin-bag NH 4+ and increased resin-bag NO 3- . This interaction effect likely resulted from displacement of NH 4+ from resins by K+ ions, followed by nitrification and enhanced NO 3- capture by resin bags. In plots not receiving KCl applications, resin-bag NH 4+ was higher in wet plots than in dry plots during the same period. During the January-April period, resin-bag measures for carbonate-related ions HPO 42- , Ca2+, and Mn2+ tended to be greater in the presence of B. tectorum than in the absence of B. tectorum. This trend was evident only in wet plots where B. tectorum densities were much higher than in dry plots. We attribute this pattern to the mobilization of carbonate-associated ions by root exudates of B. tectorum. These findings indicate the importance of considering potential indirect effects of soil

  18. Small accessible quantum information does not imply security.

    PubMed

    König, Robert; Renner, Renato; Bariska, Andor; Maurer, Ueli

    2007-04-06

    The security of quantum key distribution is typically defined in terms of the mutual information between the distributed key S and the outcome of an optimal measurement applied to the adversary's system. We show that even if this so-called accessible information is small, the key S might not be secure enough to be used in applications such as one-time pad encryption. This flaw is due to a locking property of the accessible information: one additional (physical) bit of information can increase the accessible information by more than one bit.

  19. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1979-04-25

    the airline and airport security measures in effect. Moreover, of the 25 U.S. airline hijackings that occurred over this 6-year period, none was caused...Furthermore, it is estimated that 75 hijackings or related crimes may have been prevented by the airline and airport security measures in effect...system. Moreover, it is estimated that at least 75 hijackings or related crimes may have been prevented by U.S. airline and airport security measures

  20. Experimental Unconditionally Secure Bit Commitment

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Cao, Yuan; Curty, Marcos; Liao, Sheng-Kai; Wang, Jian; Cui, Ke; Li, Yu-Huai; Lin, Ze-Hong; Sun, Qi-Chao; Li, Dong-Dong; Zhang, Hong-Fei; Zhao, Yong; Chen, Teng-Yun; Peng, Cheng-Zhi; Zhang, Qiang; Cabello, Adán; Pan, Jian-Wei

    2014-01-01

    Quantum physics allows for unconditionally secure communication between parties that trust each other. However, when the parties do not trust each other such as in the bit commitment scenario, quantum physics is not enough to guarantee security unless extra assumptions are made. Unconditionally secure bit commitment only becomes feasible when quantum physics is combined with relativistic causality constraints. Here we experimentally implement a quantum bit commitment protocol with relativistic constraints that offers unconditional security. The commitment is made through quantum measurements in two quantum key distribution systems in which the results are transmitted via free-space optical communication to two agents separated with more than 20 km. The security of the protocol relies on the properties of quantum information and relativity theory. In each run of the experiment, a bit is successfully committed with less than 5.68×10-2 cheating probability. This demonstrates the experimental feasibility of quantum communication with relativistic constraints.

  1. Experimental unconditionally secure bit commitment

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Cao, Yuan; Curty, Marcos; Liao, Sheng-Kai; Wang, Jian; Cui, Ke; Li, Yu-Huai; Lin, Ze-Hong; Sun, Qi-Chao; Li, Dong-Dong; Zhang, Hong-Fei; Zhao, Yong; Chen, Teng-Yun; Peng, Cheng-Zhi; Zhang, Qiang; Cabello, Adan; Pan, Jian-Wei

    2014-03-01

    Quantum physics allows unconditionally secure communication between parties that trust each other. However, when they do not trust each other such as in the bit commitment, quantum physics is not enough to guarantee security. Only when relativistic causality constraints combined, the unconditional secure bit commitment becomes feasible. Here we experimentally implement a quantum bit commitment with relativistic constraints that offers unconditional security. The commitment is made through quantum measurements in two quantum key distribution systems in which the results are transmitted via free-space optical communication to two agents separated with more than 20 km. Bits are successfully committed with less than 5 . 68 ×10-2 cheating probability. This provides an experimental proof of unconditional secure bit commitment and demonstrates the feasibility of relativistic quantum communication.

  2. Nuclear security

    SciTech Connect

    Dingell, J.D.

    1991-02-01

    The Department of Energy's (DOE) Lawrence Livermore National Laboratory, located in Livermore, California, generates and controls large numbers of classified documents associated with the research and testing of nuclear weapons. Concern has been raised about the potential for espionage at the laboratory and the national security implications of classified documents being stolen. This paper determines the extent of missing classified documents at the laboratory and assesses the adequacy of accountability over classified documents in the laboratory's custody. Audit coverage was limited to the approximately 600,000 secret documents in the laboratory's custody. The adequacy of DOE's oversight of the laboratory's secret document control program was also assessed.

  3. 7 CFR 764.103 - General security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false General security requirements. 764.103 Section 764.103... security requirements. (a) Security requirements specific to each loan program are outlined in subparts D... included in the Agency's additional security requirement stated in paragraph (c) of this section....

  4. National security

    SciTech Connect

    Not Available

    1992-04-01

    This paper summarizes the views presented on October 31, 1991, at a GAO-sponsored conference on worldwide threats to U.S. national security. The conference was designed to provide insight into potential military threats to U.S. security interests and necessary modifications to current and planned U.S. forces to meet those threats. Conference participants, including defense analysts and retired military officers, discussed and analyzed the possibility of U.S. and allied involvement in various regional contingencies in Europe and the Soviet Union, Eat Asia and the Pacific, and the Near East and South Asia. Topics ranged from the possibility of nuclear war to a general discussion of low-intensity conflict. To serve as a starting point for discussion, we asked several of the participants to provide papers representing a wide range of views. The participants agreed that for many years the Soviet/Warsaw Pact threat to Europe shaped U.S. force planning but that the Soviet union no longer posed a conventional threat. Nuclear weapons held by the former Soviet republics and other nations, however, remain a concern. There was no agreement of the methodology for sizing U.S. forces. Some argued for sizing based on specific threats; other argued for flexibility to meet any and all contingencies and cited the Gulf War as a example.

