Science.gov

Sample records for airport security access

  1. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  2. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  3. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  4. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... TRANSPORTATION Federal Aviation Administration Ninth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  5. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  6. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Federal Aviation Administration Twelfth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  7. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  8. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  9. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  10. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  11. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... Federal Aviation Administration Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224, Airport Security Access Control. DATES:...

  12. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  13. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  14. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Federal Aviation Administration Eleventh Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  15. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... TRANSPORTATION Federal Aviation Administration Eighth Meeting: RTCA Special Committee 224: Airport Security... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  16. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... TRANSPORTATION Federal Aviation Administration Thirteenth Meeting: RTCA Special Committee 224, Airport Security... (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  17. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Federal Aviation Administration Second Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  18. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Federal Aviation Administration Seventh Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  19. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Federal Aviation Administration Fourth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  20. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  1. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21,...

  2. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ... Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on... TRANSPORTATION Federal Aviation Administration Twenty-Fourth Meeting: RTCA Special Committee 224,...

  3. A novel wireless local positioning system for airport (indoor) security

    NASA Astrophysics Data System (ADS)

    Zekavat, Seyed A.; Tong, Hui; Tan, Jindong

    2004-09-01

    A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).

  4. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant... 49 Transportation 9 2013-10-01 2013-10-01 false Airport tenant security programs. 1542.113...

  5. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant... 49 Transportation 9 2014-10-01 2014-10-01 false Airport tenant security programs. 1542.113...

  6. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport...

  7. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Airport security coordinator. 1542.3 Section 1542... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.3 Airport security coordinator. (a) Each airport operator must designate one or more Airport Security...

  8. Components of the airport access system

    NASA Technical Reports Server (NTRS)

    1978-01-01

    The organizations and agencies which make up or influence the airport access system are examined. These include the airport, the airline industry, the public and private transit agencies which provide ground access to the airport, and the regulatory agencies which affect all of these organizations and their actions. Each component, with the exception of the regulatory agencies is described in terms of its legal status, its sources of funds, and the nature of its relationship with the other components. Conclusions regarding the system components' effects on airport access and recommendations for changes which appear practical are presented.

  9. 61 FR 25729 - Security Measures; Hellenikon International Airport, Athens, Greece

    Federal Register 2010, 2011, 2012, 2013, 2014

    1996-05-22

    ... Security Measures; Hellenikon International Airport, Athens, Greece Summary The Secretary of Transportation has now determined that Hellenikon International Airport, Athens, Greece, maintains and carries out... that Hellenikon International Airport, Athens, Greece, did not maintain and carry out...

  10. Airport Viz - a 3D Tool to Enhance Security Operations

    SciTech Connect

    Koch, Daniel B

    2006-01-01

    In the summer of 2000, the National Safe Skies Alliance (NSSA) awarded a project to the Applied Visualization Center (AVC) at the University of Tennessee, Knoxville (UTK) to develop a 3D computer tool to assist the Federal Aviation Administration security group, now the Transportation Security Administration (TSA), in evaluating new equipment and procedures to improve airport checkpoint security. A preliminary tool was demonstrated at the 2001 International Aviation Security Technology Symposium. Since then, the AVC went on to construct numerous detection equipment models as well as models of several airports. Airport Viz has been distributed by the NSSA to a number of airports around the country which are able to incorporate their own CAD models into the software due to its unique open architecture. It provides a checkpoint design and passenger flow simulation function, a layout design and simulation tool for checked baggage and cargo screening, and a means to assist in the vulnerability assessment of airport access points for pedestrians and vehicles.

  11. Role of helicopters in airport access

    NASA Technical Reports Server (NTRS)

    Dajani, J. S.; Snyder, W. J.

    1978-01-01

    The paper briefly reviews the role of helicopter systems in the provision of airport access services and evaluates the potential for the future development of such services in major metropolitan areas in the United States. The evaluation is based on a computer simulation of potential helicopter system proposed for 20 metropolitan areas. The simulation provides two indicators that are used to gage the extent of the feasibility of developing successful systems in these areas: (1) the cost per seat mile, and (2) the break-even number of passengers, expressed as a percentage of total air travelers. It is found that a few metropolitan areas presently have the potential of marginally supporting intra-urban helicopter airport access service. The access systems offer a viable alternative for air passengers placing a high value on their time, and provides the opportunity for better integrating the air transportation service of multiple airports in a given urban region.

  12. Airport Security Act of 2013

    THOMAS, 113th Congress

    Rep. Johnson, Henry C. "Hank," Jr. [D-GA-4

    2013-11-14

    01/09/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aviation safety inspector airport access. 153.5 Section 153.5 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation...

  14. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Aviation safety inspector airport access. 153.5 Section 153.5 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation...

  15. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Aviation safety inspector airport access. 153.5 Section 153.5 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation...

  16. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Aviation safety inspector airport access. 153.5 Section 153.5 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation...

  17. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Aviation safety inspector airport access. 153.5 Section 153.5 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation...

  18. 33 CFR 165.1192 - Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay, California. (a) Locations. The following areas are security zones: (1)...

  19. 33 CFR 165.1192 - Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay, California. (a) Locations. The following areas are security zones: (1)...

  20. 76 FR 70468 - Extension of Agency Information Collection Activity Under OMB Review: Airport Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-14

    ... OMB Review: Airport Security AGENCY: Transportation Security Administration, DHS. ACTION: 30-day... other forms of information technology. Information Collection Requirement Title: Airport Security, 49... is seeking to renew its OMB control number 1542-0002, Airport Security, 49 CFR part 1542....

  1. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Airport Customs Security Area Bond A Appendix A to... OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security Area Bond Airport Customs Security Area Bond (name of principal) of and (name of surety) of are held...

  2. The systems approach to airport security: The FAA (Federal Aviation Administration)/BWI (Baltimore-Washington International) Airport demonstration project

    SciTech Connect

    Caskey, D.L.; Olascoaga, M.T.

    1990-01-01

    Sandia National Laboratories has been involved in designing, installing and evaluating security systems for various applications during the past 15 years. A systems approach to security that evolved from this experience was applied to aviation security for the Federal Aviation Administration. A general systems study of aviation security in the United States was concluded in 1987. One result of the study was a recommendation that an enhanced security system concept designed to meet specified objectives be demonstrated at an operational airport. Baltimore-Washington International Airport was selected as the site for the demonstration project which began in 1988 and will be completed in 1992. This article introduced the systems approach to airport security and discussed its application at Baltimore-Washington International Airport. Examples of design features that could be included in an enhanced security concept also were presented, including details of the proposed Ramps Area Intrusion Detection System (RAIDS).

  3. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  4. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  5. 75 FR 54946 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-09

    ... assurances if the airport sponsor meets certain standards for control of airport operations and development; self- sustaining and nondiscriminatory airport rates; and compatible land use. At present, there are 75... and powers necessary to control and operate the airport; to maintain the airport in a safe...

  6. Gerardo Hernandez Airport Security Act of 2014

    THOMAS, 113th Congress

    Rep. Hudson, Richard [R-NC-8

    2014-06-05

    07/23/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  7. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Airport Customs Security Area Bond A Appendix A to Part 113 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security...

  8. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Airport Customs Security Area Bond A Appendix A to Part 113 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security...

  9. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Airport Customs Security Area Bond A Appendix A to Part 113 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security...

  10. Los Alamos Shows Airport Security Technology at Work

    SciTech Connect

    Espy, Michelle; Schultz, Larry; Hunter, James

    2013-11-25

    Los Alamos scientists have advanced a Magnetic Resonance Imaging (MRI) technology that may provide a breakthrough for screening liquids at airport security. They've added low-power X-ray data to the mix, and as a result have unlocked a new detection technology. Funded in part by the Department of Homeland Security's Science and Technology Directorate, the new system is named MagRay. The goal is to quickly and accurately distinguish between liquids that visually appear identical. For example, what appears to be a bottle of white wine could potentially be nitromethane, a liquid that could be used to make an explosive. Both are clear liquids, one would be perfectly safe on a commercial aircraft, the other would be strictly prohibited. How to tell them apart quickly without error at an airport security area is the focus of Michelle Espy, Larry Schultz and their team. In this video, Espy and the MagRay team explain how the new technology works, how they've developed an easy operator interface, and what the next steps might be in transitioning this technology to the private sector.

  11. Los Alamos Shows Airport Security Technology at Work

    ScienceCinema

    Espy, Michelle; Schultz, Larry; Hunter, James

    2016-07-12

    Los Alamos scientists have advanced a Magnetic Resonance Imaging (MRI) technology that may provide a breakthrough for screening liquids at airport security. They've added low-power X-ray data to the mix, and as a result have unlocked a new detection technology. Funded in part by the Department of Homeland Security's Science and Technology Directorate, the new system is named MagRay. The goal is to quickly and accurately distinguish between liquids that visually appear identical. For example, what appears to be a bottle of white wine could potentially be nitromethane, a liquid that could be used to make an explosive. Both are clear liquids, one would be perfectly safe on a commercial aircraft, the other would be strictly prohibited. How to tell them apart quickly without error at an airport security area is the focus of Michelle Espy, Larry Schultz and their team. In this video, Espy and the MagRay team explain how the new technology works, how they've developed an easy operator interface, and what the next steps might be in transitioning this technology to the private sector.

  12. 76 FR 49503 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Airport Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-10

    ... Collection of Information: Airport Security AGENCY: Transportation Security Administration, DHS. ACTION: 60...; Airport Security, 49 CFR part 1542. The information collected is used to determine compliance with 49 CFR... procedures. TSA is seeking to renew its OMB control number, 1652- ] 0002, Airport Security. TSA...

  13. Manufacturing Accomplices: ICT Use in Securing the Safety State at Airports

    NASA Astrophysics Data System (ADS)

    Østerlie, Thomas; Asak, Ole Martin; Pettersen, Ole Georg; Tronhus, Håvard

    Based on a study of ICT use at an airport security checkpoint, this paper explores a possible explanation to the paradox that travelers find existing airport security measures inadequate while at the same time believing air travel to be sufficiently secure. We pursue this explanation by showing that, for the security checkpoint to function properly in relation to the overall function of the airport, travelers have to be enrolled in a particular program of action. They are then locked into this program through sanctions. Travelers are forced into participating in a system many of them find ethically and morally objectionable. Yet, active participation makes it difficult for them to object to the moral and ethical issues of their actions without damning themselves. Our explanation of the security paradox is, therefore, that while travelers remain critical of airport security, they avoid damning themselves by criticizing the system in terms of its own logic. They have been made accomplices.

  14. 76 FR 15028 - Airport Improvement Program (AIP): Interim Policy Regarding Access to Airports From Residential...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-18

    ... standards for control of airport operations and development and for self-sustaining and nondiscriminatory... include responsibilities to retain the rights and powers necessary to control and operate the airport; to... as self-sustaining as possible. A complete list of the current grant assurances can be viewed...

  15. Airport Screening

    MedlinePlus

    ... 2011 Photo courtesy of Dan Paluska/Flickr Denver Airport Security Screening Introduction With air travel regaining popularity and increased secu- rity measures, airport security screening has become an area of interest for ...

  16. Three-dimensional imaging of hold baggage for airport security

    NASA Astrophysics Data System (ADS)

    Kolokytha, S.; Speller, R.; Robson, S.

    2014-06-01

    This study describes a cost-effective check-in baggage screening system, based on "on-belt tomosynthesis" (ObT) and close-range photogrammetry, that is designed to address the limitations of the most common system used, conventional projection radiography. The latter's limitations can lead to loss of information and an increase in baggage handling time, as baggage is manually searched or screened with more advanced systems. This project proposes a system that overcomes such limitations creating a cost-effective automated pseudo-3D imaging system, by combining x-ray and optical imaging to form digital tomograms. Tomographic reconstruction requires a knowledge of the change in geometry between multiple x-ray views of a common object. This is uniquely achieved using a close range photogrammetric system based on a small network of web-cameras. This paper presents the recent developments of the ObT system and describes recent findings of the photogrammetric system implementation. Based on these positive results, future work on the advancement of the ObT system as a cost-effective pseudo-3D imaging of hold baggage for airport security is proposed.

  17. [Basic consideration on the security checking of sick travelers at airports].

    PubMed

    Felkai, Péter; Mártai, István

    2012-09-01

    The authorities guarantee the safety of passengers during air travel by strict ground security measures. All of these measures are restrictive and can affect the health status of both healthy and ill travelers. Patients who are in critical condition or confined to a stretcher and have to be repatriated by stretcher on a regular flight, must pass the airport security check as well. But the developers of security system should take into account the medical safety of patients during the procedure. The relevant medical principles are painfully missing not only in Hungary, but unfortunately also at most international airports. On the basis of principles reviewed in the present publication, an unambiguous, professionally reconciled regulation is necessary that would serve as a guideline for airport management and authorities, as well as for the involved medical personnel. Although setting principles into practice requires a different solution at each airport, yet, passenger safety and patient safety have to be harmonized as soon as possible.

  18. Interacting forms of expertise in security governance: the example of CCTV surveillance at Geneva International Airport.

    PubMed

    Klauser, Francisco

    2009-06-01

    The paper investigates the multiple public-private exchanges and cooperation involved in the installation and development of CCTV surveillance at Geneva International Airport. Emphasis is placed on the interacting forms of authority and expertise of five parties: the user(s), owner and supplier of the camera system, as well as the technical managers of the airport and the Swiss regulatory bodies in airport security. While placing the issues of airport surveillance in the particular context of a specific range of projects and transformations relating to the developments of CCTV at Geneva Airport, the paper not only provides important insights into the micro-politics of surveillance at Geneva Airport, but aims to re-institute these as part of a broader 'problematic': the mediating role of expertise and the growing functional fragmentation of authority in contemporary security governance. On this basis, the paper also exemplifies the growing mutual interdependences between security and business interests in the ever growing 'surveillant assemblage' in contemporary security governance. PMID:19489820

  19. 77 FR 51948 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-28

    ... previously published interim policy (76 FR 15028; March 18, 2011) to commercial service airports that... 14, 2012. DATES: The comment period for the proposed policy document published July 30, 2012 (77 FR... Proposed Policy in the Federal Register at 77 FR 44515 proposing an FAA policy, based on Federal...

  20. 78 FR 42419 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-16

    ... (76 FR 15028; March 18, 2011) with regard to commercial service airports, and establishes how FAA will... adjacent or nearby property, when that property is used as a residence, is available at: 75 FR 54946; September 9, 2010; 76 FR 15028; March 18, 2011; and 77 FR 44515; July 30, 2012. On February 14, 2012,...

  1. 77 FR 44515 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ... take. This included determining the role played by the airport in the National Plan of Integrated... limits application of the FAA's previously published interim policy (76 FR 15028; March 18, 2011) to... Statement in the Federal Register published on April 11, 2000 (65 FR 19477-78). Availability of...

  2. Computer access security code system

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  3. An RFID-based luggage and passenger tracking system for airport security control applications

    NASA Astrophysics Data System (ADS)

    Vastianos, George E.; Kyriazanos, Dimitris M.; Kountouriotis, Vassilios I.; Thomopoulos, Stelios C. A.

    2014-06-01

    Market analysis studies of recent years have shown a steady and significant increase in the usage of RFID technology. Key factors for this growth were the decreased costs of passive RFIDs and their improved performance compared to the other identification technologies. Besides the benefits of RFID technologies into the supply chains, warehousing, traditional inventory and asset management applications, RFID has proven itself worth exploiting on experimental, as well as on commercial level in other sectors, such as healthcare, transport and security. In security sector, airport security is one of the biggest challenges. Airports are extremely busy public places and thus prime targets for terrorism, with aircraft, passengers, crew and airport infrastructure all subject to terrorist attacks. Inside this labyrinth of security challenges, the long range detection capability of the UHF passive RFID technology can be turned into a very important tracking tool that may outperform all the limitations of the barcode tracking inside the current airport security control chain. The Integrated Systems Lab of NCSR Demokritos has developed an RFID based Luggage and Passenger tracking system within the TASS (FP7-SEC-2010-241905) EU research project. This paper describes application scenarios of the system categorized according to the structured nature of the environment, the system architecture and presents evaluation results extracted from measurements with a group of different massive production GEN2 UHF RFID tags that are widely available in the world market.

  4. Sensor fusion-based security concept on airports with a rotating millimetre wave person scanner

    NASA Astrophysics Data System (ADS)

    Hantscher, Sebastian; Lang, Stefan; Hägelen, Manfred; Essen, Helmut; Tessmann, Axel

    2010-10-01

    This paper gives an overview about a new security concept on airports. Because single systems have not often the desired reliability, the concept is based on the fusion of different sensors. Moreover, first measurements of a 94 GHz person scanner with circular synthetic aperture are presented showing the capability to detect metallic as well as nonmetallic objects without violating the personal privacy.

  5. Securing America's access to space

    SciTech Connect

    Rendine, M.; Wood, L.

    1990-05-23

    We review pertinent aspects of the history of the space launch capabilities of the United States and survey its present status and near-term outlook. Steps which must be taken, pitfalls which much be avoided, and a core set of National options for re-acquiring in the near term the capability to access the space environment with large payloads are discussed. We devote considerable attention to the prospect of creating an interim heavy-lift space launch vehicle of at least 100,000 pound payload-orbiting capacity to serve National needs during the next dozen years, suggesting that such a capability can be demonstrated within 5 years for less than $1 B. Such capability will apparently be essential for meeting the first-phase goals of the President's Space Exploration Initiative. Some other high-leverage aspects of securing American access to space are also noted briefly, emphasizing unconventional technological approaches of presently high promise.

  6. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF THE..., including, but not limited to, moving sidewalks, shuttle vehicles and people movers, comply with...

  7. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF THE..., including, but not limited to, moving sidewalks, shuttle vehicles and people movers, comply with...

  8. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF THE..., including, but not limited to, moving sidewalks, shuttle vehicles and people movers, comply with...

  9. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF THE..., including, but not limited to, moving sidewalks, shuttle vehicles and people movers, comply with...

  10. Planning for airport access: An analysis of the San Francisco Bay area. Technological options

    NASA Technical Reports Server (NTRS)

    1978-01-01

    Current transportation technology and expected technological trends are reviewed. These technologies are assessed within the framework of the airport access system in the San Francisco Bay area. Four types of technological options are considered: (1) automotive systems, (2) commuter air systems, (3) automated guideways, and (4) water systems.

  11. From sniffer dogs to emerging sniffer devices for airport security: an opportunity to rethink privacy implications?

    PubMed

    Bonfanti, Matteo E

    2014-09-01

    Dogs are known for their incredible ability to detect odours, extracting them from a "complex" environment and recognising them. This makes sniffer dogs precious assets in a broad variety of security applications. However, their use is subject to some intrinsic restrictions. Dogs can only be trained to a limited set of applications, get tired after a relatively short period, and thus require a high turnover. This has sparked a drive over the past decade to develop artificial sniffer devices-generally known as "chemical sniffers" or "electronic noses"-able to complement and possibly replace dogs for some security applications. Such devices have been already deployed, or are intended to be deployed, at borders, airports and other critical installation security checkpoints. Similarly to dogs, they are adopted for detecting residual traces that indicate either the presence of, or recent contact with, substances like drugs and explosives. It goes without saying that, as with sniffer dogs, the use of artificial sniffer devices raises many sensitive issues. Adopting an ethical and legal perspective, the present paper discusses the privacy and data protection implications of the possible deployment of a hand-held body scanning sniffer for screening passengers at EU airport security checkpoints.

  12. A voice password system for access security

    SciTech Connect

    Birnbaum, M.; Cohen, L.A.; Welsh, F.X.

    1986-09-01

    A voice password system for access security using speaker verification technology has been designed for use over dial-up telephone lines. The voice password system (VPS) can provide secure access to telephone networks, computers, rooms, and buildings. It also has application in office automation systems, electric funds transfer, and ''smart cards'' (interactive computers embedded in credit-card-sized packages). As increasing attention is focused on access security in the public, private, and government sectors, the voice password system can provide a timely solution to the security dilemma. The VPS uses modes of communication available to almost everyone (the human voice and the telephone). A user calls the VPS, enters his or her identification number (ID) by touch-tone telephone, and then speaks a password. This is usually a phrase or a sentence of about seven syllables. On initial calls, the VPS creates a model of the user's voice, called a reference template, and labels it with the caller's unique user ID. To gain access later, the user calls the system, enters the proper user ID, and speaks the password phrase. The VPS compares the user's stored reference template with the spoken password and produces a distance score.

  13. Airport technology international 1993

    NASA Astrophysics Data System (ADS)

    Papagiorcopulo, George

    The present survey of developments in airport technologies and their management discusses airport extensions and upgradings, airport developments in China, polluter penalization, airport effects on environments, European ground-handling methods, ATC in Europe, EC duty-free sales at airports, and the privatization of airport security. Also discussed are airport advertising, new alternatives in air-cargo handling, ATC training, taxi-guidance systems, and the reduction of fuel consumption and emissions on the ground. (No individual items are abstracted in this volume)

  14. 61 FR 13917 - Hellenikon International Airport, Athens, Greece; Notification of Ineffective Security Measures

    Federal Register 2010, 2011, 2012, 2013, 2014

    1996-03-28

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Hellenikon International Airport, Athens, Greece; Notification of Ineffective... Republic of Greece that I had determined that Hellenikon International Airport, Athens, Greece, did...

  15. Airport Remote Tower Sensor Systems

    NASA Technical Reports Server (NTRS)

    Maluf, David A.; Gawdiak, Yuri; Leidichj, Christopher; Papasin, Richard; Tran, Peter B.; Bass, Kevin

    2006-01-01

    Networks of video cameras, meteorological sensors, and ancillary electronic equipment are under development in collaboration among NASA Ames Research Center, the Federal Aviation Administration (FAA), and the National Oceanic Atmospheric Administration (NOAA). These networks are to be established at and near airports to provide real-time information on local weather conditions that affect aircraft approaches and landings. The prototype network is an airport-approach-zone camera system (AAZCS), which has been deployed at San Francisco International Airport (SFO) and San Carlos Airport (SQL). The AAZCS includes remotely controlled color video cameras located on top of SFO and SQL air-traffic control towers. The cameras are controlled by the NOAA Center Weather Service Unit located at the Oakland Air Route Traffic Control Center and are accessible via a secure Web site. The AAZCS cameras can be zoomed and can be panned and tilted to cover a field of view 220 wide. The NOAA observer can see the sky condition as it is changing, thereby making possible a real-time evaluation of the conditions along the approach zones of SFO and SQL. The next-generation network, denoted a remote tower sensor system (RTSS), will soon be deployed at the Half Moon Bay Airport and a version of it will eventually be deployed at Los Angeles International Airport. In addition to remote control of video cameras via secure Web links, the RTSS offers realtime weather observations, remote sensing, portability, and a capability for deployment at remote and uninhabited sites. The RTSS can be used at airports that lack control towers, as well as at major airport hubs, to provide synthetic augmentation of vision for both local and remote operations under what would otherwise be conditions of low or even zero visibility.

  16. 14 CFR § 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Access to security areas. § 1203a.103 Section § 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor...

  17. 14 CFR 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Access to security areas. 1203a.103 Section 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor employees,...

  18. 14 CFR 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Access to security areas. 1203a.103 Section 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor employees,...

  19. 14 CFR 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Access to security areas. 1203a.103 Section 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor employees,...

  20. 14 CFR 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Access to security areas. 1203a.103 Section 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor employees,...

  1. Identity and Access Management and Security in Higher Education.

    ERIC Educational Resources Information Center

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  2. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... approved VSP. These additional security measures may include: (1) Increasing the frequency and detail of... operations to deter unauthorized access; (4) Limiting the number of access points to the vessel by...

  3. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... approved VSP. These additional security measures may include: (1) Increasing the frequency and detail of... operations to deter unauthorized access; (4) Limiting the number of access points to the vessel by...

  4. Emotional Exhaustion and Job Satisfaction in Airport Security Officers - Work-Family Conflict as Mediator in the Job Demands-Resources Model.

    PubMed

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners' job performance. The present study bridges this research gap by applying the job demands-resources (JD-R) model and using work-family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD-R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  5. Access Control Is More than Security.

    ERIC Educational Resources Information Center

    Fickes, Michael

    2002-01-01

    Describes the University of New Mexico's photo identification LOBO card system, which performs both security and validation tasks. It is used in conjunction with several C-CURE 800 Integrated Security Management Systems supplied by Software House of Lexington, Massachusetts. (EV)

  6. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  7. A secure network access system for mobile IPv6

    NASA Astrophysics Data System (ADS)

    Zhang, Hong; Yuan, Man; He, Rui; Jiang, Luliang; Ma, Jian; Qian, Hualin

    2004-03-01

    With the fast development of Internet and wireless and mobile communication technology, the Mobile Internet Age is upcoming. For those providing Mobile Internet services, especially from the view of ISP (Internet Service Provider), current mobile IP protocol is insufficient. Since the Mobile IPv6 protocol will be popular in near future, how to provide a secure mobile IPv6 service is important. A secure mobile IPv6 network access system is highly needed for mobile IPv6 deployment. Current methods and systems are still inadequate, including EAP, PANA, 802.1X, RADIUS, Diameter, etc. In this paper, we describe main security goals for a secure mobile IPv6 access system, and propose a secure network access system to achieve them. This access system consists of access router, attendant and authentication servers. The access procedure is divided into three phases, which are initial phase, authentication and registration phase and termination phase. This system has many advantages, including layer two independent, flexible and extensible, no need to modify current IPv6 address autoconfiguration protocols, binding update optimization, etc. Finally, the security of the protocol in this system is analyzed and proved with Extended BAN logic method, and a brief introduction of system implementation is given.

  8. The Battle to Secure Our Public Access Computers

    ERIC Educational Resources Information Center

    Sendze, Monique

    2006-01-01

    Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…

  9. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... unescorted access to secure areas for a period of no longer than 7 consecutive calendar days if: (i) The... paragraph (d) of this section. (5) Deny or revoke a person's authorization to be on the facility if...

  10. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... unescorted access to secure areas for a period of no longer than 7 consecutive calendar days if: (i) The... paragraph (d) of this section. (5) Deny or revoke a person's authorization to be on the facility if...

  11. 49 CFR 27.71 - Airport facilities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Access Act rules (49 CFR part 382) for carriers. (g) If an airport operator who receives Federal...). (c) The airport shall ensure that there is an accessible path between the gate and the area...

  12. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  13. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  14. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  15. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  16. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  17. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  18. 49 CFR 27.71 - Airport facilities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Access Act rules (49 CFR part 382) for carriers. (g) If an airport operator who receives Federal... 49 Transportation 1 2010-10-01 2010-10-01 false Airport facilities. 27.71 Section 27.71... Administration Programs: Airports, Railroads, and Highways § 27.71 Airport facilities. (a) This section...

  19. Airport noise

    NASA Technical Reports Server (NTRS)

    Pendley, R. E.

    1982-01-01

    The problem of airport noise at several airports and air bases is detailed. Community reactions to the noise, steps taken to reduce jet engine noise, and the effect of airport use restrictions and curfews on air transportation are discussed. The adverse effect of changes in allowable operational noise on airport safety and altenative means for reducing noise pollution are considered. Community-airport relations and public relations are discussed.

  20. Quantum secured gigabit optical access networks

    NASA Astrophysics Data System (ADS)

    Fröhlich, Bernd; Dynes, James F.; Lucamarini, Marco; Sharpe, Andrew W.; Tam, Simon W.-B.; Yuan, Zhiliang; Shields, Andrew J.

    2015-12-01

    Optical access networks connect multiple endpoints to a common network node via shared fibre infrastructure. They will play a vital role to scale up the number of users in quantum key distribution (QKD) networks. However, the presence of power splitters in the commonly used passive network architecture makes successful transmission of weak quantum signals challenging. This is especially true if QKD and data signals are multiplexed in the passive network. The splitter introduces an imbalance between quantum signal and Raman noise, which can prevent the recovery of the quantum signal completely. Here we introduce a method to overcome this limitation and demonstrate coexistence of multi-user QKD and full power data traffic from a gigabit passive optical network (GPON) for the first time. The dual feeder implementation is compatible with standard GPON architectures and can support up to 128 users, highlighting that quantum protected GPON networks could be commonplace in the future.

  1. Quantum secured gigabit optical access networks

    PubMed Central

    Fröhlich, Bernd; Dynes, James F.; Lucamarini, Marco; Sharpe, Andrew W.; Tam, Simon W.-B.; Yuan, Zhiliang; Shields, Andrew J.

    2015-01-01

    Optical access networks connect multiple endpoints to a common network node via shared fibre infrastructure. They will play a vital role to scale up the number of users in quantum key distribution (QKD) networks. However, the presence of power splitters in the commonly used passive network architecture makes successful transmission of weak quantum signals challenging. This is especially true if QKD and data signals are multiplexed in the passive network. The splitter introduces an imbalance between quantum signal and Raman noise, which can prevent the recovery of the quantum signal completely. Here we introduce a method to overcome this limitation and demonstrate coexistence of multi-user QKD and full power data traffic from a gigabit passive optical network (GPON) for the first time. The dual feeder implementation is compatible with standard GPON architectures and can support up to 128 users, highlighting that quantum protected GPON networks could be commonplace in the future. PMID:26656307

  2. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access to restricted data and national security information introduced into proceedings. Except as...

  3. Emotional Exhaustion and Job Satisfaction in Airport Security Officers - Work-Family Conflict as Mediator in the Job Demands-Resources Model.

    PubMed

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners' job performance. The present study bridges this research gap by applying the job demands-resources (JD-R) model and using work-family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD-R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed. PMID:27242581

  4. Emotional Exhaustion and Job Satisfaction in Airport Security Officers – Work–Family Conflict as Mediator in the Job Demands–Resources Model

    PubMed Central

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD–R) model and using work–family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed. PMID:27242581

  5. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the unauthorized introduction of dangerous substances and devices, including any device intended to... with the individual's claim of loss or theft. (3) If an individual cannot present his or her TWIC for... approved Facility Security Plan (FSP) the frequency of application of any access controls, particularly...

  6. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the unauthorized introduction of dangerous substances and devices, including any device intended to... with the individual's claim of loss or theft. (3) If an individual cannot present his or her TWIC for... approved Facility Security Plan (FSP) the frequency of application of any access controls, particularly...

  7. 14 CFR 382.57 - What accessibility requirements apply to automated airport kiosks?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    .... Department of Justice's 2010 ADA Standards for Accessible Design, 28 CFR 35.104 (defining the “2010 Standards” for title II as the requirements set forth in appendices B and D to 36 CFR part 1191 and the requirements contained in 28 CFR 35.151) (hereinafter 2010 ADA Standards) must be provided. (3) Operable...

  8. 77 FR 55218 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-07

    ... the Transportation Security Administration's (TSA) airport security program that will include lessons learned, and screening techniques associated with airport security. Specifically, there will be...

  9. Airport Remote Tower Sensor Systems

    NASA Technical Reports Server (NTRS)

    Papasin, Richard; Gawdiak, Yuri; Maluf, David A.; Leidich, Christopher; Tran, Peter B.

    2001-01-01

    Remote Tower Sensor Systems (RTSS) are proof-of-concept prototypes being developed by NASA/Ames Research Center (NASA/ARC) with collaboration with the FAA (Federal Aviation Administration) and NOAA (National Oceanic Atmospheric Administration). RTSS began with the deployment of an Airport Approach Zone Camera System that includes real-time weather observations at San Francisco International Airport. The goal of this research is to develop, deploy, and demonstrate remotely operated cameras and sensors at several major airport hubs and un-towered airports. RTSS can provide real-time weather observations of airport approach zone. RTSS will integrate and test airport sensor packages that will allow remote access to realtime airport conditions and aircraft status.

  10. 49 CFR 1540.105 - Security responsibilities of employees and other persons.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... systems, measures, or procedures being applied to control access to, or presence or movement in, such areas. (3) Use, allow to be used, or cause to be used, any airport-issued or airport-approved access..., or attempt to circumvent any security system, measure, or procedure implemented under this...

  11. 49 CFR 1540.105 - Security responsibilities of employees and other persons.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... systems, measures, or procedures being applied to control access to, or presence or movement in, such areas. (3) Use, allow to be used, or cause to be used, any airport-issued or airport-approved access..., or attempt to circumvent any security system, measure, or procedure implemented under this...

  12. A Service Access Security Control Model in Cyberspace

    NASA Astrophysics Data System (ADS)

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  13. High-Performance Secure Database Access Technologies for HEP Grids

    SciTech Connect

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  14. Secure Payload Access to the International Space Station

    NASA Technical Reports Server (NTRS)

    Pitts, R. Lee; Reid, Chris

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  15. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  16. 77 FR 16552 - Extension of Agency Information Collection Activity Under OMB Review: Maryland-Three Airports...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-21

    ... an individual to serve as an airport security coordinator at one of these three airports. DATES: Send... Maryland airports, or to serve as an airport security coordinator at one of these three airports. Abstract..., of the following collection of information on January 5, 2012, 77 FR 513. This collection...

  17. Hand geometry biometric device for secure access control

    SciTech Connect

    Colbert, C.; Moles, D.R. )

    1991-01-01

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Security Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.

  18. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  19. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS. PMID:23828650

  20. Establishing a Secure Data Center with Remote Access: Preprint

    SciTech Connect

    Gonder, J.; Burton, E.; Murakami, E.

    2012-04-01

    Access to existing travel data is critical for many analysis efforts that lack the time or resources to support detailed data collection. High-resolution data sets provide particular value, but also present a challenge for preserving the anonymity of the original survey participants. To address this dilemma of providing data access while preserving privacy, the National Renewable Energy Laboratory and the U.S. Department of Transportation have launched the Transportation Secure Data Center (TSDC). TSDC data sets include those from regional travel surveys and studies that increasingly use global positioning system devices. Data provided by different collecting agencies varies with respect to formatting, elements included and level of processing conducted in support of the original purpose. The TSDC relies on a number of geospatial and other analysis tools to ensure data quality and to generate useful information outputs. TSDC users can access the processed data in two different ways. The first is by downloading summary results and second-by-second vehicle speed profiles (with latitude/longitude information removed) from a publicly-accessible website. The second method involves applying for a remote connection account to a controlled-access environment where spatial analysis can be conducted, but raw data cannot be removed.

  1. Aeronautical Mobile Airport Communications System (AeroMACS)

    NASA Technical Reports Server (NTRS)

    Budinger, James M.; Hall, Edward

    2011-01-01

    To help increase the capacity and efficiency of the nation s airports, a secure wideband wireless communications system is proposed for use on the airport surface. This paper provides an overview of the research and development process for the Aeronautical Mobile Airport Communications System (AeroMACS). AeroMACS is based on a specific commercial profile of the Institute of Electrical and Electronics Engineers (IEEE) 802.16 standard known as Wireless Worldwide Interoperability for Microwave Access or WiMAX (WiMax Forum). The paper includes background on the need for global interoperability in air/ground data communications, describes potential AeroMACS applications, addresses allocated frequency spectrum constraints, summarizes the international standardization process, and provides findings and recommendations from the world s first AeroMACS prototype implemented in Cleveland, Ohio, USA.

  2. 49 CFR 1560.111 - Covered airport operators.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List Matching § 1560.111 Covered airport operators....

  3. 49 CFR 1560.111 - Covered airport operators.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List Matching § 1560.111 Covered airport operators....

  4. 49 CFR 1560.111 - Covered airport operators.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List Matching § 1560.111 Covered airport operators....

  5. 49 CFR 1560.111 - Covered airport operators.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List Matching § 1560.111 Covered airport operators....

  6. 49 CFR 1560.111 - Covered airport operators.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List Matching § 1560.111 Covered airport operators....

  7. 19 CFR 122.182 - Security provisions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...) Background check. An authorized official of the employer must attest in writing that a background check has been conducted on the applicant, to the extent allowable by law. The background check must include, at... background checks for security area access. An Airport Customs Security Area Bond is not required....

  8. 19 CFR 122.182 - Security provisions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...) Background check. An authorized official of the employer must attest in writing that a background check has been conducted on the applicant, to the extent allowable by law. The background check must include, at... background checks for security area access. An Airport Customs Security Area Bond is not required....

  9. 19 CFR 122.182 - Security provisions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...) Background check. An authorized official of the employer must attest in writing that a background check has been conducted on the applicant, to the extent allowable by law. The background check must include, at... background checks for security area access. An Airport Customs Security Area Bond is not required....

  10. 7 CFR 331.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 5 2012-01-01 2012-01-01 false Restricting access to select agents and toxins... TRANSFER OF SELECT AGENTS AND TOXINS § 331.10 Restricting access to select agents and toxins; security risk... access to a select agent or toxin, and an individual may not access a select agent or toxin, unless...

  11. 7 CFR 331.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 5 2013-01-01 2013-01-01 false Restricting access to select agents and toxins... TRANSFER OF SELECT AGENTS AND TOXINS § 331.10 Restricting access to select agents and toxins; security risk... access to a select agent or toxin, and an individual may not access a select agent or toxin, unless...

  12. 7 CFR 331.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 5 2011-01-01 2011-01-01 false Restricting access to select agents and toxins... TRANSFER OF SELECT AGENTS AND TOXINS § 331.10 Restricting access to select agents and toxins; security risk... access to a select agent or toxin, and an individual may not access a select agent or toxin, unless...

  13. 7 CFR 331.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Restricting access to select agents and toxins... TRANSFER OF SELECT AGENTS AND TOXINS § 331.10 Restricting access to select agents and toxins; security risk... access to a select agent or toxin, and an individual may not access a select agent or toxin, unless...

  14. 7 CFR 331.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 5 2014-01-01 2014-01-01 false Restricting access to select agents and toxins... TRANSFER OF SELECT AGENTS AND TOXINS § 331.10 Restricting access to select agents and toxins; security risk... access to a select agent or toxin, and an individual may not access a select agent or toxin, unless...

  15. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis

    PubMed Central

    2011-01-01

    Background The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Methods Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with metal detectors (n = 106), and MRI radiographers who work with MRI (n = 193), were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Results Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. Conclusions These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF. PMID:22070906

  16. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR... National Security Division Systems—limited access. (a) The following system of records is exempted...

  17. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Security requirements for access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Within Industry 3004.470 Security requirements for access to unclassified facilities,...

  18. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Information and Restricted Data. 95.35 Section 95.35 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data....

  19. Restricted access processor - An application of computer security technology

    NASA Technical Reports Server (NTRS)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  20. 77 FR 17492 - Expansion of Global Entry to Additional Airports

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-26

    ... selection process, and the initial airport locations. See 77 FR 5681 and 8 CFR 235.12. Travelers who wish to... SECURITY U.S. Customs and Border Protection Expansion of Global Entry to Additional Airports AGENCY: U.S.... This document announces the expansion of the program to include four additional airports. DATES:...

  1. Guidelines to improve airport preparedness against chemical and biological terrorism.

    SciTech Connect

    Edwards, Donna M.; Price, Phillip N.; Gordon, Susanna P.; Gadgil, Ashok

    2005-05-01

    Guidelines to Improve Airport Preparedness Against Chemical and Biological Terrorism is a 100-page document that makes concrete recommendations on improving security and assessing vulnerable areas and helps its readers understand the nature of chemical and biological attacks. The report has been turned over to Airports Council International (ACI) and the American Association of Airport Executives (AAAE), two organizations that together represent the interests of thousands of airport personnel and facilities in the U.S. and around the world.

  2. Airport Surface Network Architecture Definition

    NASA Technical Reports Server (NTRS)

    Nguyen, Thanh C.; Eddy, Wesley M.; Bretmersky, Steven C.; Lawas-Grodek, Fran; Ellis, Brenda L.

    2006-01-01

    Currently, airport surface communications are fragmented across multiple types of systems. These communication systems for airport operations at most airports today are based dedicated and separate architectures that cannot support system-wide interoperability and information sharing. The requirements placed upon the Communications, Navigation, and Surveillance (CNS) systems in airports are rapidly growing and integration is urgently needed if the future vision of the National Airspace System (NAS) and the Next Generation Air Transportation System (NGATS) 2025 concept are to be realized. To address this and other problems such as airport surface congestion, the Space Based Technologies Project s Surface ICNS Network Architecture team at NASA Glenn Research Center has assessed airport surface communications requirements, analyzed existing and future surface applications, and defined a set of architecture functions that will help design a scalable, reliable and flexible surface network architecture to meet the current and future needs of airport operations. This paper describes the systems approach or methodology to networking that was employed to assess airport surface communications requirements, analyze applications, and to define the surface network architecture functions as the building blocks or components of the network. The systems approach used for defining these functions is relatively new to networking. It is viewing the surface network, along with its environment (everything that the surface network interacts with or impacts), as a system. Associated with this system are sets of services that are offered by the network to the rest of the system. Therefore, the surface network is considered as part of the larger system (such as the NAS), with interactions and dependencies between the surface network and its users, applications, and devices. The surface network architecture includes components such as addressing/routing, network management, network

  3. English for Airport Ground Staff

    ERIC Educational Resources Information Center

    Cutting, Joan

    2012-01-01

    This article describes part of a European Commission Leonardo project that aimed to design a multimedia course for English language learners seeking work as ground staff in European airports. The structural-functional analysis of the dialogues written from the course showed that, across the four trades explored (security guards, ground handlers,…

  4. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  5. “We Are Not Being Heard”: Aboriginal Perspectives on Traditional Foods Access and Food Security

    PubMed Central

    Elliott, Bethany; Jayatilaka, Deepthi; Brown, Contessa; Varley, Leslie; Corbett, Kitty K.

    2012-01-01

    Aboriginal peoples are among the most food insecure groups in Canada, yet their perspectives and knowledge are often sidelined in mainstream food security debates. In order to create food security for all, Aboriginal perspectives must be included in food security research and discourse. This project demonstrates a process in which Aboriginal and non-Aboriginal partners engaged in a culturally appropriate and respectful collaboration, assessing the challenges and barriers to traditional foods access in the urban environment of Vancouver, BC, Canada. The findings highlight local, national, and international actions required to increase access to traditional foods as a means of achieving food security for all people. The paper underscores the interconnectedness of local and global food security issues and highlights challenges as well as solutions with potential to improve food security of both Aboriginal and non-Aboriginal peoples alike. PMID:23346118

  6. "We are not being heard": Aboriginal perspectives on traditional foods access and food security.

    PubMed

    Elliott, Bethany; Jayatilaka, Deepthi; Brown, Contessa; Varley, Leslie; Corbett, Kitty K

    2012-01-01

    Aboriginal peoples are among the most food insecure groups in Canada, yet their perspectives and knowledge are often sidelined in mainstream food security debates. In order to create food security for all, Aboriginal perspectives must be included in food security research and discourse. This project demonstrates a process in which Aboriginal and non-Aboriginal partners engaged in a culturally appropriate and respectful collaboration, assessing the challenges and barriers to traditional foods access in the urban environment of Vancouver, BC, Canada. The findings highlight local, national, and international actions required to increase access to traditional foods as a means of achieving food security for all people. The paper underscores the interconnectedness of local and global food security issues and highlights challenges as well as solutions with potential to improve food security of both Aboriginal and non-Aboriginal peoples alike.