  5. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  6. Keeping Nuclear Materials Secure

    SciTech Connect

    2016-10-19

    For 50 years, Los Alamos National Laboratory has been helping to keep nuclear materials secure. We do this by developing instruments and training inspectors that are deployed to other countries to make sure materials such as uranium are being used for peaceful purposes and not diverted for use in weapons. These measures are called “nuclear safeguards,” and they help make the world a safer place.

  7. Metaphors for cyber security.

    SciTech Connect

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  8. Consumers Are Ready to Accept the Transition to Online and Electronic Records If They Can Be Assured of the Security Measures

    PubMed Central

    Chhanabhai, Prajesh; Holt, Alec

    2007-01-01

    Background Healthcare has entered the electronic domain. This domain has improved data collection and storage abilities while allowing almost instantaneous access and results to data queries. Furthermore, it allows direct communication between healthcare providers and health consumers. The development of privacy, confidentiality, and security principles are necessary to protect consumers' interests against inappropriate access. Studies have shown that the health consumer is the important stakeholder in this process. With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective. Objective To examine the public's perception of the security of electronic systems and report on how their perceptions can shape the building of stronger systems. Methods A cross-sectional survey (September-November 2005) of people attending healthcare providers (n = 400) was conducted in the 4 major cities in New Zealand. Participants were surveyed on computer use, knowledge of EHR-proposed benefits and issues, security issues, and demographics. Results A total of 300 surveys were completed and returned (a 75% response rate), with 180 (60%) being women. One hundred eighty-eight (62.6%) had not heard of EHRs, with those who had heard of them indicating that they were a positive innovation in the health sector. However, 202 (73.3%) participants were highly concerned about the security and privacy of their health records. This feeling was further accentuated when participants were asked about security of electronic systems. Participants were worried about hackers (79.4%), vendor access (72.7%), and malicious software (68%). Participants were also introduced to various security systems, and in each case, over 80% of participants believed that these would make EHR systems more secure. A number of chi-square tests were carried out with each variable, and it was found that there were strong

  9. Aviation security x-ray detection challenges

    NASA Astrophysics Data System (ADS)

    Harvey, T.

    2016-05-01

    In this paper, a review of the background and some drivers are provided for X-ray screening for aviation security. Some of the key considerations are highlighted along with impacts of the image-based approaches and signature approaches. The role of information theory is discussed along with some recent work that may influence the technical direction by posing the question: "what measurements, parameters and metrics should be considered in future system design?" A path forward should be based on information theory, however electronic machines will likely interface with humans and be dollar-cost driven, so ultimately solutions must consider additional parameters other than only technical performance factors.

  10. 17 CFR 229.1118 - (Item 1118) Reports and additional information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1118) Reports and additional information. 229.1118 Section 229.1118 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT...

  11. 17 CFR 229.1118 - (Item 1118) Reports and additional information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false (Item 1118) Reports and additional information. 229.1118 Section 229.1118 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT...

  12. Metal-Polycyclic Aromatic Hydrocarbon Mixture Toxicity in Hyalella azteca. 1. Response Surfaces and Isoboles To Measure Non-additive Mixture Toxicity and Ecological Risk.

    PubMed

    Gauthier, Patrick T; Norwood, Warren P; Prepas, Ellie E; Pyle, Greg G

    2015-10-06

    Mixtures of metals and polycyclic aromatic hydrocarbons (PAHs) occur ubiquitously in aquatic environments, yet relatively little is known regarding their potential to produce non-additive toxicity (i.e., antagonism or potentiation). A review of the lethality of metal-PAH mixtures in aquatic biota revealed that more-than-additive lethality is as common as strictly additive effects. Approaches to ecological risk assessment do not consider non-additive toxicity of metal-PAH mixtures. Forty-eight-hour water-only binary mixture toxicity experiments were conducted to determine the additive toxic nature of mixtures of Cu, Cd, V, or Ni with phenanthrene (PHE) or phenanthrenequinone (PHQ) using the aquatic amphipod Hyalella azteca. In cases where more-than-additive toxicity was observed, we calculated the possible mortality rates at Canada's environmental water quality guideline concentrations. We used a three-dimensional response surface isobole model-based approach to compare the observed co-toxicity in juvenile amphipods to predicted outcomes based on concentration addition or effects addition mixtures models. More-than-additive lethality was observed for all Cu-PHE, Cu-PHQ, and several Cd-PHE, Cd-PHQ, and Ni-PHE mixtures. Our analysis predicts Cu-PHE, Cu-PHQ, Cd-PHE, and Cd-PHQ mixtures at the Canadian Water Quality Guideline concentrations would produce 7.5%, 3.7%, 4.4% and 1.4% mortality, respectively.

  13. Tabulated pressure measurements of a NASA supercritical-wing research airplane model with and without fuselage area-rule additions at Mach 0.25 to 1.00

    NASA Technical Reports Server (NTRS)

    Harris, C. D.; Bartlett, D. W.

    1972-01-01

    Basic pressure measurements were made on a 0.087-scale model of a supercritical wing research airplane in the Langley 8 foot transonic pressure tunnel at Mach numbers from 0.25 to 1.00 to determine the effects on the local aerodynamic loads over the wing and rear fuselage of area-rule additions to the sides of the fuselage. In addition, pressure measurements over the surface of the area-rule additions themselves were obtained at angles of sideslip of approximately - 5 deg, 0 deg, and 5 deg to aid in the structural design of the additions. Except for representative figures, results are presented in tabular form without analysis.

  14. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    PubMed

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  15. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles

    PubMed Central

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming – activating supportive representations of attachment security – on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed. PMID:27610092

  16. Governing for Enterprise Security

    DTIC Science & Technology

    2005-06-01

    1 2 W hat Is Governing for Enterprise Security? ................................................ 5 3 W hat Are the Risks...23 4.3 Determ ining Adequate Security ........................................................ 25 5 What Are the...security. Section 4 lays the foundation for determining how much security is enough and further expands the definition of adequate security. Section 5

  17. Security for grids

    SciTech Connect

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  18. 17 CFR 48.10 - Additional contracts.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Additional contracts. 48.10...) REGISTRATION OF FOREIGN BOARDS OF TRADE § 48.10 Additional contracts. (a) Generally. A registered foreign board of trade that wishes to make an additional futures, option or swap contract available for trading...