  7. 77 FR 23598 - Technical Amendment to Cuba Airport List: Addition of Recently Approved Airports

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-20

    ... FR 5058) that amended the CBP regulations to establish such procedures and airport eligibility... SECURITY U.S. Customs and Border Protection 19 CFR Part 122 Technical Amendment to Cuba Airport List... from Cuba. DATES: Effective: April 20, 2012. FOR FURTHER INFORMATION CONTACT: Arthur A.E. Pitts, Sr.,...

  8. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Restricting access to select agents and toxins... AND HUMAN SERVICES QUARANTINE, INSPECTION, LICENSING SELECT AGENTS AND TOXINS § 73.10 Restricting access to select agents and toxins; security risk assessments. (a) An individual or entity required...

  9. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Restricting access to select agents and toxins... AND HUMAN SERVICES QUARANTINE, INSPECTION, LICENSING SELECT AGENTS AND TOXINS § 73.10 Restricting access to select agents and toxins; security risk assessments. (a) An individual or entity required...

  10. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Restricting access to select agents and toxins... AND HUMAN SERVICES QUARANTINE, INSPECTION, LICENSING SELECT AGENTS AND TOXINS § 73.10 Restricting access to select agents and toxins; security risk assessments. (a) An individual or entity required...

  11. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Restricting access to select agents and toxins... AND HUMAN SERVICES QUARANTINE, INSPECTION, LICENSING SELECT AGENTS AND TOXINS § 73.10 Restricting access to select agents and toxins; security risk assessments. (a) An individual or entity required...

  12. Implementing Solar Technologies at Airports

    SciTech Connect

    Kandt, A.; Romero, R.

    2014-07-01

    Federal agencies, such as the Department of Defense and Department of Homeland Security, as well as numerous private entities are actively pursuing the installation of solar technologies to help reduce fossil fuel energy use and associated emissions, meet sustainability goals, and create more robust or reliable operations. One potential approach identified for siting solar technologies is the installation of solar energy technologies at airports and airfields, which present a significant opportunity for hosting solar technologies due to large amounts of open land. This report focuses largely on the Federal Aviation Administration's (FAA's) policies toward siting solar technologies at airports.

  13. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets the... inspections and screening of people and their personal effects; and (11) Respond to the presence of... additional security measures may include: (1) Increasing the frequency and detail of screening of people...

  14. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets the... inspections and screening of people and their personal effects; and (11) Respond to the presence of... additional security measures may include: (1) Increasing the frequency and detail of screening of people...

  15. A Delicate Balance: National Security vs. Public Access

    ERIC Educational Resources Information Center

    Klein, Bonnie; Schwalb, Sandy

    2005-01-01

    Sometimes people want to see data that the government thinks should be kept under wraps. How does the Department of Defense balance the scales of justice while still ensuring information security? In the aftermath of September 11, 2001, the Defense Technical Information Center (DTIC) found itself in the spotlight as journalists, academics, and…

  16. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... TWIC; (ii) Verification that the TWIC has not expired; and (iii) A visual check of the various security... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets the... full or partial search of the OCS facility....

  17. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... has not expired; and (iii) A visual check of the various security features present on the card to... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... operations; (8) Evacuating the vessel; (9) Moving the vessel; or (10) Preparing for a full or partial...

  18. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... for expedited screening at participating airport security checkpoints. This updated system will be... identification of passengers who are eligible for expedited screening at participating airport security... participating airport security checkpoints. \\10\\ ``Sterile area'' means a portion of an airport defined in...

  19. Whiffing the Airport Interview

    ERIC Educational Resources Information Center

    Williamson, David

    2008-01-01

    An airport interview is an initial interview for a senior administrative position conducted at an airport hotel not too far from the campus in question. Meeting at an airport enables a search committee to interview a large number of candidates in a short period of time with a degree of confidentiality. At the conclusion of the airport interviews,…

  20. Secure Web-Site Access with Tickets and Message-Dependent Digests

    USGS Publications Warehouse

    Donato, David I.

    2008-01-01

    Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.

  1. Climate Change and Global Food Security: Food Access, Utilization, and the US Food System

    NASA Astrophysics Data System (ADS)

    Brown, M. E.; Antle, J. M.; Backlund, P. W.; Carr, E. R.; Easterling, W. E.; Walsh, M.; Ammann, C. M.; Attavanich, W.; Barrett, C. B.; Bellemare, M. F.; Dancheck, V.; Funk, C.; Grace, K.; Ingram, J. S. I.; Jiang, H.; Maletta, H.; Mata, T.; Murray, A.; Ngugi, M.; Ojima, D. S.; O'Neill, B. C.; Tebaldi, C.

    2015-12-01

    This paper will summarize results from the USDA report entitled 'Climate change, Global Food Security and the U.S. Food system'. The report focuses on the impact of climate change on global food security, defined as "when all people at all times have physical, social, and economic access to sufficient, safe, and nutritious food to meet their dietary needs and food preferences for an active and healthy life". The assessment brought together authors and contributors from twenty federal, academic, nongovernmental, intergovernmental, and private organizations in four countries to identify climate change effects on food security through 2100, and analyze the U.S.'s likely connections with that world. This talk will describe how climate change will likely affect food access and food utilization, and summarize how the U.S. food system contributes to global food security, and will be affected by climate change.

  2. Necessary security mechanisms in a PACS DICOM access system with web technology.

    PubMed

    Vázquez-Naya, José; Loureiro, Javier; Calle, Julián; Vidal, Jorge; Sierra, Alejandro

    2002-01-01

    The evolution in information and telecommunication technologies has allowed the development of systems that use the Internet infrastructure and Web technology to remotely access a hospital's picture archiving and communication system (PACS). However, one of the main problems in the construction of this type of system is the development of mechanisms that guarantee the security of the medical data that are being consulted. Most countries have specific norms for the protection of such medical data. This work describes security mechanisms that are developed in an access system to PACS DICOM with Web technology and comply with the Spanish legislation concerning the protection of medical data. The proposed security mechanisms are flexible, they leave room for the definition of security policies adjusted to the needs of each particular organization and they can be adapted to comply with new or foreign norms.

  3. Experimental realization of an entanglement access network and secure multi-party computation.

    PubMed

    Chang, X-Y; Deng, D-L; Yuan, X-X; Hou, P-Y; Huang, Y-Y; Duan, L-M

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  4. Experimental realization of an entanglement access network and secure multi-party computation.

    PubMed

    Chang, X-Y; Deng, D-L; Yuan, X-X; Hou, P-Y; Huang, Y-Y; Duan, L-M

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  5. Experimental realization of an entanglement access network and secure multi-party computation

    PubMed Central

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  6. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-07-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  7. A human engineering and ergonomic evaluation of the security access panel interface

    SciTech Connect

    Hartney, C.; Banks, W.W.

    1995-02-01

    The purpose of this study was to empirically determine which of several security hardware interface designs produced the highest levels of end-user performance and acceptance. The FESSP Security Alarms and Monitoring Systems program area commissioned the authors study as decision support for upgrading the Argus security system`s primary user interface so that Argus equipment will support the new DOE and DoD security access badges. Twenty-two test subjects were repeatedly tested using six remote access panel (RAP) designs. Lawrence Livermore National Laboratory (LLNL) uses one of these interface designs in its security access booths. Along with the RAP B insert-style reader, the authors tested five prototype RAP variants, each with a different style of swipe badge reader, through which a badge is moved or swiped. The authors asked the untrained test subjects to use each RAP while they described how they thought they should respond so that the system would operate correctly in reading the magnetic strip on a security badge. With each RAP variant, subjects were required to make four successful card reads (swipes) in which the card reader correctly read and logged the transaction. After each trial, a subject completed a 10-item interface acceptance evaluation before approaching the next RAP. After interacting with the RAP interfaces (for a total of the six RAP trials), each subject completed a 7-item overview evaluation that compared and ranked the five experimental RAPs, using the original (RAP B) insert style as a standard.

  8. K-12 access to internet: Securing the legal framework

    NASA Astrophysics Data System (ADS)

    Blauassociate, Andrew

    1993-09-01

    While many people in government, education, and industry have lauded the potential educational value of Internet access for students in grades K-12, there is as yet no legal or regulatory framework within which this new medium is being offered to students. The Communications Policy Forum, a nonpartisan project of the Electronic Frontier Foundation, recently convened a roundtable to discuss some of the legal issues that arise when K-12 schools provide Internet access to their students. Approximately 15 people, representing carriers who provide connections to the Internet, schools or school systems who are connected to the Internet, and legal experts with expertise in this and related areas, met to discuss questions of legal liability as this new medium enters an educational setting for minors. The following attempts to capture the major issues, suggestions, and directions for further collaborative efforts raised during the course of that discussion. In brief, the group identified statutory language aimed at other types of electronic communication that may offer some guidance; was briefed on a host of state laws that could be used to prosecute providers of certain materials found on the Internet; and concluded that there is no case law that clearly applies to this setting. The discussion revealed an interest in anticipating issues and developing responses before problems arose, and the need for shared approaches to allow carriers to move forward in serving and expanding this field. Members of the group offered to pursue these issues jointly and agreed upon a handful of concrete steps for further exploration and discussion.

  9. Productivity Analysis of Public and Private Airports: A Causal Investigation

    NASA Technical Reports Server (NTRS)

    Vasigh, Bijan; Gorjidooz, Javad

    2007-01-01

    Around the world, airports are being viewed as enterprises, rather than public services, which are expected to be managed efficiently and provide passengers with courteous customer services. Governments are, increasingly, turning to the private sectors for their efficiency in managing the operation, financing, and development, as well as providing security for airports. Operational and financial performance evaluation has become increasingly important to airport operators due to recent trends in airport privatization. Assessing performance allows the airport operators to plan for human resources and capital investment as efficiently as possible. Productivity measurements may be used as comparisons and guidelines in strategic planning, in the internal analysis of operational efficiency and effectiveness, and in assessing the competitive position of an airport in transportation industry. The primary purpose of this paper is to investigate the operational and financial efficiencies of 22 major airports in the United States and Europe. These airports are divided into three groups based on private ownership (7 British Airport Authority airports), public ownership (8 major United States airports), and a mix of private and public ownership (7 major European Union airports. The detail ownership structures of these airports are presented in Appendix A. Total factor productivity (TFP) model was utilized to measure airport performance in terms of financial and operational efficiencies and to develop a benchmarking tool to identify the areas of strength and weakness. A regression model was then employed to measure the relationship between TFP and ownership structure. Finally a Granger causality test was performed to determine whether ownership structure is a Granger cause of TFP. The results of the analysis presented in this paper demonstrate that there is not a significant relationship between airport TFP and ownership structure. Airport productivity and efficiency is

  10. An access control model with high security for distributed workflow and real-time application

    NASA Astrophysics Data System (ADS)

    Han, Ruo-Fei; Wang, Hou-Xiang

    2007-11-01

    The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.

  11. Food Security and Women's Access to Natural Resources workshop; a brief report.

    PubMed

    1997-01-01

    This article describes the workshop on Food Security and Women's Access to Natural Resources, held in January 1997 in Mumbai, India. The workshop was organized jointly by the Tata Institute of Social Sciences and the Indian Association of Women's Studies. The aim was to examine the food security situation in Maharashtra and Gujarat states in the west, the initiative to build alternative institutions, legal changes augmenting industrialization, and how traditional rights to common property resources can be legalized and how the poor can have access to new resources. The workshop organizers were unable to obtain experts on some topics. Core discussion centered on changes in industrialization, natural resources, gender and food security; access to natural resources and poverty alleviation programs; initiatives to create food security; and laws related to access to land and water. Discussions revealed the alienation of small and marginal farmers, landless laborers, and artisans from their livelihoods and survival strategies for these disenfranchised groups. The design of drought eradication and water conservation programs did not permit women and men working at construction sites to have access to the program assets. Case studies revealed situations in which women won the right of access to community water and then negotiated for land in lease. The women used landowners to negotiate credit and access development program assets, but normal channels of the National Bank of Agricultural Research and Development could have provided these benefits. Participants discussed how governments can be held accountable and how public funds could be used to revamp poverty alleviation and asset creation programs. All agreed that macrolevel development should give priority to agricultural development and legal constraints or problems. Five follow-up activities are identified.

  12. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    NASA Astrophysics Data System (ADS)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  13. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    ERIC Educational Resources Information Center

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  14. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Restricting access to select agents and toxins; security risk assessments. 73.10 Section 73.10 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH... Responsible Official and a showing of good cause (e.g., public health or agricultural emergencies,...

  15. Securing TCP/IP and Dial-up Access to Administrative Data.

    ERIC Educational Resources Information Center

    Conrad, L. Dean

    1992-01-01

    This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…

  16. 47 CFR 76.1204 - Availability of equipment performing conditional access or security functions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... security functions. (a)(1) A multichannel video programming distributor that utilizes navigation devices to... access functions of such devices. Commencing on July 1, 2007, no multichannel video programming... requirement shall not apply to a multichannel video programming distributor that supports the active use...

  17. Secure wide area network access to CMS analysis data using the Lustre filesystem

    NASA Astrophysics Data System (ADS)

    Bourilkov, D.; Avery, P.; Cheng, M.; Fu, Y.; Kim, B.; Palencia, J.; Budden, R.; Benninger, K.; Rodriquez, J. L.; Dilascio, J.; Dykstra, D.; Seenu, N.

    2012-12-01

    This paper reports the design and implementation of a secure, wide area network (WAN), distributed filesystem by the ExTENCI project (Extending Science Through Enhanced National CyberInfrastructure), based on the Lustre filesystem. The system is used for remote access to analysis data from the Compact Muon Solenoid (CMS) experiment at the Large Hadron Collider (LHC), and from the Lattice Quantum ChromoDynamics (LQCD) project. Security is provided by Kerberos authentication and authorization with additional fine grained control based on Lustre ACLs (Access Control List) and quotas. We investigate the impact of using various Kerberos security flavors on the I/O rates of CMS applications on client nodes reading and writing data to the Lustre filesystem, and on LQCD benchmarks. The clients can be real or virtual nodes. We are investigating additional options for user authentication based on user certificates.

  18. NASA New Virtual Airport

    NASA Technical Reports Server (NTRS)

    1995-01-01

    NASA's Virtual Airport Tower is located at the Ames Research Center, Moffett Field, California. The Virtual Airport Tower's two-story structure is a full-scale, highly sophisticated simulation facility that will emulate Level 5 air traffic control towers and the busiest airports. It provides the platform to conduct in-depth human factors studies with quantifiable results using actual air traffic controllers, airline dispatchers and airport managers.

  19. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo and cargo screening: Security... COMMERCIAL OPERATORS Operations § 1544.228 Access to cargo and cargo screening: Security threat assessments... authorizes to screen cargo or to supervise the screening of cargo under § 1544.205....

  20. An efficient and secure attribute based signcryption scheme with LSSS access structure.

    PubMed

    Hong, Hanshu; Sun, Zhixin

    2016-01-01

    Attribute based encryption (ABE) and attribute based signature (ABS) provide flexible access control with authentication for data sharing between users, but realizing both functions will bring about too much computation burden. In this paper, we combine the advantages of CP-ABE with ABS and propose a ciphertext policy attribute based signcryption scheme. In our scheme, only legal receivers can decrypt the ciphertext and verify the signature signed by data owner. Furthermore, we use linear secret sharing scheme instead of tree structure to avoid the frequent calls of recursive algorithm. By security and performance analysis, we prove that our scheme is secure as well as gains higher efficiency. PMID:27330910

  1. Catheter Securement Systems for Peripherally Inserted and Nontunneled Central Vascular Access Devices

    PubMed Central

    Krenik, Karen M.; Smith, Graham E.

    2016-01-01

    Sutureless catheter securement systems are intended to eliminate risks associated with sutures. The clinical acceptability of a novel system was investigated compared with the current method of securement for peripherally inserted central catheters (19 facilities using StatLock or sutures) or nontunneled central vascular access devices (3 facilities using StatLock or sutures or HubGuard + Sorbaview Shield). More than 94% of respondents rated the novel system as same, better, or much better than their current product. More than 82% of respondents were willing to replace their current system with the new one. PMID:27379679

  2. 19 CFR 122.12 - Operation of international airports.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Administration in 14 CFR part 91. (2) Customs and Border Protection. CBP, based on security or other risk... 19 Customs Duties 1 2012-04-01 2012-04-01 false Operation of international airports. 122.12...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.12 Operation of...

  3. 19 CFR 122.12 - Operation of international airports.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Administration in 14 CFR part 91. (2) Customs and Border Protection. CBP, based on security or other risk... 19 Customs Duties 1 2011-04-01 2011-04-01 false Operation of international airports. 122.12...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.12 Operation of...

  4. 19 CFR 122.12 - Operation of international airports.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Administration in 14 CFR part 91. (2) Customs and Border Protection. CBP, based on security or other risk... 19 Customs Duties 1 2014-04-01 2014-04-01 false Operation of international airports. 122.12...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.12 Operation of...

  5. 19 CFR 122.12 - Operation of international airports.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Administration in 14 CFR part 91. (2) Customs and Border Protection. CBP, based on security or other risk... 19 Customs Duties 1 2013-04-01 2013-04-01 false Operation of international airports. 122.12...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.12 Operation of...

  6. 17 CFR 256.310 - Aircraft and airport equipment.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Aircraft and airport equipment... UTILITY HOLDING COMPANY ACT OF 1935 Service Company Property Accounts § 256.310 Aircraft and airport equipment. This account shall include the delivered cost of all service company owned aircraft...

  7. 17 CFR 256.310 - Aircraft and airport equipment.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Aircraft and airport equipment... UTILITY HOLDING COMPANY ACT OF 1935 Service Company Property Accounts § 256.310 Aircraft and airport equipment. This account shall include the delivered cost of all service company owned aircraft...

  8. Inguinal Hernia and Airport Scanners: An Emerging Indication for Repair?

    PubMed Central

    Cawich, Shamir O.; Maharaj, Ravi; Dan, Dilip

    2013-01-01

    The use of advanced imaging technology at international airports is increasing in popularity as a corollary to heightened security concerns across the globe. Operators of airport scanners should be educated about common medical disorders such as inguinal herniae in order to avoid unnecessary harassment of travelers since they will encounter these with increasing frequency. PMID:24368923

  9. Airport Choice in Sao Paulo Metropolitan Area: An Application of the Conditional Logit Model

    NASA Technical Reports Server (NTRS)

    Moreno, Marcelo Baena; Muller, Carlos

    2003-01-01

    Using the conditional LOGIT model, this paper addresses the airport choice in the Sao Paulo Metropolitan Area. In this region, Guarulhos International Airport (GRU) and Congonhas Airport (CGH) compete for passengers flying to several domestic destinations. The airport choice is believed to be a result of the tradeoff passengers perform considering airport access characteristics, airline level of service characteristics and passenger experience with the analyzed airports. It was found that access time to the airports better explain the airport choice than access distance, whereas direct flight frequencies gives better explanation to the airport choice than the indirect (connections and stops) and total (direct plus indirect) flight frequencies. Out of 15 tested variables, passenger experience with the analyzed airports was the variable that best explained the airport choice in the region. Model specifications considering 1, 2 or 3 variables were tested. The model specification most adjusted to the observed data considered access time, direct flight frequencies in the travel period (morning or afternoon peak) and passenger experience with the analyzed airports. The influence of these variables was therefore analyzed across market segments according to departure airport and flight duration criteria. The choice of GRU (located neighboring Sao Paulo city) is not well explained by the rationality of access time economy and the increase of the supply of direct flight frequencies, while the choice of CGH (located inside Sao Paulo city) is. Access time was found to be more important to passengers flying shorter distances while direct flight frequencies in the travel period were more significant to those flying longer distances. Keywords: Airport choice, Multiple airport region, Conditional LOGIT model, Access time, Flight frequencies, Passenger experience with the analyzed airports, Transportation planning

  10. The climate sensitivity of food security in Mali - a historical perspective on availability and access dimensions

    NASA Astrophysics Data System (ADS)

    Giannini, A.; Krishnamurthy, P. K.; Cousin, R.; Choularton, R. J.

    2011-12-01

    We present results based on an analysis of a 2005 livelihood survey of ~2000 rural households in ~200 villages scattered across Mali, a sparsely populated, large land-locked country in West Africa, to elucidate the role of climate variability and change in shaping availability and access dimensions of food security. The Comprehensive Food Security Vulnerability Analysis is a recurrent survey carried out by the World Food Programme and in-country partners to map out nutritional and socio-economic status during normal (~food secure) conditions in the hope of understanding underlying cause(s) and prevent the next food security crisis. We set the spatial characterization of food security that emerges from the CFSVA against the background of a varying climate, on intra-seasonal, interannual and multi-decadal time scales: through elucidation of the influence of climate on agricultural production we arrive at an interpretation of structural and conjunctural events affecting food security. We conclude with a discussion of possible interventions to reduce vulnerability.

  11. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Airport-approved and exclusive area personnel... AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.231 Airport-approved... carry out a personnel identification system for identification media that are airport-approved,...

  12. 49 CFR 1554.101 - Security Measures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security Measures... display area of an airport covered by an airport security program under 49 CFR part 1542 in the United... 49 Transportation 9 2014-10-01 2014-10-01 false Security Measures. 1554.101 Section...

  13. Joint robustness security in optical OFDM access system with Turbo-coded subcarrier rotation.

    PubMed

    Zhang, Lijia; Liu, Bo; Xin, Xiangjun; Wang, Yongjun

    2015-01-12

    This paper proposes a novel robust physical secure method for optical orthogonal frequency division multiplexing (OFDM) access system based on Turbo-coded subcarrier rotation. It can realize a secure communication while keep robustness to channel noise. The subcarrier rotation is controlled by the interleaver module of Turbo coding, which is under the charge of Logistic map. The random puncturing can further enhance the security. The channel feedback can ensure the puncturing module working at a suitable coding rate. A 72.28 Gb/s encrypted 16QAM-OFDM signal is successfully demonstrated in the experiment. The results show robust performance under different channel noise conditions and good resistance to illegal optical network unit (ONU).

  14. Efforts to secure universal access to HIV/AIDS treatment: a comparison of BRICS countries.

    PubMed

    Sun, Jing; Boing, Alexandra Crispim; Silveira, Marysabel P T; Bertoldi, Andréa D; Ziganshina, Liliya E; Khaziakhmetova, Veronica N; Khamidulina, Rashida M; Chokshi, Maulik R; McGee, Shelley; Suleman, Fatima

    2014-02-01

    This article illustrates how the BRICS countries have been building their focused leadership, making important high level commitment and national policy changes, and improving their health systems, in addressing the HIV/AIDS epidemics in respective settings. Specific aspects are focused on efforts of creating public provisions to secure universal access to ARVs from the aspects of active responsive system and national program, health system strengthening, fostering local production of ARVs, supply chain management, and information system strengthening. Challenges in each BRICS country are analyzed respectively. The most important contributors to the success of response to HIV/AIDS include: creating legal basis for healthcare as a fundamental human right; political commitment to necessary funding for universal access and concrete actions to secure equal quality care; comprehensive system to secure demands that all people in need are capable of accessing prevention, treatment and care; active community involvement; decentralization of the management system considering the local settings; integration of treatment and prevention; taking horizontal approach to strengthen health systems; fully use of the TRIPS flexibility; and regular monitoring and evaluation to serve evidence based decision making.

  15. Security of social network credentials for accessing course portal: Users' experience

    NASA Astrophysics Data System (ADS)

    Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee

    2015-12-01

    Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.

  16. Access technology and dementia care: influences on residents' everyday lives in a secure unit.

    PubMed

    Margot-Cattin, Isabel; Nygård, Louise

    2006-06-01

    There is a need to understand how technology can best be used to facilitate well-being in people with dementia. This study sought to describe how access control technology influenced the everyday lives of people with dementia living in a secure unit. The staff members and the unit's residents participated in the study. Data were collected through ethnographic observations and semi-structured interviews over 6 months, and were analyzed using the constant comparative method. The results show how access technology supported the residents' sense of security, territoriality, orientation, and adaptation to the environment. However, certain conditions were necessary for these influences to appear. Overall, the results indicate that access control technology may be used to support the well-being of people with dementia, and to increase their opportunities to feel in place in a secure unit. However, there is an urgent need in the future for further exploration of the conditions for use of technology in the field of dementia care, and the necessity of making careful evaluations of the use of technology in this field cannot be overemphasized. PMID:16856468

  17. Ground water security and drought in Africa: linking availability, access, and demand.

    PubMed

    Calow, Roger C; Macdonald, Alan M; Nicol, Alan L; Robins, Nick S

    2010-01-01

    Drought in Africa has been extensively researched, particularly from meteorological, agricultural, and food security perspectives. However, the impact of drought on water security, particularly ground water dependent rural water supplies, has received much less attention. Policy responses have concentrated on food needs, and it has often been difficult to mobilize resources for water interventions, despite evidence that access to safe water is a serious and interrelated concern. Studies carried out in Ghana, Malawi, South Africa, and Ethiopia highlight how rural livelihoods are affected by seasonal stress and longer-term drought. Declining access to food and water is a common and interrelated problem. Although ground water plays a vital role in buffering the effects of rainfall variability, water shortages and difficulties in accessing water that is available can affect domestic and productive water uses, with knock-on effects on food consumption and production. Total depletion of available ground water resources is rarely the main concern. A more common scenario is a spiral of water insecurity as shallow water sources fail, additional demands are put on remaining sources, and mechanical failures increase. These problems can be planned for within normal development programs. Water security mapping can help identify vulnerable areas, and changes to monitoring systems can ensure early detection of problems. Above all, increasing the coverage of ground water-based rural water supplies, and ensuring that the design and siting of water points is informed by an understanding of hydrogeological conditions and user demand, can significantly increase the resilience of rural communities to climate variability.

  18. Efforts to secure universal access to HIV/AIDS treatment: a comparison of BRICS countries.

    PubMed

    Sun, Jing; Boing, Alexandra Crispim; Silveira, Marysabel P T; Bertoldi, Andréa D; Ziganshina, Liliya E; Khaziakhmetova, Veronica N; Khamidulina, Rashida M; Chokshi, Maulik R; McGee, Shelley; Suleman, Fatima

    2014-02-01

    This article illustrates how the BRICS countries have been building their focused leadership, making important high level commitment and national policy changes, and improving their health systems, in addressing the HIV/AIDS epidemics in respective settings. Specific aspects are focused on efforts of creating public provisions to secure universal access to ARVs from the aspects of active responsive system and national program, health system strengthening, fostering local production of ARVs, supply chain management, and information system strengthening. Challenges in each BRICS country are analyzed respectively. The most important contributors to the success of response to HIV/AIDS include: creating legal basis for healthcare as a fundamental human right; political commitment to necessary funding for universal access and concrete actions to secure equal quality care; comprehensive system to secure demands that all people in need are capable of accessing prevention, treatment and care; active community involvement; decentralization of the management system considering the local settings; integration of treatment and prevention; taking horizontal approach to strengthen health systems; fully use of the TRIPS flexibility; and regular monitoring and evaluation to serve evidence based decision making. PMID:25155561

  19. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  20. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  1. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  2. 49 CFR 1542.107 - Changed conditions affecting security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.107 Changed conditions affecting security. (a) After approval of the security... 49 Transportation 9 2013-10-01 2013-10-01 false Changed conditions affecting security....

  3. 49 CFR 1542.107 - Changed conditions affecting security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.107 Changed conditions affecting security. (a) After approval of the security... 49 Transportation 9 2014-10-01 2014-10-01 false Changed conditions affecting security....

  4. New advanced technologies to provide decentralised and secure access to medical records: case studies in oncology.

    PubMed

    Quantin, Catherine; Coatrieux, Gouenou; Allaert, François André; Fassa, Maniane; Bourquard, Karima; Boire, Jean-Yves; de Vlieger, Paul; Maigne, Lydia; Breton, Vincent

    2009-08-07

    The main problem for health professionals and patients in accessing information is that this information is very often distributed over many medical records and locations. This problem is particularly acute in cancerology because patients may be treated for many years and undergo a variety of examinations. Recent advances in technology make it feasible to gain access to medical records anywhere and anytime, allowing the physician or the patient to gather information from an "ephemeral electronic patient record". However, this easy access to data is accompanied by the requirement for improved security (confidentiality, traceability, integrity, ...) and this issue needs to be addressed. In this paper we propose and discuss a decentralised approach based on recent advances in information sharing and protection: Grid technologies and watermarking methodologies. The potential impact of these technologies for oncology is illustrated by the examples of two experimental cases: a cancer surveillance network and a radiotherapy treatment plan. It is expected that the proposed approach will constitute the basis of a future secure "google-like" access to medical records.

  5. New Advanced Technologies to Provide Decentralised and Secure Access to Medical Records: Case Studies in Oncology

    PubMed Central

    Quantin, Catherine; Coatrieux, Gouenou; Allaert, François André; Fassa, Maniane; Bourquard, Karima; Boire, Jean-Yves; de Vlieger, Paul; Maigne, Lydia; Breton, Vincent

    2009-01-01

    The main problem for health professionals and patients in accessing information is that this information is very often distributed over many medical records and locations. This problem is particularly acute in cancerology because patients may be treated for many years and undergo a variety of examinations. Recent advances in technology make it feasible to gain access to medical records anywhere and anytime, allowing the physician or the patient to gather information from an “ephemeral electronic patient record”. However, this easy access to data is accompanied by the requirement for improved security (confidentiality, traceability, integrity, ...) and this issue needs to be addressed. In this paper we propose and discuss a decentralised approach based on recent advances in information sharing and protection: Grid technologies and watermarking methodologies. The potential impact of these technologies for oncology is illustrated by the examples of two experimental cases: a cancer surveillance network and a radiotherapy treatment plan. It is expected that the proposed approach will constitute the basis of a future secure “google-like” access to medical records. PMID:19718446

  6. New MagViz Airport Liquid Analysis System Undergoes Testing

    SciTech Connect

    2008-12-18

    LOS ALAMOS, New Mexico, December 16, 2008—An innovative application of a technology first used for medical imaging may enhance airport security if Los Alamos National Laboratory scientists are successful. Los Alamos technologists have adapted Magnetic Res

  7. Volcanic hazards to airports

    USGS Publications Warehouse

    Guffanti, M.; Mayberry, G.C.; Casadevall, T.J.; Wunderman, R.

    2009-01-01

    Volcanic activity has caused significant hazards to numerous airports worldwide, with local to far-ranging effects on travelers and commerce. Analysis of a new compilation of incidents of airports impacted by volcanic activity from 1944 through 2006 reveals that, at a minimum, 101 airports in 28 countries were affected on 171 occasions by eruptions at 46 volcanoes. Since 1980, five airports per year on average have been affected by volcanic activity, which indicates that volcanic hazards to airports are not rare on a worldwide basis. The main hazard to airports is ashfall, with accumulations of only a few millimeters sufficient to force temporary closures of some airports. A substantial portion of incidents has been caused by ash in airspace in the vicinity of airports, without accumulation of ash on the ground. On a few occasions, airports have been impacted by hazards other than ash (pyroclastic flow, lava flow, gas emission, and phreatic explosion). Several airports have been affected repeatedly by volcanic hazards. Four airports have been affected the most often and likely will continue to be among the most vulnerable owing to continued nearby volcanic activity: Fontanarossa International Airport in Catania, Italy; Ted Stevens Anchorage International Airport in Alaska, USA; Mariscal Sucre International Airport in Quito, Ecuador; and Tokua Airport in Kokopo, Papua New Guinea. The USA has the most airports affected by volcanic activity (17) on the most occasions (33) and hosts the second highest number of volcanoes that have caused the disruptions (5, after Indonesia with 7). One-fifth of the affected airports are within 30 km of the source volcanoes, approximately half are located within 150 km of the source volcanoes, and about three-quarters are within 300 km; nearly one-fifth are located more than 500 km away from the source volcanoes. The volcanoes that have caused the most impacts are Soufriere Hills on the island of Montserrat in the British West Indies

  8. Giving patients secure < Google-like > access to their medical record.

    PubMed

    Quantin, Catherine; Fassa, Maniane; Coatrieux, Gouenou; Breton, Vincent; Boire, Jean Yves; Allaert, François André

    2008-01-01

    The main problem for the patient who wants to have access to all of the information about his health is that this information is very often spread over many medical records. Therefore, it would be convenient for the patient, after being identified and authenticated, to use a kind of specific medical search engine as one part of the solution to this main problem. The principal objective is for the patient to have access to his or her medical information at anytime and wherever it has been stored. This proposal for secure "Google Like" access requires the addition of different conditions: very strict identity checks using cryptographic techniques such as those planned for the electronic signature, which will not only ensure authentication of the patient and integrity of the file, but also protection of the confidentiality and access follow-up. The electronic medical record must also be electronically signed by the practitioner in order to provide evidence that he has given his agreement and accepted responsibility for the content. This electronic signature also prevents any kind of post-transmission falsification. New advances in technology make it possible to envisage access to medical records anywhere and anytime, thanks to Grid and watermarking methodologies.

  9. A secure WDM ring access network employing silicon micro-ring based remote node

    NASA Astrophysics Data System (ADS)

    Sung, Jiun-Yu; Chow, Chi-Wai; Yeh, Chien-Hung; Xu, Ke; Hsu, Chin-Wei; Su, Hong-Quan; Tsang, Hon-Ki

    2014-08-01

    A secure and scalable wavelength-division-multiplexing (WDM) ring-based access network is proposed and demonstrated using proof-of-concept experiments. In the remote node (RN), wavelength hopping for specific optical networking unit (ONU) is deployed by using silicon micro-ring resonators (SMR). Using silicon-based devices could be cost-effective for the cost-sensitive access network. Hence the optical physical layer security is introduced. The issues of denial of service (DOS) attacks, eavesdropping and masquerading can be made more difficult in the proposed WDM ring-based access network. Besides, the SMRs with different dropped wavelengths can be cascaded, such that the signals pass through the preceding SMRs can be dropped by a succeeding SMR. This can increase the scalability of the RN for supporting more ONUs for future upgrade. Here, error-free 10 Gb/s downlink and 1.25 Gb/s uplink transmission are demonstrated to show the feasibility of the proposed network.

  10. Building secure wireless access point based on certificate authentication and firewall captive portal

    NASA Astrophysics Data System (ADS)

    Soewito, B.; Hirzi

    2014-03-01

    Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall. We also divided the network for employer and visitor to increase the level of security. Our experiment showed that the WLAN could be broken using the attacker tool such as airodump, aireply, and aircrack.

  11. Access and privacy rights using web security standards to increase patient empowerment.

    PubMed

    Falcão-Reis, Filipa; Costa-Pereira, Altamiro; Correia, Manuel E

    2008-01-01

    Electronic Health Record (EHR) systems are becoming more and more sophisticated and include nowadays numerous applications, which are not only accessed by medical professionals, but also by accounting and administrative personnel. This could represent a problem concerning basic rights such as privacy and confidentiality. The principles, guidelines and recommendations compiled by the OECD protection of privacy and trans-border flow of personal data are described and considered within health information system development. Granting access to an EHR should be dependent upon the owner of the record; the patient: he must be entitled to define who is allowed to access his EHRs, besides the access control scheme each health organization may have implemented. In this way, it's not only up to health professionals to decide who have access to what, but the patient himself. Implementing such a policy is walking towards patient empowerment which society should encourage and governments should promote. The paper then introduces a technical solution based on web security standards. This would give patients the ability to monitor and control which entities have access to their personal EHRs, thus empowering them with the knowledge of how much of his medical history is known and by whom. It is necessary to create standard data access protocols, mechanisms and policies to protect the privacy rights and furthermore, to enable patients, to automatically track the movement (flow) of their personal data and information in the context of health information systems. This solution must be functional and, above all, user-friendly and the interface should take in consideration some heuristics of usability in order to provide the user with the best tools. The current official standards on confidentiality and privacy in health care, currently being developed within the EU, are explained, in order to achieve a consensual idea of the guidelines that all member states should follow to transfer

  12. Access and privacy rights using web security standards to increase patient empowerment.

    PubMed

    Falcão-Reis, Filipa; Costa-Pereira, Altamiro; Correia, Manuel E

    2008-01-01

    Electronic Health Record (EHR) systems are becoming more and more sophisticated and include nowadays numerous applications, which are not only accessed by medical professionals, but also by accounting and administrative personnel. This could represent a problem concerning basic rights such as privacy and confidentiality. The principles, guidelines and recommendations compiled by the OECD protection of privacy and trans-border flow of personal data are described and considered within health information system development. Granting access to an EHR should be dependent upon the owner of the record; the patient: he must be entitled to define who is allowed to access his EHRs, besides the access control scheme each health organization may have implemented. In this way, it's not only up to health professionals to decide who have access to what, but the patient himself. Implementing such a policy is walking towards patient empowerment which society should encourage and governments should promote. The paper then introduces a technical solution based on web security standards. This would give patients the ability to monitor and control which entities have access to their personal EHRs, thus empowering them with the knowledge of how much of his medical history is known and by whom. It is necessary to create standard data access protocols, mechanisms and policies to protect the privacy rights and furthermore, to enable patients, to automatically track the movement (flow) of their personal data and information in the context of health information systems. This solution must be functional and, above all, user-friendly and the interface should take in consideration some heuristics of usability in order to provide the user with the best tools. The current official standards on confidentiality and privacy in health care, currently being developed within the EU, are explained, in order to achieve a consensual idea of the guidelines that all member states should follow to transfer

  13. Benchmark Airport Charges

    NASA Technical Reports Server (NTRS)

    de Wit, A.; Cohn, N.

    1999-01-01

    The Netherlands Directorate General of Civil Aviation (DGCA) commissioned Hague Consulting Group (HCG) to complete a benchmark study of airport charges at twenty eight airports in Europe and around the world, based on 1996 charges. This study followed previous DGCA research on the topic but included more airports in much more detail. The main purpose of this new benchmark study was to provide insight into the levels and types of airport charges worldwide and into recent changes in airport charge policy and structure. This paper describes the 1996 analysis. It is intended that this work be repeated every year in order to follow developing trends and provide the most up-to-date information possible.

  14. Resource reliability, accessibility and governance: pillars for managing water resources to achieve water security in Nepal

    NASA Astrophysics Data System (ADS)

    Biggs, E. M.; Duncan, J.; Atkinson, P.; Dash, J.

    2013-12-01

    As one of the world's most water-abundant countries, Nepal has plenty of water yet resources are both spatially and temporally unevenly distributed. With a population heavily engaged in subsistence farming, whereby livelihoods are entirely dependent on rain-fed agriculture, changes in freshwater resources can substantially impact upon survival. The two main sources of water in Nepal come from monsoon precipitation and glacial runoff. The former is essential for sustaining livelihoods where communities have little or no access to perennial water resources. Much of Nepal's population live in the southern Mid-Hills and Terai regions where dependency on the monsoon system is high and climate-environment interactions are intricate. Any fluctuations in precipitation can severely affect essential potable resources and food security. As the population continues to expand in Nepal, and pressures build on access to adequate and clean water resources, there is a need for institutions to cooperate and increase the effectiveness of water management policies. This research presents a framework detailing three fundamental pillars for managing water resources to achieve sustainable water security in Nepal. These are (i) resource reliability; (ii) adequate accessibility; and (iii) effective governance. Evidence is presented which indicates that water resources are adequate in Nepal to sustain the population. In addition, aspects of climate change are having less impact than previously perceived e.g. results from trend analysis of precipitation time-series indicate a decrease in monsoon extremes and interannual variation over the last half-century. However, accessibility to clean water resources and the potential for water storage is limiting the use of these resources. This issue is particularly prevalent given the heterogeneity in spatial and temporal distributions of water. Water governance is also ineffective due to government instability and a lack of continuity in policy

  15. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 3 2013-10-01 2013-10-01 false Priority Access Service (PAS) for National.... 64, App. B Appendix B to Part 64—Priority Access Service (PAS) for National Security and Emergency... meaning as in Appendix A to Part 64: (a) Assignment; (b) Government; (c) National Communications...

  16. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  17. Secure access control and large scale robust representation for online multimedia event detection.

    PubMed

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  18. 49 CFR 27.71 - Airport facilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., shuttle vehicles and people movers, shall comply with applicable requirements of the Department of... Access Act rules (49 CFR part 382) for carriers. (g) If an airport operator who receives Federal... assistive technology. (2) Clear floor or ground space. A clear floor or ground space complying with...

  19. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  20. Secure web-based access to radiology: forms and databases for fast queries

    NASA Astrophysics Data System (ADS)

    McColl, Roderick W.; Lane, Thomas J.

    2002-05-01

    Currently, Web-based access to mini-PACS or similar databases commonly utilizes either JavaScript, Java applets or ActiveX controls. Many sites do not permit applets or controls or other binary objects for fear of viruses or worms sent by malicious users. In addition, the typical CGI query mechanism requires several parameters to be sent with the http GET/POST request, which may identify the patient in some way; this in unacceptable for privacy protection. Also unacceptable are pages produced by server-side scripts which can be cached by the browser, since these may also contain sensitive information. We propose a simple mechanism for access to patient information, including images, which guarantees security of information, makes it impossible to bookmark the page, or to return to the page after some defined length of time. In addition, this mechanism is simple, therefore permitting rapid access without the need to initially download an interface such as an applet or control. In addition to image display, the design of the site allows the user to view and save movies of multi-phasic data, or to construct multi-frame datasets from entire series. These capabilities make the site attractive for research purposes such as teaching file preparation.

  1. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... screening at participating U.S. airport security checkpoints. Additionally, the Department of Homeland... ineligible for the program will continue to be screened at airport security checkpoints according to TSA... screening at airport security checkpoints. The Program retains a component of randomness to maintain...

  2. Airport vulnerability assessment: an analytical approach

    NASA Astrophysics Data System (ADS)

    Lazarick, Richard T.

    1998-12-01

    The Airport Vulnerability Assessment Project (AVAP) is the direct result of congressional funding of recommendation 3.13 of the White House Commission on Aviation Safety and Security. This project takes a new approach to the assessment of U.S. commercial airports. AVAP uses automation, analytical methods and tools to evaluate vulnerability and risk, and to analyze cost/benefits in a more quantitative manner. This paper addresses both the process used to conduct this program, as well as a generalized look at the results, which have been achieved for the initial airport assessments. The process description covers the acquisition approach, the project structure, and a review of the various methodologies and tools being used by the sever performing organizations (Abacus Technology, Battelle, CTI, Lockwood Greene, Naval Facilities Engineering Service Center, SAIC, and Science & Engineering Associates). The tools described include ASSESS, SAM, RiskWatch, CASRAP, and AVAT. Included in the process is the utilization of an advisory panel made up predominantly of experts from the National Laboratories 9Sandia, Oak Ridge, Argonne and Brookhaven). The results portion addresses the findings and products resulting from the initial airport assessments. High level (unrestricted) summaries of the results are presented, along with initial trends in commonly recommended security improvements (countermeasures). Opportunities for the application of optics technology are identified.