  19. 17 CFR 48.10 - Additional contracts.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Additional contracts. 48.10... FOREIGN BOARDS OF TRADE § 48.10 Additional contracts. (a) Generally. A registered foreign board of trade that wishes to make an additional futures, option or swap contract available for trading by...

  20. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1981-04-15

    on item were processed through the screening system daily. The airline and airport security measures developed continue to provide increased safety...United States or Puerto Rico. None of these 16 hijackings resulted from insufficient airport security measures or a breakdown in the FAA-approved airport ... airport security programs is conducted at the Transportation Safety Institute in Oklahoma City, Oklahoma. The course provides in-depth coverage of civil

  1. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    ERIC Educational Resources Information Center

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  2. 76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-21

    ... a cyber network security assessment so that a full measure of gaps and capabilities can be completed... SECURITY Nationwide Cyber Security Review (NCSR) Assessment AGENCY: National Protection and Programs.... SUMMARY: The Department of Homeland Security (DHS), National Protection and Programs Directorate...

  3. 76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-21

    ... government to complete a cyber network security assessment so that a full measure of gaps and capabilities... SECURITY Nationwide Cyber Security Review (NCSR) Assessment AGENCY: National Protection and Programs...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD),...

  4. 10 CFR 37.43 - General security program requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    .... (a) Security plan. (1) Each licensee identified in § 37.41(a) shall develop a written security plan specific to its facilities and operations. The purpose of the security plan is to establish the licensee's... required by this subpart. The security plan must, at a minimum: (i) Describe the measures and...

  5. Unfalsifiability of security claims

    PubMed Central

    Herley, Cormac

    2016-01-01

    There is an inherent asymmetry in computer security: Things can be declared insecure by observation, but not the reverse. There is no observation that allows us to declare an arbitrary system or technique secure. We show that this implies that claims of necessary conditions for security (and sufficient conditions for insecurity) are unfalsifiable. This in turn implies an asymmetry in self-correction: Whereas the claim that countermeasures are sufficient is always subject to correction, the claim that they are necessary is not. Thus, the response to new information can only be to ratchet upward: Newly observed or speculated attack capabilities can argue a countermeasure in, but no possible observation argues one out. Further, when justifications are unfalsifiable, deciding the relative importance of defensive measures reduces to a subjective comparison of assumptions. Relying on such claims is the source of two problems: once we go wrong we stay wrong and errors accumulate, and we have no systematic way to rank or prioritize measures. PMID:27217574

  6. Secure and Efficient Reactive Video Surveillance for Patient Monitoring

    PubMed Central

    Braeken, An; Porambage, Pawani; Gurtov, Andrei; Ylianttila, Mika

    2016-01-01

    Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient’s side. PMID:26729130

  7. Security of healthcare information systems based on the CORBA middleware.

    PubMed

    Blobel, B; Holena, M

    1997-01-01

    The development of healthcare systems in accordance to the "Shared Care" paradigm results in co-operative health information systems across the boundaries of organisational, technological, and policy domains. Increasingly, these distributed and heterogeneous systems are based on middleware approaches, such as CORBA. Regarding the sensitivity of personal and medical data, such open, distributed, and heterogeneous health information systems demand a high level of data protection and data security, both with respect to patient information and with respect to users. The security concepts and measures available and additionally needed in health information systems based on CORBA architecture are described in this paper. The proposed security solution is also open to other middleware approaches, such as DHE or HL7.

  8. Loss-tolerant quantum secure positioning with weak laser sources

    SciTech Connect

    Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George; Chitambar, Eric; Evans, Philip G.; Qi, Bing

    2016-09-14

    Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. It has recently been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here in this paper, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit. Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. Lastly, in this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.

  9. Secure and Efficient Reactive Video Surveillance for Patient Monitoring.

    PubMed

    Braeken, An; Porambage, Pawani; Gurtov, Andrei; Ylianttila, Mika

    2016-01-02

    Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient's side.

  10. Loss-tolerant quantum secure positioning with weak laser sources

    NASA Astrophysics Data System (ADS)

    Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George; Chitambar, Eric; Evans, Philip G.; Qi, Bing

    2016-09-01

    Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. Recently, it has been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit. Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. In this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.

  11. 33 CFR 104.297 - Additional requirements-vessels on international voyages.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.297 Additional requirements—vessels on international voyages. (a) An owner or operator of a U.S... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Additional...

  12. 33 CFR 104.297 - Additional requirements-vessels on international voyages.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.297 Additional requirements—vessels on international voyages. (a) An owner or operator of a U.S... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Additional...

  13. 33 CFR 104.297 - Additional requirements-vessels on international voyages.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.297 Additional requirements—vessels on international voyages. (a) An owner or operator of a U.S... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Additional...

  14. 26 CFR 1.356-1 - Receipt of additional consideration in connection with an exchange.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Security Holders § 1.356-1 Receipt of additional consideration in connection with an exchange. (a) If in... that there is received by the shareholders or security holders other property (in addition to property... security surrendered or a particular class of stock or securities surrendered, such terms shall...

  15. AVIATION SECURITY: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify Screening Companies

    DTIC Science & Technology

    1999-02-01

    Actions to Study Responsibilities and Funding for Airport Security and to Certify Screening Companies DISTRIBUTION STATEMENT A Approved for...local law enforcement support relating to air carrier and airport security measures. The funding of the security operations is divided among FAA, the...generally agreed with the current division of airport security responsibilities. These officials stated that the continuity of screening would be

  16. Transportation Security Administration

    MedlinePlus

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? ... form Search the Site Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  17. Mars Albedo Measurement in the Near IR Range for Additional Calibration of the TIRVIM Instrument of the ExoMars-2016 Mission

    NASA Astrophysics Data System (ADS)

    Maslov, I. A.; Shenavrin, V. I.; Grigoriev, A. V.; Moshkin, B. E.; Shakun, A. V.

    2017-01-01

    Results of ground-based measurements of the Mars albedo in the spectral range 1-5 μm, which were held in the days close to the session of measurements from the Mars orbit by the Russian device TIRVIM, are presented. The obtained data can be used to refine the calibration of the instrument.