  3. PKI-based secure mobile access to electronic health services and data.

    PubMed

    Kambourakis, G; Maglogiannis, I; Rouskas, A

    2005-01-01

    Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks.

  4. 19 CFR 122.12 - Operation of international airports.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Administration in 14 CFR part 91. (2) Customs and Border Protection. CBP, based on security or other risk...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.12 Operation of international... to land in the United States, based upon security or other risk assessments. (3) Commercial...

  5. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    SciTech Connect

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors, as

  6. Consequences of Slot Transactions on Airport Congestion and Environmental Protection

    NASA Technical Reports Server (NTRS)

    Abeyratne, Ruwantissa I.R.

    2000-01-01

    Recent trends in the liberalization of market access by many commercial airlines have opened the skies to virtually unlimited flights between many countries. However, this liberalization is stultified by the lack of airport capacity to accommodate the many flights that are generated by demand for capacity. Accordingly, the allocation of slots for open skies airlines remain dependent on the expansion and effective management of airport capacity. This article examines the ramifications of slot allocation on traffic peaking at airports and environmental concerns, which may emerge with this activity.

  7. Integrated Airport Surface Operations

    NASA Technical Reports Server (NTRS)

    Koczo, S.

    1998-01-01

    The current air traffic environment in airport terminal areas experiences substantial delays when weather conditions deteriorate to Instrument Meteorological Conditions (IMC). Research activity at NASA has culminated in the development, flight test and demonstration of a prototype Low Visibility Landing and Surface Operations (LVLASO) system. A NASA led industry team and the FAA developed the system which integrated airport surface surveillance systems, aeronautical data links, DGPS navigation, automation systems, and controller and flight deck displays. The LVLASO system was demonstrated at the Hartsfield-Atlanta International Airport using a Boeing 757-200 aircraft during August, 1997. This report documents the contractors role in this testing particularly in the area of data link and DGPS navigation.

  8. Convenient Airports: Point of View of the Passengers

    NASA Technical Reports Server (NTRS)

    Magri, Adival Aparecido, Jr.; Alves, Claudio Jorge Pinto

    2003-01-01

    The competition among airlines or among airports aiming at to increase the demand for its services has been more and more incited. Knowledge the perception of the users for the offered services means to meet the customer's needs and expectations in order either to keep the customer, and therefore keep a significant advantage over competitors. The passenger of the air transportation wants rapidity, security and convenience. Convenience can be translated by comfort that the passenger wants for the price that he can pay. In this paper had been identified. as a result of a survey achieved in six Brazilian airports during 2002, the best indicators in the passenger's perception. These indicators among any others were listed m the handbook of Airports Council International (ACI). Distinctive perceptions were observed among passengers with different travel motivations. This survey had been carried through in the airports of Brasilia, Porto Alegre, Salvador. Fortaleza, Curitiba and Bel6m. Considering this survey we can identified the most attractive airport among them. This work is a way to help improve quality of service, in particular, m these six airports of the Brazilian network. The results should be published and made available to all the parties concerned (airport authority, airlines and service providers) and should lead to corrective action when the passenger is not satisfied with the service.

  9. A Cross-Sectional Study of Tobacco Advertising, Promotion, and Sponsorship in Airports across Europe and the United States

    PubMed Central

    Soong, Andrea; Navas-Acien, Ana; Pang, Yuanjie; Lopez, Maria Jose; Garcia-Esquinas, Esther; Stillman, Frances A.

    2016-01-01

    Tobacco advertising, promotion, and sponsorship (TAPS) bans are effective and are increasingly being implemented in a number of venues and countries, yet the state of TAPS in airports and their effect on airport smoking behavior is unknown. The objective of this study was to evaluate the presence of TAPS in airports across Europe and the US, and to begin to examine the relationship between TAPS and smoking behaviors in airports. We used a cross-sectional study design to observe 21 airports in Europe (11) and the US (10). Data collectors observed points of sale for tobacco products, types of products sold, advertisements and promotions, and branding or logos that appeared in the airport. Tobacco products were sold in 95% of all airports, with significantly more sales in Europe than the US. Advertisements appeared mostly in post-security areas; however, airports with advertisements in pre-security areas had significantly more smokers observed outdoors than airports without advertisements in pre-security areas. Tobacco branding appeared in designated smoking rooms as well as on non-tobacco products in duty free shops. TAPS are widespread in airports in Europe and the US and might be associated with outdoor smoking, though further research is needed to better understand any relationship between the two. This study adds to a growing body of research on tobacco control in air transit and related issues. As smoke-free policies advance, they should include comprehensive TAPS bans that extend to airport facilities. PMID:27690072

  10. 78 FR 48044 - Safety Zone; San Diego International Airport Terminal Two West Grand Opening Fireworks; San Diego...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    .... SUPPLEMENTARY INFORMATION: Table of Acronyms DHS Department of Homeland Security FR Federal Register NPRM Notice... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; San Diego International Airport Terminal... support of a fireworks display for the Grand Opening of Lindbergh Airport Terminal Two West on August...

  11. Evaluating the effectiveness of biometric access control systems

    NASA Astrophysics Data System (ADS)

    Lively, Valerie M.

    2005-05-01

    This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.

  12. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  13. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems. PMID:23392626

  14. 8 CFR 234.4 - International airports for entry of aliens.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false International airports for entry of aliens. 234.4 Section 234.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.4 International airports for...

  15. 8 CFR 234.4 - International airports for entry of aliens.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false International airports for entry of aliens. 234.4 Section 234.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.4 International airports for...

  16. 8 CFR 234.4 - International airports for entry of aliens.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false International airports for entry of aliens. 234.4 Section 234.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.4 International airports for...

  17. 8 CFR 234.4 - International airports for entry of aliens.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false International airports for entry of aliens. 234.4 Section 234.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.4 International airports for...

  18. 8 CFR 234.4 - International airports for entry of aliens.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false International airports for entry of aliens. 234.4 Section 234.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.4 International airports for...

  19. Catheter Securement Systems for Peripherally Inserted and Nontunneled Central Vascular Access Devices: Clinical Evaluation of a Novel Sutureless Device.

    PubMed

    Krenik, Karen M; Smith, Graham E; Bernatchez, Stéphanie F

    2016-01-01

    Sutureless catheter securement systems are intended to eliminate risks associated with sutures. The clinical acceptability of a novel system was investigated compared with the current method of securement for peripherally inserted central catheters (19 facilities using StatLock or sutures) or nontunneled central vascular access devices (3 facilities using StatLock or sutures or HubGuard + Sorbaview Shield). More than 94% of respondents rated the novel system as same, better, or much better than their current product. More than 82% of respondents were willing to replace their current system with the new one. PMID:27379679

  20. Software Tools to Support Research on Airport Departure Planning

    NASA Technical Reports Server (NTRS)

    Carr, Francis; Evans, Antony; Feron, Eric; Clarke, John-Paul

    2003-01-01

    A simple, portable and useful collection of software tools has been developed for the analysis of airport surface traffic. The tools are based on a flexible and robust traffic-flow model, and include calibration, validation and simulation functionality for this model. Several different interfaces have been developed to help promote usage of these tools, including a portable Matlab(TM) implementation of the basic algorithms; a web-based interface which provides online access to automated analyses of airport traffic based on a database of real-world operations data which covers over 250 U.S. airports over a 5-year period; and an interactive simulation-based tool currently in use as part of a college-level educational module. More advanced applications for airport departure traffic include taxi-time prediction and evaluation of "windowing" congestion control.

  1. Central venous Access device SeCurement And Dressing Effectiveness (CASCADE) in paediatrics: protocol for pilot randomised controlled trials

    PubMed Central

    Gibson, Victoria; Long, Debbie A; Williams, Tara; Hallahan, Andrew; Mihala, Gabor; Cooke, Marie; Rickard, Claire M

    2016-01-01

    Introduction Paediatric central venous access devices (CVADs) are associated with a 25% incidence of failure. Securement and dressing are strategies used to reduce failure and complication; however, innovative technologies have not been evaluated for their effectiveness across device types. The primary aim of this research is to evaluate the feasibility of launching a full-scale randomised controlled efficacy trial across three CVAD types regarding CVAD securement and dressing, using predefined feasibility criteria. Methods and analysis Three feasibility randomised, controlled trials are to be undertaken at the Royal Children's Hospital and the Lady Cilento Children's Hospital, Brisbane, Australia. CVAD securement and dressing interventions under examination compare current practice with sutureless securement devices, integrated securement dressings and tissue adhesive. In total, 328 paediatric patients requiring a peripherally inserted central catheter (n=100); non-tunnelled CVAD (n=180) and tunnelled CVAD (n=48) to be inserted will be recruited and randomly allocated to CVAD securement and dressing products. Primary outcomes will be study feasibility measured by eligibility, recruitment, retention, attrition, missing data, parent/staff satisfaction and effect size. CVAD failure and complication (catheter-associated bloodstream infection, local infection, venous thrombosis, occlusion, dislodgement and breakage) will be compared between groups. Ethics and dissemination Ethical approval to conduct the research has been obtained. All dissemination will be undertaken using the CONSORT Statement recommendations. Additionally, the results will be sent to the relevant organisations which lead CVAD focused clinical practice guidelines development. Trial registration numbers ACTRN12614001327673; ACTRN12615000977572; ACTRN12614000280606. PMID:27259529

  2. Supersonics--Airport Noise

    NASA Technical Reports Server (NTRS)

    Bridges, James

    2007-01-01

    At this, the first year-end meeting of the Fundamental Aeronautics Program, an overview of the Airport Noise discipline of the Supersonics Project leads the presentation of technical plans and achievements in this area of the Project. The overview starts by defining the Technical Challenges targeted by Airport Noise efforts, and the Approaches planned to meet these challenges. These are fleshed out in Elements, namely Prediction, Diagnostics, and Engineering, and broken down into Tasks. The Tasks level is where individual researchers' work is defined and from whence the technical presentations to follow this presentation come. This overview also presents the Milestones accomplished to date and to be completed in the next year. Finally, the NASA Research Announcement cooperative agreement activities are covered and tied to the Tasks and Milestones.

  3. 14 CFR 221.52 - Airport to airport application, accessorial services.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Airport to airport application, accessorial... Charges § 221.52 Airport to airport application, accessorial services. Tariffs shall specify whether or not the fares therein include services in addition to airport-to-airport transportation....

  4. 47 CFR 76.1204 - Availability of equipment performing conditional access or security functions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the owner or operator of the multichannel video programming system. (b) Conditional access function... controls of such devices or to provide unauthorized access to service. (d) Notwithstanding the foregoing... system; and (3) Does not provide access to any digital transmission of multichannel video programming...

  5. 78 FR 7334 - Port Authority Access to Facility Vulnerability Assessments and the Integration of Security Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-01

    ... our public dockets in the January 17, 2008, issue of the Federal Register (73 FR 3316). Public meeting..., prevent, mitigate, and respond to Transportation Security Incidents (TSIs) and other disasters. If the... disaster. Each Facility Security Assessment (FSA) must contain provisions for contingency...

  6. Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing

    NASA Astrophysics Data System (ADS)

    Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo

    2016-08-01

    Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.

  7. 75 FR 39090 - Airport Privatization Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-07

    ... procedures to be used in applications for exemption under the Airport Privatization Pilot Program (62 FR... Federal Aviation Administration Airport Privatization Pilot Program AGENCY: Federal Aviation... Gwinnett County Airport Briscoe Field (LZU), Lawrenceville, Georgia. SUMMARY: The Federal...

  8. 75 FR 68018 - Airport Privatization Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-04

    ... procedures to be used in applications for exemption under Airport Privatization Pilot Program (62 FR 48693... Federal Aviation Administration Airport Privatization Pilot Program AGENCY: Federal Aviation... Airglades Airport (2IS), Clewiston, Florida. SUMMARY: The Federal Aviation Administration (FAA)...

  9. New MagViz Airport Liquid Analysis System Undergoes Testing

    ScienceCinema

    None

    2016-07-12

    LOS ALAMOS, New Mexico, December 16, 2008—An innovative application of a technology first used for medical imaging may enhance airport security if Los Alamos National Laboratory scientists are successful. Los Alamos technologists have adapted Magnetic Res

  10. Airport testing an explosives detection portal

    SciTech Connect

    Rhykerd, C.; Linker, K.; Hannum, D.; Bouchier, F.; Parmeter, J.

    1998-08-01

    At the direction of the US Congress, following the Pan Am 103 and TWA 800 crashes, the Federal Aviation Administration funded development of non-invasive techniques to screen airline passengers for explosives. Such an explosives detection portal, developed at Sandia National Laboratories, was field tested at the Albuquerque International airport in September 1997. During the 2-week field trial, 2,400 passengers were screened and 500 surveyed. Throughput, reliability, maintenance and sensitivity were studied. Follow-up testing at Sandia and at Idaho National Engineering and Environmental Laboratory was conducted. A passenger stands in the portal for five seconds while overhead fans blow air over his body. Any explosive vapors or dislodged particles are collected in vents at the feet. Explosives are removed from the air in a preconcentrator and subsequently directed into an ion mobility spectrometer for detection. Throughput measured 300 passengers per hour. The non-invasive portal can detect subfingerprint levels of explosives residue on clothing. A survey of 500 passengers showed a 97% approval rating, with 99% stating that such portals, if effective, should be installed in airports to improve security. Results of the airport test, as well as operational issues, are discussed.

  11. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  12. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  13. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  14. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  15. 47 CFR 76.1204 - Availability of equipment performing conditional access or security functions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 4 2011-10-01 2011-10-01 false Availability of equipment performing... Availability of Navigation Devices § 76.1204 Availability of equipment performing conditional access or... perform conditional access functions shall make available equipment that incorporates only the...

  16. Airport Pricing Strategies

    NASA Technical Reports Server (NTRS)

    Pels, Eric; Verhoef, Erik T.

    2003-01-01

    Conventional economic wisdom suggests that congestion pricing would be an appropriate response to cope with the growing congestion levels currently experienced at many airports. Several characteristics of aviation markets, however, may make naive congestion prices equal to the value of marginal travel delays a non-optimal response. This paper has developed a model of airport pricing that captures a number of these features. The model in particular reflects that airlines typically have market power and are engaged in oligopolistic competition at different sub-markets; that part of external travel delays that aircraft impose are internal to an operator and hence should not be accounted for in congestion tolls. We presented an analytical treatment for a simple bi-nodal symmetric network, which through the use of 'hyper-networks' would be readily applicable to dynamic problems (in discrete time) such as peak - off-peak differences, and some numerical exercises for the same symmetric network, which was only designed to illustrate the possible comparative static impacts of tolling, in addition to marginal equilibrium conditions as could be derived for the general model specification. Some main conclusions are that second-best optimal tolls are typically lower than what would be suggested by congestion costs alone and may even be negative, and that the toll as derived by Brueckner (2002) may not lead to an increase in total welfare. While Brueckner (2002) has made clear that congestion tolls on airports may be smaller than expected when congestion costs among aircraft are internal for a firm, our analysis adds to this that a further downward adjustment may be in order due to market power. The presence of market power (which causes prices to exceed marginal costs) may cause the pure congestion toll to be suboptimal, because the resulting decrease in demand is too high (the pure congestion tall does not take into account the decrease in consumer surplus). The various

  17. Enabling mHealth while assuring compliance: reliable and secure information access in a mobile world.

    PubMed

    Wirth, Axel

    2012-01-01

    An increasingly mobile clinical workforce rapidly adopting consumer devices to access mobile, cloud-based applications, complemented by the wide range of mobile storage devices and other portable electronics, such as digital cameras, MP3 players, can make it difficult to efficiently assure compliance without impacting user productivity. This article reviewed a number of healthcare use cases and introduced comprehensive concepts and possible automated solutions to meet the requirements of a highly complex infrastructure of devices accessing confidential information.

  18. Race Differences in Mental Health Service Access in a Secure Male Juvenile Justice Facility

    ERIC Educational Resources Information Center

    Dalton, Richard F.; Evans, Lisa J.; Cruise, Keith R.; Feinstein, Ronald A.; Kendrick, Rhonda F.

    2009-01-01

    This study examined whether African American and Caucasian male youths had similar rates of referral to mental health services in a juvenile justice secure facility when controlling for differences obtained in the initial screening and assessment process. Data from the Massachusetts Youth Screening Instrument-2 (MAYSI-2), Initial Health Care…

  19. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... and toxins; security risk assessments. 121.10 Section 121.10 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE VIRUSES, SERUMS, TOXINS, AND ANALOGOUS PRODUCTS; ORGANISMS AND VECTORS POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS §...

  20. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... and toxins; security risk assessments. 121.10 Section 121.10 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE VIRUSES, SERUMS, TOXINS, AND ANALOGOUS PRODUCTS; ORGANISMS AND VECTORS POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS §...

  1. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... and toxins; security risk assessments. 121.10 Section 121.10 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE VIRUSES, SERUMS, TOXINS, AND ANALOGOUS PRODUCTS; ORGANISMS AND VECTORS POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS §...

  2. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... and toxins; security risk assessments. 121.10 Section 121.10 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE VIRUSES, SERUMS, TOXINS, AND ANALOGOUS PRODUCTS; ORGANISMS AND VECTORS POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS §...

  3. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... and toxins; security risk assessments. 121.10 Section 121.10 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE VIRUSES, SERUMS, TOXINS, AND ANALOGOUS PRODUCTS; ORGANISMS AND VECTORS POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS §...

  4. 75 FR 47891 - Notice of Intent to Rule on Request to Release Airport Property at the Dubois Regional Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-09

    ...-aeronautical airport property to Joseph and Rosemary Barber. Also, Joseph and Rosemary Barber desire to... Rosemary Barber. The ROW continues to be needed by Joseph and Rosemary Barber to access SR 830 from their property. Therefore, the Authority desires to convey their half of the former ROW to Joseph and...

  5. 77 FR 4394 - Release of Airport Property: Orlando Executive Airport, Orlando, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-27

    ... Federal Aviation Administration Release of Airport Property: Orlando Executive Airport, Orlando, FL AGENCY... provides notice of intent to release certain airport properties 12.4 acres at the Orlando Executive Airport... restrictions of a Quitclaim Deed agreement, dated August 9, 1961, between the subject airport and the...

  6. Prosthetic metal implants and airport metal detectors

    PubMed Central

    Dancey, A; Titley, OG

    2013-01-01

    Introduction Metal detectors have been present in airports and points of departure for some time. With the introduction of heightened security measures in response to fears of an increased threat of terrorism, they may become more prevalent in other public locations. The aim of this study was to ascertain which prosthetic devices activated metal detector devices used for security purposes. Methods A range of prosthetic devices used commonly in orthopaedic and plastic surgery procedures were passed through an arch metal detector at Birmingham Airport in the UK. Additionally, each item was passed under a wand detector. Items tested included expandable breast prostheses, plates used in wrist and hand surgery, screws, K-wires, Autosuture™ ligation clips and staples. Results No prostheses were detected by the arch detector. The expandable implants and wrist plates were the only devices detected by passing the wand directly over them. No device was detected by the wand when it was under cover of the axillary soft tissue. Screws, K-wires, Autosuture™ clips and staples were not detected under any of the study conditions. Conclusions Although unlikely to trigger a detector, it is possible that an expandable breast prosthesis or larger plate may do so. It is therefore best to warn patients of this so they can anticipate detection and further examination. PMID:23827294

  7. 19 CFR 122.84 - Intermediate airport.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Intermediate airport. 122.84 Section 122.84... Intermediate airport. (a) Application. The provisions of this section apply at any U.S. airport to which an... aircraft arrives at the next airport, the aircraft commander or agent shall make entry by filing the:...

  8. Airport Careers. Aviation Careers Series. Revised.

    ERIC Educational Resources Information Center

    Zaharevitz, Walter

    This booklet, one in a series on aviation careers, outlines the variety of careers available in airports. The first part of the booklet provides general information about careers at airports, while the main part of the booklet outlines the following nine job categories: airport director, assistant airport director, engineers, support personnel,…

  9. Methods for Determining Aircraft Surface State at Lesser-Equipped Airports

    NASA Technical Reports Server (NTRS)

    Roach, Keenan; Null, Jody

    2016-01-01

    Tactical departure scheduling within a terminal airspace must accommodate a wide spectrum of surveillance and communication capabilities at multiple airports. The success of such a scheduler is highly dependent upon the knowledge of a departure's state while it is still on the surface. Airports within a common Terminal RAdar CONtrol (TRACON) airspace possess varying levels of surface surveillance infrastructure which directly impacts uncertainties in wheels-off times. Large airports have access to surface surveillance data, which is shared with the TRACON, while lesser-equipped airports still rely solely on controllers in Air Traffic Control Towers (Towers). Coordination between TRACON and Towers can be greatly enhanced when the TRACON controller has access to the surface surveillance and the associated decision-support tools at well-equipped airports. Similar coordination at lesser-equipped airports is still based on verbal communications. This paper investigates possible methods to reduce the uncertainty in wheels-off time predictions at the lesser-equipped airports through the novel use of Over-the-Air (OTA) data transmissions. We also discuss the methods and equipment used to collect sample data at lesser-equipped airports within a large US TRACON, as well as the data evaluation to determine if meaningful information can be extracted from it.