  18. Asian Energy Security

    SciTech Connect

    Peter Hayes, PhD

    2003-12-01

    OAK-B135 In the Asian Energy Security (AES) Project, Nautilus Institute works together with a network of collaborating groups from the countries of Northeast Asia to evaluate the energy security implications of different national and regional energy ''paths''. The goal of the Asia Energy Security project is to illuminate energy paths--and the energy policy choices that might help to bring them about--that result in a higher degree of energy security for the region and for the world as a whole, that is, to identify energy paths that are ''robust'' in meeting many different energy security and development objectives, while also offering flexibility in the face of uncertainty. In work to date, Nautilus has carefully assembled a network of colleagues from the countries of the region, trained them together as a group in the use of a common, flexible, and transparent energy and environmental analysis planning software tool (LEAP, the Long-range Energy Alternatives Planning system), and worked with them to prepare base-year energy sector models for each country. To date, complete data sets and models for ''Business as Usual'' (BAU) energy paths have been compiled for China, Japan, the Republic of Korea, and the Democratic Peoples' Republic of Korea. A partial data set and BAU path has been compiled for the Russian Far East, and a data set is being started in Mongolia, where a team of researchers has just joined the AES project. In several countries, ''Alternative'' energy paths have been developed as well, or partially elaborated. National energy sector developments, progress on national LEAP modeling, additional LEAP training, and planning for the next phase of the AES project were the topics of a recent (early November) workshop held in Vancouver, British Columbia. With funding from the Department of Energy, Nautilus is poised to build upon the successes of the project to date with a coordinated international effort to research the energy security ramifications of

  19. Security Force Assistance and Security Sector Reform

    DTIC Science & Technology

    2013-09-01

    development, and planning, 63 Shultz: Security Force Assistance and Security Sector Reform budgeting and management are critical in reforming a defense...and Security Sector Reform Richard H. Shultz, Jr. JSOU Report 13-5 September 2013 Joint Special Operations University 7701 Tampa Point Boulevard...Assistance and Security Sector Reform 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK

  20. 50 CFR 453.06 - Additional Committee powers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF COMMERCE); ENDANGERED SPECIES COMMITTEE REGULATIONS ENDANGERED SPECIES EXEMPTION PROCESS ENDANGERED SPECIES COMMITTEE § 453.06 Additional Committee powers. (a) Secure information....

  1. 50 CFR 453.06 - Additional Committee powers.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ADMINISTRATION, DEPARTMENT OF COMMERCE); ENDANGERED SPECIES COMMITTEE REGULATIONS ENDANGERED SPECIES EXEMPTION PROCESS ENDANGERED SPECIES COMMITTEE § 453.06 Additional Committee powers. (a) Secure information....

  2. 50 CFR 453.06 - Additional Committee powers.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ADMINISTRATION, DEPARTMENT OF COMMERCE); ENDANGERED SPECIES COMMITTEE REGULATIONS ENDANGERED SPECIES EXEMPTION PROCESS ENDANGERED SPECIES COMMITTEE § 453.06 Additional Committee powers. (a) Secure information....

  3. 50 CFR 453.06 - Additional Committee powers.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ADMINISTRATION, DEPARTMENT OF COMMERCE); ENDANGERED SPECIES COMMITTEE REGULATIONS ENDANGERED SPECIES EXEMPTION PROCESS ENDANGERED SPECIES COMMITTEE § 453.06 Additional Committee powers. (a) Secure information....

  4. 50 CFR 453.06 - Additional Committee powers.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... ADMINISTRATION, DEPARTMENT OF COMMERCE); ENDANGERED SPECIES COMMITTEE REGULATIONS ENDANGERED SPECIES EXEMPTION PROCESS ENDANGERED SPECIES COMMITTEE § 453.06 Additional Committee powers. (a) Secure information....

  5. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  6. Secure Storage Architectures

    SciTech Connect

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to

  7. Redefining security.

    PubMed

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  8. Security Technologies for Open Networking Environments (STONE)

    SciTech Connect

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  9. United States security strategy for the east Asia-Pacific region

    SciTech Connect

    1995-02-01

    The United States National Security Strategy published in July 1994 is based on enlarging the community of market democracies while deterring and containing a range of threats to our nation, our allies and our interests. Focusing on new threats and new opportunities, its central goals are: to enhance security by maintaining a strong defense capability and promoting cooperative security measures; to open foreign markets and spur global economic growth; and to promote democracy abroad. In accordance with the National Security Strategy, this document explains United States defense policy toward furthering these goals in the Asia-Pacific region. It builds upon the Strategy`s emphasis on maintaining a strong defense capability to enhance U.S. security and to provide a foundation for regional stability through mutually beneficial security partnerships. As the Strategy states, East Asia is a region of growing importance to American goals: nowhere are the strands of our three-part strategy more intertwined; nowhere is the need for continued engagement more evident. In thinking about the Asia-Pacific region, security comes first, and a committed United States military presence will continue to serve as a bedrock for America`s security role in this dynamic area of the world. The regional security strategy for the Asia-Pacific region emphasizes strengthening the bilateral alliances that have been at the heart of United States strategy for more than forty years. The United States is also committed to contribute to regional security through active participation in new multi-lateral fora like the ASEAN Regional Forum. Through such multi-lateral mechanisms the countries of the region seek to develop new cooperative approaches to achieve greater stability and security. Additionally, the Pacific Command sponsors multi-national military activities.

  10. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  11. Quality of protection evaluation of security mechanisms.

    PubMed

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.

  12. Quality of Protection Evaluation of Security Mechanisms

    PubMed Central

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol. PMID:25136683

  13. Security customer services: the tangibles and intangibles.

    PubMed

    Bailey, James O

    2014-01-01

    The hospital security officer of all hospital employees, has many opportunities to provide customer service, in addition to traditional security services, according to the author. In this article, he gives examples of intangible benefits which can be achieved when carrying out tangible duties.

  14. Emerging Technology for School Security

    ERIC Educational Resources Information Center

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  15. 30 CFR 250.406 - What additional safety measures must I take when I conduct drilling operations on a platform that...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... when I conduct drilling operations on a platform that has producing wells or has other hydrocarbon flow... hydrocarbon flow? You must take the following safety measures when you conduct drilling operations on a platform with producing wells or that has other hydrocarbon flow: (a) You must install an...

  16. Cyberspace security system

    DOEpatents

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  17. Chapter 3: Energy Security

    SciTech Connect

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  18. Building Security into Schools.

    ERIC Educational Resources Information Center

    Kosar, John E.; Ahmed, Faruq

    2000-01-01

    Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…

  19. Unix Security Cookbook

    NASA Astrophysics Data System (ADS)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  20. School Security Roundtable, 2000.

    ERIC Educational Resources Information Center

    Agron, Joe, Ed.; Anderson, Larry, Ed.

    A roundtable discussion is presented revealing what experts say about school security problems and how they are being addressed. Also included are trend data from the School Security 2000 survey revealing top security concerns, strategies, and security equipment preferences; how site surveys can be used to keep schools safe; and how creating a…

  1. 7 CFR 766.112 - Additional security for restructured loans.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... sources; (2) When the property could have significant environmental problems or costs as described in..., retirement accounts, personal vehicles necessary for family living, household contents, or small...

  2. 7 CFR 766.112 - Additional security for restructured loans.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... sources; (2) When the property could have significant environmental problems or costs as described in..., retirement accounts, personal vehicles necessary for family living, household contents, or small...

  3. Secure videoconferencing equipment switching system and method

    DOEpatents

    Hansen, Michael E.

    2009-01-13

    A switching system and method are provided to facilitate use of videoconference facilities over a plurality of security levels. The system includes a switch coupled to a plurality of codecs and communication networks. Audio/Visual peripheral components are connected to the switch. The switch couples control and data signals between the Audio/Visual peripheral components and one but nor both of the plurality of codecs. The switch additionally couples communication networks of the appropriate security level to each of the codecs. In this manner, a videoconferencing facility is provided for use on both secure and non-secure networks.

  4. A Secure Architecture for Voting Electronically (SAVE)

    NASA Astrophysics Data System (ADS)

    Goler, Jonathan A.; Selker, Edwin J.

    Electronic voting has the potential to be the most reliable, secure and trustworthy form of voting implemented. Digital technology, complete with error correction, robust storage and cryptographic security offers the possibility to record, transmit, store and tabulate votes far more reliably than paper. While current implementations of electronic voting have been susceptible to various failures, electronic voting itself is not fundamentally flawed. The Secure Architecture for Voting Electronically (SAVE) is one proposed architecture for mitigating security and trust issues with the voting process. In addition, the architecture enables academics, small companies and organizations to easily and cheaply build their own modules conforming to the standard.

  5. Accounting Issues: An Essay Series Part VI--Investments in Securities

    ERIC Educational Resources Information Center

    Laux, Judy

    2008-01-01

    The sixth in a series of theory-based essays, this article presents accounting for investments in debt and equity securities along with some related conceptual and measurement issues. Additional coverage is devoted to potential ethical dilemmas and both theoretical and empirical literature related to this asset. (Contains 1 footnote.)

  6. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1976-09-20

    commerce--a pr per balance appears to exist. Moreover, airline and airport security programs appear to be capable of responding to changes in the nature...Moreover, airline and airport security programs appear to be capable of responding to changes in the nature and level of current and future threats. The...delays and diversions were experienced. Airline and airport security measures continued to afford the necessary level of protection to U.S. air

  7. Texting "boosts" felt security.

    PubMed

    Otway, Lorna J; Carnelley, Katherine B; Rowe, Angela C

    2014-01-01

    Attachment security can be induced in laboratory settings (e.g., Rowe & Carnelley, 2003) and the beneficial effects of repeated security priming can last for a number of days (e.g., Carnelley & Rowe, 2007). The priming process, however, can be costly in terms of time. We explored the effectiveness of security priming via text message. Participants completed a visualisation task (a secure attachment experience or neutral experience) in the laboratory. On three consecutive days following the laboratory task, participants received (secure or neutral) text message visualisation tasks. Participants in the secure condition reported significantly higher felt security than those in the neutral condition, immediately after the laboratory prime, after the last text message prime and one day after the last text prime. These findings suggest that security priming via text messages is an innovative methodological advancement that effectively induces felt security, representing a potential direction forward for security priming research.

  8. Development and validation of an Arab family food security scale.

    PubMed

    Sahyoun, Nadine R; Nord, Mark; Sassine, Anniebelle J; Seyfert, Karin; Hwalla, Nahla; Ghattas, Hala

    2014-05-01

    The objective of this article was to describe 1) the validation of 2 similar but not identical food security modules used to collect data from 2 vulnerable populations, southern Lebanon residents (n = 815) and Palestinian refugees in Lebanon (n = 2501), and 2) the development and validation of an Arab Family Food Security Scale (AFFSS). The surveys used a cluster-randomized sampling design. The 2 food security subscales underwent face and construct validity. In addition, both of these tools and the AFFSS underwent psychometric assessment for internal validity by using statistical methods based on Item Response Theory. The food security questions tested by focus groups were understood and accepted in all regions of Lebanon. The food security subscales and the AFFSS had acceptable levels of internal consistency. The psychometric assessment confirmed that the 7 items of the AFFSS had good internal validity and reasonable reliability with item in-fits from 0.73 to 1.16. Food insecurity was identified among 42% of southern Lebanese and 62% of Palestinian refugee households. The determinants and consequences of food security measured in this study provide additional support for the validity of the modules. Using multivariate logistic regression, the higher the mean monthly income per household member and the higher the educational attainment of the head of household, the lower the risk of food insecurity [ORs (95% CIs): 0.99 (0.98, 0.99) and 0.66 (0.54, 0.80), respectively]. There was a strong significant association between food insecurity and lower food expenditure and lower intake of all food categories except for legumes, which was significantly associated in the opposite direction (P < 0.001). The odds of borrowing money and accepting gifts/donations were significantly higher among moderately and severely food-insecure households (P < 0.000). The AFFSS has been validated within Lebanon and can potentially be extended to other Arab-speaking populations.