  10. Wireless digital-ultrasonic sensors for proximity ID, access control, firearm control, and C3I in homeland security and law enforcement applications

    NASA Astrophysics Data System (ADS)

    Forcier, Bob

    2003-09-01

    This paper describes a new patent-pending digital-ultrasonic sensor network technology, which provides a "security protection sphere" around the authorized user(s) and the infrastructure system or system(s) to achieve C3I in Homeland Security and Law Enforcement Applications. If the system device, such as a firearm, a secure computer, PDA, or vehicle is misplaced, stolen or removed from the security protective sphere, an alarm is activated. A digital-ultrasonic sensor/tag utilizes the system"s physical structure to form a 2 to 20 Meter programmable protection sphere around the device and the authorized user. In addition, the system allows only authorized users to utilize the system, thereby creating personalized weapons, secure vehicle access or secure computer hardware. If an unauthorized individual accesses the system device, the system becomes inoperative and an alarm is activated. As the command and control, the authorized individual is provided a secure wristwatch/PDA. Access control is provided by "touch" and is controlled through the wristwatch/PDA/smartcard with a unique digital-ultrasonic coding and matching protocol that provides a very high level of security for each wireless sensor.

  11. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: a privacy-protecting remote access system for health-related research and evaluation.

    PubMed

    Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A

    2014-08-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community.

  12. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  13. Auctioning Airport Slots?

    NASA Technical Reports Server (NTRS)

    Gruyer, Nicolas; Lenoir, Nathalie

    2003-01-01

    The current allocation of slots on congested European airports constitutes an obstacle to the effective liberalisation of air transportation undertaken in Europe. With a view to favouring effluent slot utilisation and competition, as is the goal of the Euopean commission, we propose to use a market mechanism, based on temporary" utilisation licences. In order to allocate those licences, we propose and describe an iterated combinatorial auction mechanism where a percentage of licences would be reallocated each season. A secondary market would also be set up in order to reallocate slots during a season. Since a combinatorial auction involve a complex optimisation procedure, we describe how it can be made to work in the case of auctions.

  14. Access to Network Login by Three-Factor Authentication for Effective Information Security.

    PubMed

    Vaithyasubramanian, S; Christy, A; Saravanan, D

    2016-01-01

    Today's technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret key mapping validate if the logging user is the intended client. Secret key is assumed an indispensable part in security. The objective of MFA is to make a layered safeguard and make it more troublesome for an unauthenticated entity to get to an objective, for example, a physical area, processing gadget, system, or database. In the event that one element is bargained or broken, the assailant still has two more boundaries to rupture before effectively breaking into the objective. An endeavor has been made by utilizing three variable types of authentication. In this way managing additional secret key includes an additional layer of security.

  15. Investigation Into The Needs of Part 135 Operators to Access Airports Restricted Under FAR Part 135 Sections 135.213, 135.219 and/or 135.225

    NASA Technical Reports Server (NTRS)

    Eckert, Clifford A.; Stough, H. P. (Technical Monitor)

    2002-01-01

    NASA and the FAA have joint interests and responsibilities for developing guidelines and standards for cockpit displays of Flight Information Services (FIS) information and for developing enhancements to the planned FAA Data Link (FISDL) services. NASA and the FAA have established responsibilities in connection with development tasks for enhancements to the FISDL project. This report is the result of NASA Task 2, "Weather Support Concept- Part 135 Operations." The objective of the task was to determine the needs of Part 135 operators as they relate to FAA Part 135 Sections 135.213, 135.219 and 135.225, which pertain to weather reporting requirements at destination airports. This report discusses the results of two questionnaires completed by volunteer Part 135 operators that questioned their operations, their needs for flying to airports without weather reporting compatibilities, and suggestions for modifying FARs 135.213, 135.219 and 135.225. The operators pointed out airports in areas of the CONUS that were needed for IFR operations but lacked weather reporting capabilities and they offered practical suggestions for changes to the FARs. Related to operators's needs, and discussed in this report, were the Fractional Ownership NPRM and the possible impact of GPS WAAS and LAAS approaches.

  16. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... materials; 44 U.S.C. 2111, 44 U.S.C. 2201 et seq., and 36 CFR part 1270 for Presidential records; and 44 U.S.C. 2111 note and 36 CFR part 1275 for Nixon Presidential materials. ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false What controls access...

  17. 76 FR 30822 - Technical Amendment to List of User Fee Airports: Addition of Naples Municipal Airport, Naples, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-27

    ... Airports: Addition of Naples Municipal Airport, Naples, FL AGENCY: U.S. Customs and Border Protection... user fee airports to reflect the recent user fee airport designation for Naples Municipal Airport, in Naples, Florida. User fee airports are those airports which, while not qualifying for designation...

  18. 75 FR 57106 - Public Notice for Sale of Airport Property at Houlton International Airport, Houlton, ME

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-17

    ... Federal Aviation Administration Public Notice for Sale of Airport Property at Houlton International Airport, Houlton, ME AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Request for public... (.73 acres) of Airport property. The property was acquired from the United States Government...

  19. A secure web-based approach for accessing transitional health information for people with traumatic brain injury.

    PubMed

    Lemaire, E D; Deforge, D; Marshall, S; Curran, D

    2006-03-01

    A web-based transitional health record was created to provide regional healthcare professionals with ubiquitous access to information on people with brain injuries as they move through the healthcare system. Participants included public, private, and community healthcare organizations/providers in Eastern Ontario (Canada). One hundred and nineteen service providers and 39 brain injury survivors registered over 6 months. Fifty-eight percent received English and 42% received bilingual services (English-French). Public health providers contacted the regional service coordinator more than private providers (52% urban centres, 26% rural service providers, and 22% both areas). Thirty-five percent of contacts were for technical difficulties, 32% registration inquiries, 21% forms and processes, 6% resources, and 6% education. Seventeen technical enquiries required action by technical support personnel: 41% digital certificates, 29% web forms, and 12% log-in. This web-based approach to clinical information sharing provided access to relevant data as clients moved through or re-entered the health system. Improvements include automated digital certificate management, institutional health records system integration, and more referral tracking tools. More sensitive test data could be accessed on-line with increasing consumer/clinician confidence. In addition to a strong technical infrastructure, human resource issues are a major information security component and require continuing attention to ensure a viable on-line information environment.

  20. Airport surface operations requirements analysis

    NASA Technical Reports Server (NTRS)

    Groce, John L.; Vonbokern, Greg J.; Wray, Rick L.

    1993-01-01

    This report documents the results of the Airport Surface Operations Requirements Analysis (ASORA) study. This study was conducted in response to task 24 of NASA Contract NAS1-18027. This study is part of NASA LaRC's Low Visibility Surface Operations program, which is designed to eliminate the constraints on all-weather arrival/departure operations due to the airport/aircraft ground system. The goal of this program is to provide the capability for safe and efficient aircraft operations on the airport surface during low visibility conditions down to zero. The ASORA study objectives were to (1) develop requirements for operation on the airport surface in visibilities down to zero; (2) survey and evaluate likely technologies; (3) develop candidate concepts to meet the requirements; and (4) select the most suitable concept based on cost/benefit factors.

  1. Secure remote access to a clinical data repository using a wireless personal digital assistant (PDA).

    PubMed Central

    Duncan, R. G.; Shabot, M. M.

    2000-01-01

    TCP/IP and World-Wide-Web (WWW) technology have become the universal standards for networking and delivery of information. Personal digital assistants (PDAs), cellular telephones, and alphanumeric pagers are rapidly converging on a single pocket device that will leverage wireless TCP/IP networks and WWW protocols and can be used to deliver clinical information and alerts anytime, anywhere. We describe a wireless interface to clinical information for physicians based on Palm Corp.'s Palm VII pocket computer, a wireless digital network, encrypted data transmission, secure web servers, and a clinical data repository (CDR). PMID:11079875

  2. Access to Network Login by Three-Factor Authentication for Effective Information Security

    PubMed Central

    Vaithyasubramanian, S.; Christy, A.; Saravanan, D.

    2016-01-01

    Today's technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret key mapping validate if the logging user is the intended client. Secret key is assumed an indispensable part in security. The objective of MFA is to make a layered safeguard and make it more troublesome for an unauthenticated entity to get to an objective, for example, a physical area, processing gadget, system, or database. In the event that one element is bargained or broken, the assailant still has two more boundaries to rupture before effectively breaking into the objective. An endeavor has been made by utilizing three variable types of authentication. In this way managing additional secret key includes an additional layer of security. PMID:27006976

  3. Access to Network Login by Three-Factor Authentication for Effective Information Security.

    PubMed

    Vaithyasubramanian, S; Christy, A; Saravanan, D

    2016-01-01

    Today's technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret key mapping validate if the logging user is the intended client. Secret key is assumed an indispensable part in security. The objective of MFA is to make a layered safeguard and make it more troublesome for an unauthenticated entity to get to an objective, for example, a physical area, processing gadget, system, or database. In the event that one element is bargained or broken, the assailant still has two more boundaries to rupture before effectively breaking into the objective. An endeavor has been made by utilizing three variable types of authentication. In this way managing additional secret key includes an additional layer of security. PMID:27006976

  4. Automatic public access to documents and maps stored on and internal secure system.

    NASA Astrophysics Data System (ADS)

    Trench, James; Carter, Mary

    2013-04-01

    The Geological Survey of Ireland operates a Document Management System for providing documents and maps stored internally in high resolution and in a high level secure environment, to an external service where the documents are automatically presented in a lower resolution to members of the public. Security is devised through roles and Individual Users where role level and folder level can be set. The application is an electronic document/data management (EDM) system which has a Geographical Information System (GIS) component integrated to allow users to query an interactive map of Ireland for data that relates to a particular area of interest. The data stored in the database consists of Bedrock Field Sheets, Bedrock Notebooks, Bedrock Maps, Geophysical Surveys, Geotechnical Maps & Reports, Groundwater, GSI Publications, Marine, Mine Records, Mineral Localities, Open File, Quaternary and Unpublished Reports. The Konfig application Tool is both an internal and public facing application. It acts as a tool for high resolution data entry which are stored in a high resolution vault. The public facing application is a mirror of the internal application and differs only in that the application furnishes high resolution data into low resolution format which is stored in a low resolution vault thus, making the data web friendly to the end user for download.

  5. Wireless Channel Characterization in the Airport Surface Environment

    NASA Technical Reports Server (NTRS)

    Neville, Joshua T.

    2004-01-01

    Given the anticipated increase in air traffic in the coming years, modernization of the National Airspace System (NAS) is a necessity. Part of this modernization effort will include updating current communication, navigation, and surveillance (CNS) systems to deal with the increased traffic as well as developing advanced CNS technologies for the systems. An example of such technology is the integrated CNS (ICNS) network being developed by the Advanced CNS Architecture and Systems Technology (ACAST) group for use in the airport surface environment. The ICNS network would be used to convey voice/data between users in a secure and reliable manner. The current surface system only supports voice and does so through an obsolete physical infrastructure. The old system is vulnerable to outages and costly to maintain. The proposed ICNS network will include a wireless radio link. To ensure optimal performance, a thorough and accurate characterization of the channel across which the link would operate is necessary. The channel is the path the signal takes from the transmitter to the receiver and is prone to various forms of interference. Channel characterization involves a combination of analysis, simulation, and measurement. My work this summer was divided into four tasks. The first task required compiling and reviewing reference material that dealt with the characterization and modeling of aeronautical channels. The second task involved developing a systematic approach that could be used to group airports into classes, e.g. small airfields, medium airports, large open airports, large cluttered airports, etc. The third task consisted of implementing computer simulations of existing channel models. The fourth task entailed measuring possible interference sources in the airport surface environment via a spectrum analyzer.

  6. 19 CFR 122.13 - List of international airports.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., Vt.—Burlington International Airport Calexico, Calif.—Calexico International Airport Caribou, Maine—Caribou Municipal Airport Chicago, Ill.—Midway Airport Cleveland, Ohio—Cleveland Hopkins...

  7. 19 CFR 122.13 - List of international airports.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., Vt.—Burlington International Airport Calexico, Calif.—Calexico International Airport Caribou, Maine—Caribou Municipal Airport Chicago, Ill.—Midway Airport Cleveland, Ohio—Cleveland Hopkins...

  8. 19 CFR 122.13 - List of international airports.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., Vt.—Burlington International Airport Calexico, Calif.—Calexico International Airport Caribou, Maine—Caribou Municipal Airport Chicago, Ill.—Midway Airport Cleveland, Ohio—Cleveland Hopkins...

  9. 19 CFR 122.13 - List of international airports.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., Vt.—Burlington International Airport Calexico, Calif.—Calexico International Airport Caribou, Maine—Caribou Municipal Airport Chicago, Ill.—Midway Airport Cleveland, Ohio—Cleveland Hopkins...

  10. 19 CFR 122.13 - List of international airports.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ....—Detroit City Airport Detroit, Mich.—Detroit Metropolitan Wayne County Airport Douglas, Ariz.—Bisbee-Douglas International Airport Duluth, Minn.—Duluth International Airport Duluth, Minn.—Sky Harbor...

  11. Equity in access to health care provision under the medicare security for small scale entrepreneurs in Dar es Salaam.

    PubMed

    Urassa, J A E

    2012-03-01

    The main objective of this study was to assess equity in access to health care provision under the Medicare Security for Small Scale Entrepreneurs (SSE). Methodological triangulation was used to an exploratory and randomized cross- sectional study in order to supplement information on the topic under investigation. Questionnaires were administered to 281 respondents and 6 Focus Group Discussions (FGDs) were held with males and females. Documentary review was also used. For quantitative aspect of the study, significant associations were measured using confidence intervals (95% CI) testing. Qualitative data were analyzed with assistance of Open code software. The results show that inequalities in access to health care services were found in respect to affordability of medical care costs, distance from home to health facilities, availability of drugs as well as medical equipments and supplies. As the result of existing inequalities some of clients were not satisfied with the provided health services. The study concludes by drawing policy and research implications of the findings. PMID:23120940

  12. 77 FR 16891 - Notice of Intent To Rule on Request To Release Airport Property at Tulsa International Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-22

    ... International Airport, Tulsa, OK AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of Request... Agnew, Manager, Federal Aviation Administration, Southwest Region, Airports Division, AR/OK Airports..., Project Manager, Federal Aviation Administration, Southwest Region, Airports Division, AR/OK...

  13. 14 CFR 139.205 - Amendment of Airport Certification Manual.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Amendment of Airport Certification Manual... CERTIFICATION OF AIRPORTS Airport Certification Manual § 139.205 Amendment of Airport Certification Manual. (a) Under § 139.3, the Regional Airports Division Manager may amend any Airport Certification...

  14. 78 FR 22024 - Request To Release Airport Property at the Oakley Municipal Airport (OEL), Oakley, Kansas

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Aviation Administration Request To Release Airport Property at the Oakley Municipal Airport (OEL... proposes to rule and invites public comment on the release of land at the Oakley Municipal Airport (OEL... following address: Lynn D. Martin, Airports Compliance Specialist, Federal Aviation Administration,...

  15. 14 CFR 121.445 - Pilot in command airport qualification: Special areas and airports.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Pilot in command airport qualification: Special areas and airports. 121.445 Section 121.445 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION... Qualifications § 121.445 Pilot in command airport qualification: Special areas and airports. (a)...

  16. 76 FR 74843 - Release of Airport Property, Martin County Airport, Stuart, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-01

    ... advised that its release request is designed to clarify the airport property and to correct ambiguities in... Federal Aviation Administration Release of Airport Property, Martin County Airport, Stuart, FL AGENCY... properties, namely approximately 200 acres at the Martin County Airport, Stuart, FL, from the...

  17. The choice of disease control strategies to secure international market access for aquaculture products.

    PubMed

    Chinabut, S; Puttinaowarat, S

    2005-01-01

    Since production from capture fisheries cannot meet the demands of exports, aquaculture has subsequently played a major role in securing the raw materials for the world's food industries. Aquaculture has rapidly developed from extensive systems to semi-intensive, intensive and super-intensive systems. This has introduced the use of chemicals and drugs into the systems, which cause residual problems in the products. In the developed world, food safety has become a major issue of concern. The world market now demands healthy aquaculture products from farm to table. To achieve these requirements and to keep their markets, countries involved in aquaculture have implemented control measures such as farm licensing, code of conduct for sustainable aquaculture, hazard analysis and critical control point (HACCP) and good aquaculture practice. However, infectious diseases in aquaculture are of major concern to the industry and are typically controlled by eradication of the pathogen, treatment with antibiotic or chemotherapeutics, and/or by preventative measures such as the use of probiotics or vaccines. To limit the use of chemicals and antibiotics, good farm management is highly recommended. In terms of treatment, chemicals and antibiotics should be evaluated to establish recommended doses and withdrawal periods, otherwise alternative treatments should be developed. Environmentally-friendly probiotics have been introduced to aquaculture practice in the last decade to replace pathogenic bacteria with beneficial bacteria transient in the gut. Micro-organisms have also been prepared for the purpose of biocontrol and bioremediation. The application of probiotic, biocontrol and bioremediation seem promising; however considerable efforts of further research in terms of food and environmental safety are needed. Vaccination has proved highly effective in controlling diseases in the salmon industry mainly in Europe, America and Japan. In other Asian countries, this practice seem to

  18. Planning, Management, and Economics of Airport Operation

    NASA Technical Reports Server (NTRS)

    Wiley, J.

    1972-01-01

    An overview of the role of the airport in the transportation complex and in the community is presented. The establishment of the airport including its requirements in regional planning and the operation of the airport as a social and economic force are discussed.

  19. Teaching Ideas Notebook: Student Airport Tours

    ERIC Educational Resources Information Center

    Journal of Aerospace Education, 1977

    1977-01-01

    Outlines, as recommended by the Aviation Distributors and Manufacturers Association, a cooperative program between schools and local airports. The Student Airport Tours Program for class and career study groups includes a field trip to an airport, free rides, and follow-up activities. (CS)

  20. 19 CFR 122.85 - Final airport.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Final airport. 122.85 Section 122.85 Customs... AIR COMMERCE REGULATIONS Procedures for Residue Cargo and Stopover Passengers § 122.85 Final airport. When an aircraft enters at the last domestic airport of discharge, the traveling general...

  1. Examining Passenger Flow Choke Points at Airports Using Discrete Event Simulation

    NASA Technical Reports Server (NTRS)

    Brown, Jeremy R.; Madhavan, Poomima

    2011-01-01

    The movement of passengers through an airport quickly, safely, and efficiently is the main function of the various checkpoints (check-in, security. etc) found in airports. Human error combined with other breakdowns in the complex system of the airport can disrupt passenger flow through the airport leading to lengthy waiting times, missing luggage and missed flights. In this paper we present a model of passenger flow through an airport using discrete event simulation that will provide a closer look into the possible reasons for breakdowns and their implications for passenger flow. The simulation is based on data collected at Norfolk International Airport (ORF). The primary goal of this simulation is to present ways to optimize the work force to keep passenger flow smooth even during peak travel times and for emergency preparedness at ORF in case of adverse events. In this simulation we ran three different scenarios: real world, increased check-in stations, and multiple waiting lines. Increased check-in stations increased waiting time and instantaneous utilization. while the multiple waiting lines decreased both the waiting time and instantaneous utilization. This simulation was able to show how different changes affected the passenger flow through the airport.

  2. Poverty, food security and universal access to sexual and reproductive health services: a call for cross-movement advocacy against neoliberal globalisation.

    PubMed

    Sundari Ravindran, T K

    2014-05-01

    Universal access to sexual and reproductive health services is one of the goals of the International Conference on Population and Development of 1994. The Millennium Development Goals were intended above all to end poverty. Universal access to health and health services are among the goals being considered for the post-2015 agenda, replacing or augmenting the MDGs. Yet we are not only far from reaching any of these goals but also appear to have lost our way somewhere along the line. Poverty and lack of food security have, through their multiple linkages to health and access to health care, deterred progress towards universal access to health services, including for sexual and reproductive health needs. A more insidious influence is neoliberal globalisation. This paper describes neoliberal globalisation and the economic policies it has engendered, the ways in which it influences poverty and food security, and the often unequal impact it has had on women as compared to men. It explores the effects of neoliberal economic policies on health, health systems, and universal access to health care services, and the implications for access to sexual and reproductive health. To be an advocate for universal access to health and health care is to become an advocate against neoliberal globalisation. PMID:24908453

  3. Poverty, food security and universal access to sexual and reproductive health services: a call for cross-movement advocacy against neoliberal globalisation.

    PubMed

    Sundari Ravindran, T K

    2014-05-01

    Universal access to sexual and reproductive health services is one of the goals of the International Conference on Population and Development of 1994. The Millennium Development Goals were intended above all to end poverty. Universal access to health and health services are among the goals being considered for the post-2015 agenda, replacing or augmenting the MDGs. Yet we are not only far from reaching any of these goals but also appear to have lost our way somewhere along the line. Poverty and lack of food security have, through their multiple linkages to health and access to health care, deterred progress towards universal access to health services, including for sexual and reproductive health needs. A more insidious influence is neoliberal globalisation. This paper describes neoliberal globalisation and the economic policies it has engendered, the ways in which it influences poverty and food security, and the often unequal impact it has had on women as compared to men. It explores the effects of neoliberal economic policies on health, health systems, and universal access to health care services, and the implications for access to sexual and reproductive health. To be an advocate for universal access to health and health care is to become an advocate against neoliberal globalisation.

  4. Technology and politics: The regional airport experience

    NASA Technical Reports Server (NTRS)

    Starling, J. D.; Brown, J.; Gerhardt, J. M.; Dominus, M. I.

    1976-01-01

    The findings of a comparative study of the following six regional airports were presented: Dallas/Fort Worth, Kansas City, Washington, D.C., Montreal, Tampa, and St. Louis. Each case was approached as a unique historical entity, in order to investigate common elements such as: the use of predictive models in planning, the role of symbolism to heighten dramatic effects, the roles of community and professional elites, and design flexibility. Some of the factors considered were: site selection, consolidation of airline service, accessibility, land availability and cost, safety, nuisance, and pollution constraints, economic growth, expectation of regional growth, the demand forecasting conundrum, and design decisions. The hypotheses developed include the following: the effect of political, social, and economic conflicts, the stress on large capacity and dramatic, high-technology design, projections of rapid growth to explain the need for large capital outlays.

  5. Determination and Applications of Environmental Costs at Different Sized Airports: Aircraft Noise and Engine Emissions

    NASA Technical Reports Server (NTRS)

    Lu, Cherie; Lierens, Abigail

    2003-01-01

    With the increasing trend of charging for externalities and the aim of encouraging the sustainable development of the air transport industry, there is a need to evaluate the social costs of these undesirable side effects, mainly aircraft noise and engine emissions, for different airports. The aircraft noise and engine emissions social costs are calculated in monetary terms for five different airports, ranging from hub airports to small regional airports. The number of residences within different levels of airport noise contours and the aircraft noise classifications are the main determinants for accessing aircraft noise social costs. Whist, based on the damages of different engine pollutants on the human health, vegetation, materials, aquatic ecosystem and climate, the aircraft engine emissions social costs vary from engine types to aircraft categories. The results indicate that the relationship appears to be curvilinear between environmental costs and the traffic volume of an airport. The results and methodology of environmental cost calculation could input for to the proposed European wide harmonized noise charges as well as the social cost benefit analysis of airports.

  6. 14 CFR Appendix D to Part 91 - Airports/Locations: Special Operating Restrictions

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... (Miami International Airport) Minneapolis, MN (Minneapolis-St. Paul International Airport) Newark, NJ... International Airport) Minneapolis, MN (Minneapolis-St. Paul International Airport) Newark, NJ...

  7. 14 CFR Appendix D to Part 91 - Airports/Locations: Special Operating Restrictions

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... (Miami International Airport) Minneapolis, MN (Minneapolis-St. Paul International Airport) Newark, NJ... International Airport) Minneapolis, MN (Minneapolis-St. Paul International Airport) Newark, NJ...

  8. 14 CFR Appendix D to Part 91 - Airports/Locations: Special Operating Restrictions

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... (Miami International Airport) Minneapolis, MN (Minneapolis-St. Paul International Airport) Newark, NJ... International Airport) Minneapolis, MN (Minneapolis-St. Paul International Airport) Newark, NJ...

  9. [Airport related air pollution and health effects].

    PubMed

    Iavicoli, Ivo; Fontana, Luca; Ancona, Carla; Forastiere, Francesco

    2014-01-01

    Airport is an extremely complex emission source of airborne pollutants that can have a significant impact on the environment. Indeed, several airborne chemicals emitted during airport activities may significantly get worse air quality and increase exposure level of both airport workers and general population living nearby the airports. In recent years airport traffic has increased and consequently several studies investigated the association between airport-related air pollution and occurrence of adverse health effects, particularly on respiratory system, in exposed workers and general population resident nearby. In this context, we carried out a critical evaluation of the studies that investigated this correlation in order to obtain a deeper knowledge of this issue and to identify the future research needs. Results show that the evidence of association between airport-related air pollution and health effects on workers and residents is still limited. PMID:25115476

  10. [Airport related air pollution and health effects].

    PubMed

    Iavicoli, Ivo; Fontana, Luca; Ancona, Carla; Forastiere, Francesco

    2014-01-01

    Airport is an extremely complex emission source of airborne pollutants that can have a significant impact on the environment. Indeed, several airborne chemicals emitted during airport activities may significantly get worse air quality and increase exposure level of both airport workers and general population living nearby the airports. In recent years airport traffic has increased and consequently several studies investigated the association between airport-related air pollution and occurrence of adverse health effects, particularly on respiratory system, in exposed workers and general population resident nearby. In this context, we carried out a critical evaluation of the studies that investigated this correlation in order to obtain a deeper knowledge of this issue and to identify the future research needs. Results show that the evidence of association between airport-related air pollution and health effects on workers and residents is still limited.

  11. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    DOEpatents

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  12. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations...

  13. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations...

  14. Nuclear techniques for finding chemical explosives in airport luggage

    NASA Astrophysics Data System (ADS)

    Grodzins, Lee

    1991-05-01

    Chemical explosives are composed of concentrated densities of nitrogen and oxygen. High values of the nitrogen alert the presence of a bomb; high values of both nitrogen and oxygen densities certify the bomb's presence uniquely. More than a dozen nuclear-based techniques have been proposed for rapidly scanning airport luggage to find hidden explosives by measuring these elemental distributions. In almost every scheme, the technological challenge is the accelerator, which must be small, well-shielded, cost-effective, and be operable in busy airports by nominally-trained personnel, with minimum unscheduled downtime for repairs or service. This paper will summarize, within the limits imposed by security, four of the imaging schemes.

  15. Assessing coastal flood risk and sea level rise impacts at New York City area airports

    NASA Astrophysics Data System (ADS)

    Ohman, K. A.; Kimball, N.; Osler, M.; Eberbach, S.

    2014-12-01

    's understanding of the effects of sea level rise on coastal flooding at the airports and guiding decision-making in the selection of effective adaptation actions. Given the importance of these airports to transportation, this project is advancing security and continuity of national and international commerce well into the 21st century.

  16. 14 CFR 152.103 - Sponsors: Airport development.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Sponsors: Airport development. 152.103... (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Eligibility Requirements and Application Procedures § 152.103 Sponsors: Airport development. (a) To be eligible to apply for a project for airport development...

  17. 14 CFR 152.109 - Project eligibility: Airport planning.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Project eligibility: Airport planning. 152... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Eligibility Requirements and Application Procedures § 152.109 Project eligibility: Airport planning. (a) Airport master planning. A proposed project for...

  18. 14 CFR 152.325 - Financial status report: Airport planning.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Financial status report: Airport planning... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Accounting and Reporting Requirements § 152.325 Financial status report: Airport planning. Each sponsor of a project for airport master planning and each...

  19. LH2 airport requirements study

    NASA Technical Reports Server (NTRS)

    Brewer, G. D. (Editor)

    1976-01-01

    A preliminary assessment of the facilities and equipment which will be required at a representative airport is provided so liquid hydrogen LH2 can be used as fuel in long range transport aircraft in 1995-2000. A complete facility was conceptually designed, sized to meet the projected air traffic requirement. The facility includes the liquefaction plant, LH2, storage capability, and LH2 fuel handling system. The requirements for ground support and maintenance for the LH2 fueled aircraft were analyzed. An estimate was made of capital and operating costs which might be expected for the facility. Recommendations were made for design modifications to the reference aircraft, reflecting results of the analysis of airport fuel handling requirements, and for a program of additional technology development for air terminal related items.

  20. Integrating repositories with fuel cycles: The airport authority model

    SciTech Connect

    Forsberg, C.

    2012-07-01

    The organization of the fuel cycle is a legacy of World War II and the cold war. Fuel cycle facilities were developed and deployed without consideration of the waste management implications. This led to the fuel cycle model of a geological repository site with a single owner, a single function (disposal), and no other facilities on site. Recent studies indicate large economic, safety, repository performance, nonproliferation, and institutional incentives to collocate and integrate all back-end facilities. Site functions could include geological disposal of spent nuclear fuel (SNF) with the option for future retrievability, disposal of other wastes, reprocessing with fuel fabrication, radioisotope production, other facilities that generate significant radioactive wastes, SNF inspection (navy and commercial), and related services such as SNF safeguards equipment testing and training. This implies a site with multiple facilities with different owners sharing some facilities and using common facilities - the repository and SNF receiving. This requires a different repository site institutional structure. We propose development of repository site authorities modeled after airport authorities. Airport authorities manage airports with government-owned runways, collocated or shared public and private airline terminals, commercial and federal military facilities, aircraft maintenance bases, and related operations - all enabled and benefiting the high-value runway asset and access to it via taxi ways. With a repository site authority the high value asset is the repository. The SNF and HLW receiving and storage facilities (equivalent to the airport terminal) serve the repository, any future reprocessing plants, and others with needs for access to SNF and other wastes. Non-public special-built roadways and on-site rail lines (equivalent to taxi ways) connect facilities. Airport authorities are typically chartered by state governments and managed by commissions with members

  1. Teaching at Logan International Airport

    ERIC Educational Resources Information Center

    Schmidt, Steffen

    2005-01-01

    Although Terminal C at Logan airport does not look like a classroom, for about fifty minutes on this author's way back from Boston it was for him. Like many public spaces, Logan now has a very robust Wi-Fi wireless network and this enabled him to take advantage of a departure delay to "teach" his class. In 1970 when the author started teaching,…

  2. 77 FR 35104 - Notice of Request To Release Airport Property at Merrill Field Airport, Anchorage, AK

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-12

    ... purchased for inclusion into MRI utilizing FAA Airport Improvement (AIP) Funds. Said lands, described as a... impacts to the airport by allowing the disposal of the property. A categorical exclusion for this...

  3. 77 FR 26774 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... to homeland security. The Council is comprised of leaders of local law enforcement, first responders... the World'' and from the Transportation Security Administration on threats to airport security... designed to keep our country safe. Members will also be provided a briefing from the U.S. Coast Guard...

  4. Indoor air quality at nine large-hub airports with and without designated smoking areas--United States, October-November 2012.

    PubMed

    2012-11-23

    Secondhand smoke (SHS) exposure causes death and disease among nonsmoking adults and children. Adopting policies that completely prohibit smoking in all indoor areas is the only effective way to eliminate involuntary SHS exposure. Among the 29 large-hub U.S. airports, five currently allow smoking in specifically designated indoor areas accessible to the general public. In 2011, these five airports had a combined passenger boarding of approximately 110 million. To assess indoor air quality at the five large-hub U.S. airports with designated indoor smoking areas and compare it with the indoor air quality at four large-hub U.S. airports that prohibit smoking in all indoor areas, CDC measured the levels of respirable suspended particulates (RSPs), a marker for SHS. The results of this assessment determined that the average level of RSPs in the smoking-permitted areas of these five airports was 16 times the average level in nonsmoking areas (boarding gate seating sections) and 23 times the average level of RSPs in the smoke-free airports. The average RSP level in areas adjacent to the smoking-permitted areas was four times the average level in nonsmoking areas of the five airports with designated smoking areas and five times the average level in smoke-free airports. Smoke-free policies at the state, local, or airport authority levels can eliminate involuntary exposure to SHS inside airports and protect employees and travelers of all ages from SHS.

  5. 75 FR 5609 - Privacy Act of 1974; Department of Homeland Security/ALL-024 Facility and Perimeter Access...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-03

    ... DHS/ALL--024 Facility and Perimeter Access Control and Visitor Management System of Records (74 FR... Perimeter Access Control and Visitor Management System of Records AGENCY: Privacy Office; DHS. ACTION... Facility and Perimeter Access Control and Visitor Management System of Records to include record...

  6. 78 FR 63562 - Notice of Request To Release Airport Property at Charleston International Airport, Charleston...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-24

    ... of Airport Revenue, published in the Federal Register on February 16, 1999 (64 FR 7696). The Aviation... Federal Aviation Administration Notice of Request To Release Airport Property at Charleston International Airport, Charleston, South Carolina AGENCY: Federal Aviation Administration (FAA), DOT. ACTION:...

  7. 76 FR 54287 - Notice of Intent To Release Federally-Obligated Airport Properties, Tampa International Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-31

    ... Federal Aviation Administration Notice of Intent To Release Federally-Obligated Airport Properties, Tampa International Airport, Tampa, FL AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Request for public comment. SUMMARY: The FAA hereby provides notice of intent to release certain airport properties,...

  8. Airport-related air pollution and noise.

    PubMed

    Cohen, Beverly S; Bronzaft, Arline L; Heikkinen, Maire; Goodman, Jerome; Nádas, Arthur

    2008-02-01

    To provide quantitative evidence of the impact on people of a neighboring metropolitan airport, La Guardia Airport (LGA) in New York City, (1) airborne particulate matter (PM) was measured to determine whether concentration differences could be detected between homes that are upwind and downwind of the airport; (2) 24-hr noise measurements were made in 12 homes near the airport; and (3) the impact of noise was assessed by a Community Wellness and Health Promotion Survey. Particulate matter concentrations were higher during active airport operating hours than during nonoperating hours, and the percent increase varied inversely with distance from the airport. Hourly differences between paired upwind and downwind sites were not remarkable. Residents living near the airport were exposed to noise levels as much as four times greater than those experienced by residents in a quiet, comparison home. Impulse noise events were detected from both aircraft and vehicular traffic. More than 55% of the people living within the flight path were bothered by aircraft noise, and 63% by highway noise; these were significantly higher percentages than for residents in the nonflight area. The change in PM concentrations with distance during operating compared with nonoperating hours; traffic-related impulse noise events; and the elevated annoyance with highway noise, as well as aircraft noise among residents in the flight path area, show airport-related motor vehicle traffic to be a major contributor to the negative impact of airports on people in the surrounding communities.

  9. FAA Airport Design Competition for Universities

    NASA Technical Reports Server (NTRS)

    Sandy, Mary

    2008-01-01

    Raise awareness of the importance of airports to the National Airspace System infrastructure. Increase the involvement of the academic community in addressing airport operations and infrastructure issues and needs. Engage U.S. students in the conceptualization of applications, systems and equipment capable of addressing related challenges in a robust, reliable and comprehensive manner. Encourage U.S. undergraduate and graduate students to contribute innovative ideas and solutions to airport and runway safety issues. Provide the framework and incentives for quality educational experiences for university students. d Develop an awareness of and an interest in airports as a vital and interesting area for engineering and technology careers.

  10. Emergency Preparedness for Catastrophic Events at Small and Medium Sized Airports: Lacking or Not?

    NASA Technical Reports Server (NTRS)

    Sweet, Kathleen M.

    2007-01-01

    The implementation of security methods and processes in general has had a decisive impact on the aviation industry. However, efforts to effectively coordinate varied aspects of security protocols between agencies and general aviation components have not been adequately addressed. Whether or not overall security issues, especially with regard to planning for catastrophic terrorist events, have been neglected at the nation's smaller airports is the main topic of this paper. For perspective, the term general aviation is generally accepted to include all flying except for military and scheduled airline operations. Genera aviation makes up more than 1 percent of the U.S. Gross Domestic Product and supports almost 1.3 mission high-skilled jobs in professional services and manufacturing and hence is an important component of the aviation industry (AOPA, n.d.). In both conceptual and practical terms, this paper argues for the proactive management of security planning and repeated security awareness training from both an individual and an organizational perspective within the general aviation venue. The results of a research project incorporating survey data from general aviation and small commercial airport managers as well as Transportation Security Administration (TSA) employees are reported. Survey findings suggest that miscommunication does take place on different organizational levels and that between TSA employees and airport management interaction can be contentious and cooperation diminished. The importance of organizational training for decreasing conflict and increasing security and preparedness is discussed as a primary implication.

  11. 19 CFR 122.15 - User fee airports.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., see the List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume... Airport. Mesa, Arizona Williams Gateway Airport. Midland, Texas Midland International Airport....

  12. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Security and Emergency Preparedness (NSEP) B Appendix B to Part 64 Telecommunication FEDERAL COMMUNICATIONS... Preparedness (NSEP) 1. Authority This appendix is issued pursuant to sections 1, 4(i), 201 through 205 and 303...; (d) National Coordinating Center; (e) National Security Emergency Preparedness...

  13. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Security and Emergency Preparedness (NSEP) B Appendix B to Part 64 Telecommunication FEDERAL COMMUNICATIONS... Preparedness (NSEP) 1. Authority This appendix is issued pursuant to sections 1, 4(i), 201 through 205 and 303...; (d) National Coordinating Center; (e) National Security Emergency Preparedness...

  14. 19 CFR 122.153 - Limitations on airport of entry or departure.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... International Airport. Pittsburgh, Pennsylvania Pittsburgh International Airport. San Juan, Puerto Rico San Juan Luis Muñoz Marín International Airport. Tampa, Florida Tampa International Airport. West Palm Beach, Florida Palm Beach International Airport....

  15. Compilation of Disruptions to Airports by Volcanic Activity (Version 1.0, 1944-2006)

    USGS Publications Warehouse

    Guffanti, Marianne; Mayberry, Gari C.; Casadevall, Thomas J.; Wunderman, Richard

    2008-01-01

    Volcanic activity has caused significant hazards to numerous airports worldwide, with local to far-ranging effects on travelers and commerce. To more fully characterize the nature and scope of volcanic hazards to airports, we collected data on incidents of airports throughout the world that have been affected by volcanic activity, beginning in 1944 with the first documented instance of damage to modern aircraft and facilities in Naples, Italy, and extending through 2006. Information was gleaned from various sources, including news outlets, volcanological reports (particularly the Smithsonian Institution's Bulletin of the Global Volcanism Network), and previous publications on the topic. This report presents the full compilation of the data collected. For each incident, information about the affected airport and the volcanic source has been compiled as a record in a Microsoft Access database. The database is incomplete in so far as incidents may not have not been reported or documented, but it does present a good sample from diverse parts of the world. Not included are en-route diversions to avoid airborne ash clouds at cruise altitudes. The database has been converted to a Microsoft Excel spreadsheet. To make the PDF version of table 1 in this open-file report resemble the spreadsheet, order the PDF pages as 12, 17, 22; 13, 18, 23; 14, 19, 24; 15, 20, 25; and 16, 21, 26. Analysis of the database reveals that, at a minimum, 101 airports in 28 countries were impacted on 171 occasions from 1944 through 2006 by eruptions at 46 volcanoes. The number of affected airports (101) probably is better constrained than the number of incidents (171) because recurring disruptions at a given airport may have been lumped together or not reported by news agencies, whereas the initial disruption likely is noticed and reported and thus the airport correctly counted.

  16. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  17. 40 CFR 258.10 - Airport safety.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Airport safety. 258.10 Section 258.10 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES CRITERIA FOR MUNICIPAL SOLID WASTE LANDFILLS Location Restrictions § 258.10 Airport safety. (a) Owners or operators of...

  18. Airport Economics: Management Control Financial Reporting Systems

    NASA Technical Reports Server (NTRS)

    Buchbinder, A.

    1972-01-01

    The development of management control financial reporting systems for airport operation is discussed. The operation of the system to provide the reports required for determining the specific revenue producing facilities of airports is described. The organization of the cost reporting centers to show the types of information provided by the system is analyzed.

  19. 14 CFR 141.38 - Airports.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... has continuous use of each airport at which training flights originate. (b) Each airport used for airplanes and gliders must have at least one runway or takeoff area that allows training aircraft to make a... the powerplant operation, and landing gear and flap operation recommended by the manufacturer; and...

  20. 14 CFR 141.38 - Airports.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... has continuous use of each airport at which training flights originate. (b) Each airport used for airplanes and gliders must have at least one runway or takeoff area that allows training aircraft to make a... the powerplant operation, and landing gear and flap operation recommended by the manufacturer; and...

  1. 75 FR 39091 - Airport Privatization Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-07

    ... Program (62 FR 48693). A request for participation in the Pilot Program must be initiated by the filing of... Federal Aviation Administration Airport Privatization Pilot Program AGENCY: Federal Aviation... Mu oz Mar n International Airport (SJU), San Juan, Puerto Rico. SUMMARY: The Federal...

  2. 14 CFR 398.3 - Specific airports.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Specific airports. 398.3 Section 398.3... STATEMENTS GUIDELINES FOR INDIVIDUAL DETERMINATIONS OF BASIC ESSENTIAL AIR SERVICE § 398.3 Specific airports. (a) At an eligible place, essential air service may be specified as service to a particular...

  3. 77 FR 58208 - Airport Privatization Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-19

    ... will also participate. ADDRESSES: The meeting will be held at: Verdanza Hotel, 8020 Tartak Street, Isla... for sending your comments electronically. Docket Number: FAA 2009-1144. Mail: Docket Management... Compliance Specialist, Airport Compliance Division, ACO-100, Office of Airport Compliance and...

  4. 78 FR 7476 - Airport Improvement Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-01

    ... Program Handbook. SUMMARY: This notice announces the request for comments on the draft of FAA Order 5100-38D, Airport Improvement Program Handbook. When finalized, this Order will replace Order 5100-38C, Airport Improvement Program Handbook, issued on June 28, 2005. This update clarifies...

  5. Security during the Construction of New Nuclear Power Plants: Technical Basis for Access Authorization and Fitness-For-Duty Requirements

    SciTech Connect

    Branch, Kristi M.; Baker, Kathryn A.

    2009-09-01

    A technical letter report to the NRC summarizing the findings of a benchmarking study, literature review, and workshop with experts on current industry standards and expert judgments about needs for security during the construction phase of critical infrastructure facilities in the post-September 11 U.S. context, with a special focus on the construction phase of nuclear power plants and personnel security measures.

  6. Siting Solar Photovoltaics at Airports: Preprint

    SciTech Connect

    Kandt, A.; Romero, R.

    2014-06-01

    Airports present a significant opportunity for hosting solar technologies due to their open land; based on a 2010 Federal Aviation Administration study, the US Department of Agriculture, and the US Fish and Wildlife Service, there's potential for 116,704 MW of solar photovoltaics (PV) on idle lands at US airports. PV has a low profile and likely low to no impact on flight operations. This paper outlines guidance for implementing solar technologies at airports and airfields, focusing largely on the Federal Aviation Administration's policies. The paper also details best practices for siting solar at airports, provides information on the Solar Glare Hazard Analysis Tool, and highlights a case study example where solar has been installed at an airport.