  9. Stellar Diameters and Temperatures. III. Main-sequence A, F, G, and K Stars: Additional High-precision Measurements and Empirical Relations

    NASA Astrophysics Data System (ADS)

    Boyajian, Tabetha S.; von Braun, Kaspar; van Belle, Gerard; Farrington, Chris; Schaefer, Gail; Jones, Jeremy; White, Russel; McAlister, Harold A.; ten Brummelaar, Theo A.; Ridgway, Stephen; Gies, Douglas; Sturmann, Laszlo; Sturmann, Judit; Turner, Nils H.; Goldfinger, P. J.; Vargas, Norm

    2013-07-01

    Based on CHARA Array measurements, we present the angular diameters of 23 nearby, main-sequence stars, ranging from spectral types A7 to K0, 5 of which are exoplanet host stars. We derive linear radii, effective temperatures, and absolute luminosities of the stars using Hipparcos parallaxes and measured bolometric fluxes. The new data are combined with previously published values to create an Angular Diameter Anthology of measured angular diameters to main-sequence stars (luminosity classes V and IV). This compilation consists of 125 stars with diameter uncertainties of less than 5%, ranging in spectral types from A to M. The large quantity of empirical data is used to derive color-temperature relations to an assortment of color indices in the Johnson (BVR J I J JHK), Cousins (R C I C), Kron (R K I K), Sloan (griz), and WISE (W 3 W 4) photometric systems. These relations have an average standard deviation of ~3% and are valid for stars with spectral types A0-M4. To derive even more accurate relations for Sun-like stars, we also determined these temperature relations omitting early-type stars (T eff > 6750 K) that may have biased luminosity estimates because of rapid rotation; for this subset the dispersion is only ~2.5%. We find effective temperatures in agreement within a couple of percent for the interferometrically characterized sample of main-sequence stars compared to those derived via the infrared flux method and spectroscopic analysis.

  10. 46 CFR 117.25 - Additional requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Additional requirements. 117.25 Section 117.25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS CARRYING MORE THAN 150... General Provisions § 117.25 Additional requirements. (a) Each item of lifesaving equipment carried...

  11. 46 CFR 117.25 - Additional requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Additional requirements. 117.25 Section 117.25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS CARRYING MORE THAN 150... General Provisions § 117.25 Additional requirements. (a) Each item of lifesaving equipment carried...

  12. 46 CFR 117.25 - Additional requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Additional requirements. 117.25 Section 117.25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS CARRYING MORE THAN 150... General Provisions § 117.25 Additional requirements. (a) Each item of lifesaving equipment carried...

  13. STELLAR DIAMETERS AND TEMPERATURES. III. MAIN-SEQUENCE A, F, G, AND K STARS: ADDITIONAL HIGH-PRECISION MEASUREMENTS AND EMPIRICAL RELATIONS

    SciTech Connect

    Boyajian, Tabetha S.; Jones, Jeremy; White, Russel; McAlister, Harold A.; Gies, Douglas; Von Braun, Kaspar; Van Belle, Gerard; Farrington, Chris; Schaefer, Gail; Ten Brummelaar, Theo A.; Sturmann, Laszlo; Sturmann, Judit; Turner, Nils H.; Goldfinger, P. J.; Vargas, Norm; Ridgway, Stephen

    2013-07-01

    Based on CHARA Array measurements, we present the angular diameters of 23 nearby, main-sequence stars, ranging from spectral types A7 to K0, 5 of which are exoplanet host stars. We derive linear radii, effective temperatures, and absolute luminosities of the stars using Hipparcos parallaxes and measured bolometric fluxes. The new data are combined with previously published values to create an Angular Diameter Anthology of measured angular diameters to main-sequence stars (luminosity classes V and IV). This compilation consists of 125 stars with diameter uncertainties of less than 5%, ranging in spectral types from A to M. The large quantity of empirical data is used to derive color-temperature relations to an assortment of color indices in the Johnson (BVR{sub J} I{sub J} JHK), Cousins (R{sub C} I{sub C}), Kron (R{sub K} I{sub K}), Sloan (griz), and WISE (W{sub 3} W{sub 4}) photometric systems. These relations have an average standard deviation of {approx}3% and are valid for stars with spectral types A0-M4. To derive even more accurate relations for Sun-like stars, we also determined these temperature relations omitting early-type stars (T{sub eff} > 6750 K) that may have biased luminosity estimates because of rapid rotation; for this subset the dispersion is only {approx}2.5%. We find effective temperatures in agreement within a couple of percent for the interferometrically characterized sample of main-sequence stars compared to those derived via the infrared flux method and spectroscopic analysis.

  14. The limitations of tissue-oxygen measurement and positron emission tomography as additional methods for postoperative breast reconstruction free-flap monitoring.

    PubMed

    Schrey, Aleksi; Niemi, Tarja; Kinnunen, Ilpo; Minn, Heikki; Vahlberg, Tero; Kalliokoski, Kari; Suominen, Erkki; Grénman, Reidar; Aitasalo, Kalle

    2010-02-01

    Twelve patients who underwent breast reconstruction with a microvascular flap were monitored postoperatively with continuous partial tissue oxygenation (p(ti)O(2)) measurement. The regional blood flow (BF) of the entire flap was evaluated with positron emission tomography (PET) using oxygen-15-labelled water on the first postoperative (POP) morning to achieve data of the perfusion of the entire flap. A re-exploration was carried out if the p(ti)O(2) value remained lower than 15 mmHg for over 30 min. The mean p(ti)O(2) value of the flaps was 52.9+/-5.5 mmHg, whereas the mean BF values were 3.3+/-1.0 ml per 100 g min(-1). One false-positive result was detected by p(ti)O(2) measurement, resulting in an unnecessary re-exploration. Another re-operation suggested by the low p(ti)O(2) results was avoided due to the normal BF results assessed with PET. Totally, three flaps were re-explored. This prospective study suggests that continuous tissue-oxygen measurement with a polarographic needle probe is reliable for monitoring free breast flaps from one part of the flap, but assessing perfusion of the entire flap requires more complex monitoring methods, for example, PET. Clinical examination by experienced personnel remains important in free-breast-flap monitoring. PET could be useful in assessing free-flap perfusion in selected high-risk patients as an alternative to a re-operation when clinical examination and evaluation by other means are unreliable or present controversial results.

  15. Energy Security is National Security

    DTIC Science & Technology

    2011-03-11

    reactors p.nd even opened up drilling in the Arctic National Wildlife Refuge ( ANWR ). However, the reality is, "Oil company experts believe ... in at...best 10 years time, ANWR could boost American production by 600,000 barrels a day.ŝ Additionally, it will take decades to build nuclear power plants...naturally make·the altermitive fuels cheaper and thus more attractive. Finally, further domestic drilling in the Arctic National Wildlife Refuge ( ANWR ) and

  16. Measurement of $\\mathrm{ t \\bar{t} } $ production with additional jet activity, including b quark jets, in the dilepton decay channel using pp collisions at $\\sqrt{s} =$ 8 TeV

    SciTech Connect

    Khachatryan, Vardan

    2016-07-07

    Jet multiplicity distributions in top quark pair (tt-bar) events are measured in pp collisions at a centre-of-mass energy of 8 TeV with the CMS detector at the LHC using a data set corresponding to an integrated luminosity of 19.7 fb-1. The measurement is performed in the dilepton decay channels (e+e-+μ- and e±μ). Furthermore, the absolute and normalized differential cross sections for tt-bar production are measured as a function of the jet multiplicity in the event for different jet transverse momentum thresholds and the kinematic properties of the leading additional jets. The differential tt-barb and tt-barbb-bar cross sections are presented for the first time as a function of the kinematic properties of the leading additional b jets. Furthermore, the fraction of events without additional jets above a threshold is measured as a function of the transverse momenta of the leading additional jets and the scalar sum of the transverse momenta of all additional jets. Finally, the data are compared and found to be consistent with predictions from several perturbative quantum chromodynamics event generators and a next-to-leading ordercalculation.

  17. Measurement of $$\\mathrm{ t \\bar{t} } $$ production with additional jet activity, including b quark jets, in the dilepton decay channel using pp collisions at $$\\sqrt{s} =$$ 8 TeV

    DOE PAGES

    Khachatryan, Vardan

    2016-07-07

    Jet multiplicity distributions in top quark pair (tt-bar) events are measured in pp collisions at a centre-of-mass energy of 8 TeV with the CMS detector at the LHC using a data set corresponding to an integrated luminosity of 19.7 fb-1. The measurement is performed in the dilepton decay channels (e+e-,μ+μ- and e±μ∓). Furthermore, the absolute and normalized differential cross sections for tt-bar production are measured as a function of the jet multiplicity in the event for different jet transverse momentum thresholds and the kinematic properties of the leading additional jets. The differential tt-barb and tt-barbb-bar cross sections are presented formore » the first time as a function of the kinematic properties of the leading additional b jets. Furthermore, the fraction of events without additional jets above a threshold is measured as a function of the transverse momenta of the leading additional jets and the scalar sum of the transverse momenta of all additional jets. Finally, the data are compared and found to be consistent with predictions from several perturbative quantum chromodynamics event generators and a next-to-leading ordercalculation.« less

  18. Measurement of toverline{t} production with additional jet activity, including b quark jets, in the dilepton decay channel using pp collisions at √{s} = 8 {TeV}

    NASA Astrophysics Data System (ADS)

    Khachatryan, V.; Sirunyan, A. M.; Tumasyan, A.; Adam, W.; Asilar, E.; Bergauer, T.; Brandstetter, J.; Brondolin, E.; Dragicevic, M.; Erö, J.; Friedl, M.; Frühwirth, R.; Ghete, V. M.; Hartl, C.; Hörmann, N.; Hrubec, J.; Jeitler, M.; Knünz, V.; König, A.; Krammer, M.; Krätschmer, I.; Liko, D.; Matsushita, T.; Mikulec, I.; Rabady, D.; Rahbaran, B.; Rohringer, H.; Schieck, J.; Schöfbeck, R.; Strauss, J.; Treberer-Treberspurg, W.; Waltenberger, W.; Wulz, C.-E.; Mossolov, V.; Shumeiko, N.; Suarez Gonzalez, J.; Alderweireldt, S.; Cornelis, T.; de Wolf, E. A.; Janssen, X.; Knutsson, A.; Lauwers, J.; Luyckx, S.; van de Klundert, M.; van Haevermaet, H.; van Mechelen, P.; van Remortel, N.; van Spilbeeck, A.; Abu Zeid, S.; Blekman, F.; D'Hondt, J.; Daci, N.; de Bruyn, I.; Deroover, K.; Heracleous, N.; Keaveney, J.; Lowette, S.; Moreels, L.; Olbrechts, A.; Python, Q.; Strom, D.; Tavernier, S.; van Doninck, W.; van Mulders, P.; van Onsem, G. P.; van Parijs, I.; Barria, P.; Brun, H.; Caillol, C.; Clerbaux, B.; de Lentdecker, G.; Fasanella, G.; Favart, L.; Grebenyuk, A.; Karapostoli, G.; Lenzi, T.; Léonard, A.; Maerschalk, T.; Marinov, A.; Perniè, L.; Randle-Conde, A.; Reis, T.; Seva, T.; Vander Velde, C.; Yonamine, R.; Vanlaer, P.; Yonamine, R.; Zenoni, F.; Zhang, F.; Adler, V.; Beernaert, K.; Benucci, L.; Cimmino, A.; Crucy, S.; Dobur, D.; Fagot, A.; Garcia, G.; Gul, M.; McCartin, J.; Ocampo Rios, A. A.; Poyraz, D.; Ryckbosch, D.; Salva, S.; Sigamani, M.; Strobbe, N.; Tytgat, M.; van Driessche, W.; Yazgan, E.; Zaganidis, N.; Basegmez, S.; Beluffi, C.; Bondu, O.; Brochet, S.; Bruno, G.; Caudron, A.; Ceard, L.; da Silveira, G. G.; Delaere, C.; Favart, D.; Forthomme, L.; Giammanco, A.; Hollar, J.; Jafari, A.; Jez, P.; Komm, M.; Lemaitre, V.; Mertens, A.; Musich, M.; Nuttens, C.; Perrini, L.; Pin, A.; Piotrzkowski, K.; Popov, A.; Quertenmont, L.; Selvaggi, M.; Vidal Marono, M.; Beliy, N.; Hammad, G. H.; Júnior, W. L. Aldá; Alves, F. L.; Alves, G. A.; Brito, L.; Correa Martins Junior, M.; Hamer, M.; Hensel, C.; Mora Herrera, C.; Moraes, A.; Pol, M. E.; Rebello Teles, P.; Belchior Batista Das Chagas, E.; Carvalho, W.; Chinellato, J.; Custódio, A.; da Costa, E. M.; de Jesus Damiao, D.; de Oliveira Martins, C.; Fonseca de Souza, S.; Huertas Guativa, L. M.; Malbouisson, H.; Matos Figueiredo, D.; Mundim, L.; Nogima, H.; Prado da Silva, W. L.; Santoro, A.; Sznajder, A.; Tonelli Manganote, E. J.; Vilela Pereira, A.; Ahuja, S.; Bernardes, C. A.; de Souza Santos, A.; Dogra, S.; Fernandez Perez Tomei, T. R.; Gregores, E. M.; Mercadante, P. G.; Moon, C. S.; Novaes, S. F.; Padula, Sandra S.; Romero Abad, D.; Ruiz Vargas, J. C.; Aleksandrov, A.; Hadjiiska, R.; Iaydjiev, P.; Rodozov, M.; Stoykova, S.; Sultanov, G.; Vutova, M.; Dimitrov, A.; Glushkov, I.; Litov, L.; Pavlov, B.; Petkov, P.; Ahmad, M.; Bian, J. G.; Chen, G. M.; Chen, H. S.; Chen, M.; Cheng, T.; Du, R.; Jiang, C. H.; Plestina, R.; Romeo, F.; Shaheen, S. M.; Spiezia, A.; Tao, J.; Wang, C.; Wang, Z.; Zhang, H.; Asawatangtrakuldee, C.; Ban, Y.; Li, Q.; Liu, S.; Mao, Y.; Qian, S. J.; Wang, D.; Xu, Z.; Avila, C.; Cabrera, A.; Chaparro Sierra, L. F.; Florez, C.; Gomez, J. P.; Gomez Moreno, B.; Sanabria, J. C.; Godinovic, N.; Lelas, D.; Puljak, I.; Ribeiro Cipriano, P. M.; Antunovic, Z.; Kovac, M.; Brigljevic, V.; Kadija, K.; Luetic, J.; Micanovic, S.; Sudic, L.; Attikis, A.; Mavromanolakis, G.; Mousa, J.; Nicolaou, C.; Ptochos, F.; Razis, P. A.; Rykaczewski, H.; Bodlak, M.; Finger, M.; Finger, M.; El Sawy, M.; El-Khateeb, E.; Elkafrawy, T.; Mohamed, A.; Salama, E.; Calpas, B.; Kadastik, M.; Murumaa, M.; Raidal, M.; Tiko, A.; Veelken, C.; Eerola, P.; Pekkanen, J.; Voutilainen, M.; Härkönen, J.; Karimäki, V.; Kinnunen, R.; Lampén, T.; Lassila-Perini, K.; Lehti, S.; Lindén, T.; Luukka, P.; Mäenpää, T.; Peltola, T.; Tuominen, E.; Tuominiemi, J.; Tuovinen, E.; Wendland, L.; Talvitie, J.; Tuuva, T.; Besancon, M.; Couderc, F.; Dejardin, M.; Denegri, D.; Fabbro, B.; Faure, J. L.; Favaro, C.; Ferri, F.; Ganjour, S.; Givernaud, A.; Gras, P.; Hamel de Monchenault, G.; Jarry, P.; Locci, E.; Machet, M.; Malcles, J.; Rander, J.; Rosowsky, A.; Titov, M.; Zghiche, A.; Antropov, I.; Baffioni, S.; Beaudette, F.; Busson, P.; Cadamuro, L.; Chapon, E.; Charlot, C.; Dahms, T.; Davignon, O.; Filipovic, N.; Florent, A.; Granier de Cassagnac, R.; Lisniak, S.; Mastrolorenzo, L.; Miné, P.; Naranjo, I. N.; Nguyen, M.; Ochando, C.; Ortona, G.; Paganini, P.; Pigard, P.; Regnard, S.; Salerno, R.; Sauvan, J. B.; Sirois, Y.; Strebler, T.; Yilmaz, Y.; Zabi, A.; Agram, J.-L.; Andrea, J.; Aubin, A.; Bloch, D.; Brom, J.-M.; Buttignol, M.; Chabert, E. C.; Chanon, N.; Collard, C.; Conte, E.; Coubez, X.; Fontaine, J.-C.; Gelé, D.; Goerlach, U.; Goetzmann, C.

    2016-07-01

    Jet multiplicity distributions in top quark pair ({t}{overline{t}}) events are measured in pp collisions at a centre-of-mass energy of 8 TeV with the CMS detector at the LHC using a data set corresponding to an integrated luminosity of 19.7 {fb}^ {-1}. The measurement is performed in the dilepton decay channels (e^+e^-, μ^+ μ^-, and e^{±} μ^{∓}). The absolute and normalized differential cross sections for {t}overline{t} production are measured as a function of the jet multiplicity in the event for different jet transverse momentum thresholds and the kinematic properties of the leading additional jets. The differential {t overline{t} b} and {t overline{t} b overline{b}} cross sections are presented for the first time as a function of the kinematic properties of the leading additional b jets. Furthermore, the fraction of events without additional jets above a threshold is measured as a function of the transverse momenta of the leading additional jets and the scalar sum of the transverse momenta of all additional jets. The data are compared and found to be consistent with predictions from several perturbative quantum chromodynamics event generators and a next-to-leading order calculation.

  19. Bush Plan Takes Security Out of Social Security

    ERIC Educational Resources Information Center

    Marsh, Jeanne C.

    2005-01-01

    Social workers understand that assessing the implications of a policy for individual citizens like Veronica, a 51 year-old African American woman whose retirement will be jeopardized by President Bush's plan for social security, is often a good yardstick by which to measure the impact of a change. Moreover, social workers understand that policy…

  20. 17 CFR 37.408 - Additional sources for compliance.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Additional sources for compliance. 37.408 Section 37.408 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SWAP EXECUTION FACILITIES Monitoring of Trading and Trade Processing § 37.408 Additional sources...