  7. Airport noise impact reduction through operations

    NASA Technical Reports Server (NTRS)

    Deloach, R.

    1981-01-01

    The airport-noise levels and annoyance model (ALAMO) developed at NASA Langley Research Center is comprised of a system of computer programs which is capable of quantifying airport community noise impact in terms of noise level, population distribution, and human subjective response to noise. The ALAMO can be used to compare the noise impact of an airport's current operating scenario with the noise impact which would result from some proposed change in airport operations. The relative effectiveness of number of noise-impact reduction alternatives is assessed for a major midwest airport. Significant reductions in noise impact are predicted for certain noise abatement strategies while others are shown to result in relatively little noise relief.

  8. 78 FR 55657 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... receive expedited screening at participating U.S. airport security checkpoints.\\2\\ TSA Pre TM is one of... always will receive expedited screening at airport security checkpoints. The Program retains a component.... Individuals whom TSA determines are ineligible for the program will continue to be screened at...

  9. Airport cleanup rises above problems

    SciTech Connect

    Pressly, N.; Lucas, B.; Frumer, B.; Roth, R.

    1996-07-01

    Engineers used a treatment combination to improve the in-situ bioremediation system`s efficiency in removing underground fuel leaks at JFK Airport. John F. Kennedy International Airport, in New York City, on Jamaica Bay, has an above-ground storage capacity of about 32 million gallons of jet fuel, which flow through about 50 miles of high-pressure underground pipe to the central terminal area. EAch terminal`s fuel hydrant system was the major source os subsurface contamination at the site. The site is covered by 1 to 1.5 feet of reinforced concrete pavement. Liquid phase jet fuel (free product) was measured on the water table with true thickness ranging from less than 1 inch to 1 foot. After analysis of core samples, contamination was found adsorbed to the soil with maximum levels at the water table. This article describes the clean up, covering the following topics: microbial conditions during system operation; above-ground treatment challenges: free product emulsification, presence of biomass; evaluation of enhancements: dissolved air floatation, coagulation and flocculation, retention time adjustments; conclusions.

  10. 78 FR 54795 - Proposed Amendment of Class D Airspace; Dallas, Addison Airport, TX

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-06

    ... to air traffic flows in the Dallas-Fort Worth metropolitan area has made it necessary to lower the... 71 by amending Class D airspace at Addison Airport, Dallas, TX. Adjustments to air traffic flows in... accessed through the FAA's Web page at...

  11. Creating a clinical video-conferencing facility in a security-constrained environment using open-source AccessGrid software and consumer hardware.

    PubMed

    Terrazas, Enrique; Hamill, Timothy R; Wang, Ye; Channing Rodgers, R P

    2007-10-11

    The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components.

  12. Creating a Clinical Video-Conferencing Facility in a Security-Constrained Environment Using Open-Source AccessGrid Software and Consumer Hardware

    PubMed Central

    Terrazas, Enrique; Hamill, Timothy R.; Wang, Ye; Channing Rodgers, R. P.

    2007-01-01

    The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components. PMID:18693930

  13. Security for grids

    SciTech Connect

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  14. 14 CFR 152.325 - Financial status report: Airport planning.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Financial status report: Airport planning... agency conducting a project for airport system planning shall submit a financial status report on a form... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Accounting and Reporting Requirements § 152.325...

  15. 43 CFR 2651.6 - Airport and air navigation facilities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 2 2011-10-01 2011-10-01 false Airport and air navigation facilities... Village Selections § 2651.6 Airport and air navigation facilities. (a) Every airport and air navigation.... (b) The surface of all other lands of existing airport sites, airway beacons, or other...

  16. 43 CFR 2651.6 - Airport and air navigation facilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 43 Public Lands: Interior 2 2014-10-01 2014-10-01 false Airport and air navigation facilities... Village Selections § 2651.6 Airport and air navigation facilities. (a) Every airport and air navigation.... (b) The surface of all other lands of existing airport sites, airway beacons, or other...

  17. 43 CFR 2651.6 - Airport and air navigation facilities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 43 Public Lands: Interior 2 2013-10-01 2013-10-01 false Airport and air navigation facilities... Village Selections § 2651.6 Airport and air navigation facilities. (a) Every airport and air navigation.... (b) The surface of all other lands of existing airport sites, airway beacons, or other...

  18. 43 CFR 2651.6 - Airport and air navigation facilities.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 43 Public Lands: Interior 2 2012-10-01 2012-10-01 false Airport and air navigation facilities... Village Selections § 2651.6 Airport and air navigation facilities. (a) Every airport and air navigation.... (b) The surface of all other lands of existing airport sites, airway beacons, or other...

  19. 78 FR 65417 - Notice of Request To Release Airport Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-31

    ... Regional Airport (EAR), Kearney, Nebraska. SUMMARY: The FAA proposes to rule and invites public comment on... request to release approximately 67.72 acres of airport property at the Kearney Regional Airport (EAR... property at the Kearney Regional Airport (EAR) submitted by the Sponsor meets the procedural...

  20. 14 CFR 93.123 - High density traffic airports.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false High density traffic airports. 93.123... (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES High Density Traffic Airports § 93.123 High density traffic airports. (a) Each of the following airports is designated as a...

  1. 14 CFR 93.123 - High density traffic airports.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 2 2011-01-01 2011-01-01 false High density traffic airports. 93.123... (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES High Density Traffic Airports § 93.123 High density traffic airports. (a) Each of the following airports is designated as a...

  2. 14 CFR 135.223 - IFR: Alternate airport requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false IFR: Alternate airport requirements. 135... VFR/IFR Operating Limitations and Weather Requirements § 135.223 IFR: Alternate airport requirements...) to— (1) Complete the flight to the first airport of intended landing; (2) Fly from that airport...

  3. 14 CFR 152.107 - Project eligibility: Airport development.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Project eligibility: Airport development... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Eligibility Requirements and Application Procedures § 152.107 Project eligibility: Airport development. (a) Except in the case of approved stage...

  4. 14 CFR 151.3 - National Airport Plan.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false National Airport Plan. 151.3 Section 151.3 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS FEDERAL AID TO AIRPORTS General Requirements § 151.3 National Airport Plan. (a) Under the Federal...

  5. 14 CFR 121.617 - Alternate airport for departure.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Alternate airport for departure. 121.617... Alternate airport for departure. (a) If the weather conditions at the airport of takeoff are below the landing minimums in the certificate holder's operations specifications for that airport, no person...

  6. 14 CFR 125.365 - Alternate airport for departure.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Alternate airport for departure. 125.365... § 125.365 Alternate airport for departure. (a) If the weather conditions at the airport of takeoff are below the landing minimums in the certificate holder's operations specifications for that airport,...

  7. 19 CFR 122.11 - Designation as international airport.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Designation as international airport. 122.11...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.11 Designation as international airport. (a) Procedure. International airports, as defined in § 122.1(e), will be designated after...

  8. 14 CFR 152.323 - Budget revision: Airport development.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Budget revision: Airport development. 152... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Accounting and Reporting Requirements § 152.323 Budget revision: Airport development. (a) If any performance review conducted by the sponsor discloses a need...

  9. 19 CFR 122.11 - Designation as international airport.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Designation as international airport. 122.11...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.11 Designation as international airport. (a) Procedure. International airports, as defined in § 122.1(e), will be designated after...

  10. 19 CFR 122.11 - Designation as international airport.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Designation as international airport. 122.11...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.11 Designation as international airport. (a) Procedure. International airports, as defined in § 122.1(e), will be designated after...

  11. 19 CFR 122.11 - Designation as international airport.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Designation as international airport. 122.11...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.11 Designation as international airport. (a) Procedure. International airports, as defined in § 122.1(e), will be designated after...

  12. 19 CFR 122.11 - Designation as international airport.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Designation as international airport. 122.11...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.11 Designation as international airport. (a) Procedure. International airports, as defined in § 122.1(e), will be designated after...

  13. 14 CFR 139.205 - Amendment of Airport Certification Manual.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... TRANSPORTATION (CONTINUED) AIR CARRIERS AND OPERATORS FOR COMPENSATION OR HIRE: CERTIFICATION AND OPERATIONS...) Under § 139.3, the Regional Airports Division Manager may amend any Airport Certification Manual... Airports Division Manager's own initiative, if the Regional Airports Division Manager determines...

  14. 14 CFR 121.625 - Alternate Airport weather minima.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Alternate Airport weather minima. 121.625... Alternate Airport weather minima. Except as provided in § 121.624 for ETOPS Alternate Airports, no person may list an airport as an alternate in the dispatch or flight release unless the appropriate...

  15. 14 CFR 125.369 - Alternate airport weather minimums.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Alternate airport weather minimums. 125.369... § 125.369 Alternate airport weather minimums. No person may list an airport as an alternate airport in the flight release unless the appropriate weather reports or forecasts, or any combination...

  16. 14 CFR 121.625 - Alternate Airport weather minima.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Alternate Airport weather minima. 121.625... Alternate Airport weather minima. Except as provided in § 121.624 for ETOPS Alternate Airports, no person may list an airport as an alternate in the dispatch or flight release unless the appropriate...

  17. 14 CFR 121.625 - Alternate Airport weather minima.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Alternate Airport weather minima. 121.625... Alternate Airport weather minima. Except as provided in § 121.624 for ETOPS Alternate Airports, no person may list an airport as an alternate in the dispatch or flight release unless the appropriate...

  18. 14 CFR 125.369 - Alternate airport weather minimums.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Alternate airport weather minimums. 125.369... § 125.369 Alternate airport weather minimums. No person may list an airport as an alternate airport in the flight release unless the appropriate weather reports or forecasts, or any combination...

  19. 14 CFR 125.369 - Alternate airport weather minimums.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Alternate airport weather minimums. 125.369... § 125.369 Alternate airport weather minimums. No person may list an airport as an alternate airport in the flight release unless the appropriate weather reports or forecasts, or any combination...

  20. 14 CFR 125.369 - Alternate airport weather minimums.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Alternate airport weather minimums. 125.369... § 125.369 Alternate airport weather minimums. No person may list an airport as an alternate airport in the flight release unless the appropriate weather reports or forecasts, or any combination...

  1. 14 CFR 121.625 - Alternate Airport weather minima.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Alternate Airport weather minima. 121.625... Alternate Airport weather minima. Except as provided in § 121.624 for ETOPS Alternate Airports, no person may list an airport as an alternate in the dispatch or flight release unless the appropriate...

  2. 14 CFR 125.369 - Alternate airport weather minimums.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Alternate airport weather minimums. 125.369... § 125.369 Alternate airport weather minimums. No person may list an airport as an alternate airport in the flight release unless the appropriate weather reports or forecasts, or any combination...

  3. 14 CFR 121.625 - Alternate Airport weather minima.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Alternate Airport weather minima. 121.625... Alternate Airport weather minima. Except as provided in § 121.624 for ETOPS Alternate Airports, no person may list an airport as an alternate in the dispatch or flight release unless the appropriate...

  4. 14 CFR 156.4 - Airport and project eligibility.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... (CONTINUED) AIRPORTS STATE BLOCK GRANT PILOT PROGRAM § 156.4 Airport and project eligibility. (a) A participating State shall use monies distributed pursuant to a State block grant agreement for airport... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Airport and project eligibility....

  5. 14 CFR 93.123 - High density traffic airports.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 2 2013-01-01 2013-01-01 false High density traffic airports. 93.123... (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES High Density Traffic Airports § 93.123 High density traffic airports. (a) Each of the following airports is designated as a...

  6. 14 CFR 93.123 - High density traffic airports.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 2 2014-01-01 2014-01-01 false High density traffic airports. 93.123... (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES High Density Traffic Airports § 93.123 High density traffic airports. (a) Each of the following airports is designated as a...

  7. 14 CFR 93.123 - High density traffic airports.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 2 2012-01-01 2012-01-01 false High density traffic airports. 93.123... (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES High Density Traffic Airports § 93.123 High density traffic airports. (a) Each of the following airports is designated as a...

  8. Airport full-body screening: what is the risk?

    PubMed

    Mehta, Pratik; Smith-Bindman, Rebecca

    2011-06-27

    In the past year, the Transportation Security Administration has deployed full-body scanners in airports across the United States in response to heightened security needs. Several groups have opposed the scans, citing privacy concerns and fear of the radiation emitted by the backscatter x-ray scanners, 1 of the 2 types of machines in use. The radiation doses emitted by the scans are extremely small; the scans deliver an amount of radiation equivalent to 3 to 9 minutes of the radiation received through normal daily living. Furthermore, since flying itself increases exposure to ionizing radiation, the scan will contribute less than 1% of the dose a flyer will receive from exposure to cosmic rays at elevated altitudes. The estimation of cancer risks associated with these scans is difficult, but using the only available models, the risk would be extremely small, even among frequent flyers. We conclude that there is no significant threat of radiation from the scans.

  9. Airport full-body screening: what is the risk?

    PubMed

    Mehta, Pratik; Smith-Bindman, Rebecca

    2011-06-27

    In the past year, the Transportation Security Administration has deployed full-body scanners in airports across the United States in response to heightened security needs. Several groups have opposed the scans, citing privacy concerns and fear of the radiation emitted by the backscatter x-ray scanners, 1 of the 2 types of machines in use. The radiation doses emitted by the scans are extremely small; the scans deliver an amount of radiation equivalent to 3 to 9 minutes of the radiation received through normal daily living. Furthermore, since flying itself increases exposure to ionizing radiation, the scan will contribute less than 1% of the dose a flyer will receive from exposure to cosmic rays at elevated altitudes. The estimation of cancer risks associated with these scans is difficult, but using the only available models, the risk would be extremely small, even among frequent flyers. We conclude that there is no significant threat of radiation from the scans. PMID:21444831

  10. Collision Avoidance for Airport Traffic Simulation Evaluation

    NASA Technical Reports Server (NTRS)

    Jones, Denise R.; Prinzel, Lawrence J., III; Shelton, Kevin J.; Bailey, Randall E.; Otero, Sharon D.; Barker, Glover D.

    2010-01-01

    A Collision Avoidance for Airport Traffic (CAAT) concept for the airport Terminal Maneuvering Area (TMA) was evaluated in a simulation study at the National Aeronautics and Space Administration (NASA) Langley Research Center. CAAT is being designed to enhance surface situation awareness and provide cockpit alerts of potential conflicts during runway, taxi, and low altitude air-to-air operations. The purpose of the study was to evaluate pilot reaction to conflict events in the TMA near the airport, different alert timings for various scenarios, alerting display concepts, and directive alerting concepts. This paper gives an overview of the conflict detection and resolution (CD&R) concept, simulation study, and test results

  11. Concentration of Airline Operations at Individual Airports

    NASA Technical Reports Server (NTRS)

    Gelerman, W.; Deneufville, R.

    1972-01-01

    It is shown that it is a natural property of air transportation networks for competitive airlines to concentrate their operations at individual airports serving a given market. This implies that a strategy of developing satellite airports is doomed to failure unless the competitives behavior of the airlines is restricted. The results are demonstrated by tracing out the implications of observed patterns of traveller behavior as regards choice of carrier on the optimal game strategy for any particular airline. Analytic results for a two airline, two airport situation are extrapolated to the more general case, and specific supportive evidence from current operations are cited.

  12. Surface Operations Systems Improve Airport Efficiency

    NASA Technical Reports Server (NTRS)

    2009-01-01

    With Small Business Innovation Research (SBIR) contracts from Ames Research Center, Mosaic ATM of Leesburg, Virginia created software to analyze surface operations at airports. Surface surveillance systems, which report locations every second for thousands of air and ground vehicles, generate massive amounts of data, making gathering and analyzing this information difficult. Mosaic?s Surface Operations Data Analysis and Adaptation (SODAA) tool is an off-line support tool that can analyze how well the airport surface operation is working and can help redesign procedures to improve operations. SODAA helps researchers pinpoint trends and correlations in vast amounts of recorded airport operations data.

  13. 77 FR 59035 - Notice of Intent To Rule on Request To Release Airport Property at the St. George Airport, St...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-25

    ... TRANSPORTATION Federal Aviation Administration Notice of Intent To Rule on Request To Release Airport Property at the St. George Airport, St. George, UT AGENCY: Federal Aviation Administration (FAA), DOT. ACTION... Administration, Northwest Mountain Region, Airports Division, Denver Airports District Office, 26805 E....

  14. 19 CFR 122.153 - Limitations on airport of entry or departure.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., the Miami International Airport, Miami, Florida; the John F. Kennedy International Airport, Jamaica... York John F. Kennedy International Airport Los Angeles, California Los Angeles International...

  15. 19 CFR 122.153 - Limitations on airport of entry or departure.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., the Miami International Airport, Miami, Florida; the John F. Kennedy International Airport, Jamaica... York John F. Kennedy International Airport Los Angeles, California Los Angeles International...

  16. 14 CFR 135.229 - Airport requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... use any airport unless it is adequate for the proposed operation, considering such items as size... to be used for takeoff or landing is marked by flare pots or lanterns, their use must be approved...

  17. 14 CFR 135.229 - Airport requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... use any airport unless it is adequate for the proposed operation, considering such items as size... to be used for takeoff or landing is marked by flare pots or lanterns, their use must be approved...

  18. 14 CFR 135.229 - Airport requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... use any airport unless it is adequate for the proposed operation, considering such items as size... to be used for takeoff or landing is marked by flare pots or lanterns, their use must be approved...

  19. 14 CFR 135.229 - Airport requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... use any airport unless it is adequate for the proposed operation, considering such items as size... to be used for takeoff or landing is marked by flare pots or lanterns, their use must be approved...

  20. 14 CFR 135.229 - Airport requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... use any airport unless it is adequate for the proposed operation, considering such items as size... to be used for takeoff or landing is marked by flare pots or lanterns, their use must be approved...

  1. 14 CFR 141.38 - Airports.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... the end of each runway at ground level; (d) Each airport must have a traffic direction indicator when... seaplanes is permitted to use adequate nonpermanent lighting or shoreline lighting, if approved by...

  2. 14 CFR 141.38 - Airports.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the end of each runway at ground level; (d) Each airport must have a traffic direction indicator when... seaplanes is permitted to use adequate nonpermanent lighting or shoreline lighting, if approved by...

  3. Pilot preference and procedures at uncontrolled airports

    NASA Technical Reports Server (NTRS)

    Parker, L. C.

    1975-01-01

    The report presents the results of a pilot questionnaire utilized at the 1974 Reading, Pennsylvania Air Show to obtain data on pilot procedures and preference in the terminal airspace of uncontrolled airports.

  4. Public health impact of large airports.

    PubMed

    Passchier, W; Knottnerus, A; Albering, H; Walda, I

    2000-01-01

    Large airports with the related infrastructure, businesses and industrial activities affect the health of the population living, travelling and working in the surroundings of or at the airport. The employment and contributions to economy from the airport and related operations are expected to have a beneficial effect, which, however, is difficult to quantify. More pertinent data are available on the, largely negative, health effects of environmental factors, such as air and soil pollution, noise, accident risk, and landscape changes. Information on the concurrent and cumulative impact of these factors is lacking, but is of primary relevance for public health policy. A committee of the Health Council of The Netherlands recently reviewed the data on the health impact of large airports. It was concluded that, generally, integrated health assessments are not available. Such assessments, as part of sustainable mobility policy, should accompany the further development of the global aviation system.

  5. Aircraft and airport noise control prospective outlook

    SciTech Connect

    Shapiro, N.

    1982-01-01

    In a perspective look at aircraft and airport noise control over the past ten years or more - or more is added here because the Federal Aviation Regulation Part 36 of 1969 is a more significant milestone for the air transportation system than is the Noise Control Act of 1972 - we see an appreciable reduction in the noise emitted by newly designed and newly produced airplanes, particularly those powered by the new high bypass engines, but only, at best, a moderate alleviation of airport noise. The change in airport noise exposure was the consequence of the introduction of some new, quieter airplanes into the airlines fleets and some operational modifications or restrictions at the airports.

  6. How to manage secure direct access of European patients to their computerized medical record and personal medical record.

    PubMed

    Quantin, Catherine; Allaert, François André; Fassa, Maniane; Riandey, Benoît; Avillach, Paul; Cohen, Olivier

    2007-01-01

    The multiplication of the requests of the patients for a direct access to their Medical Record (MR), the development of Personal Medical Record (PMR) supervised by the patients themselves, the increasing development of the patients' electronic medical records (EMRs) and the world wide internet utilization will lead to envisage an access by using technical automatic and scientific way. It will require the addition of different conditions: a unique patient identifier which could base on a familial component in order to get access to the right record anywhere in Europe, very strict identity checks using cryptographic techniques such as those for the electronic signature, which will ensure the authentication of the requests sender and the integrity of the file but also the protection of the confidentiality and the access follow up. The electronic medical record must also be electronically signed by the practitioner in order to get evidence that he has given his agreement and taken the liability for that. This electronic signature also avoids any kind of post-transmission falsification. This will become extremely important, especially in France where patients will have the possibility to mask information that, they do not want to appear in their personal medical record. Currently, the idea of every citizen having electronic signatures available appears positively Utopian. But this is yet the case in eGovernment, eHealth and eShopping, world-wide. The same was thought about smart cards before they became generally available and useful when banks issued them.

  7. The Joint Airport Weather Studies (JAWS) project

    NASA Technical Reports Server (NTRS)

    Mccarthy, J.; Wilson, J.; Fujita, T. T.

    1983-01-01

    A block diagram of the joint airport weather studies program is presented. Background leading to the development of the program is reviewed. Basic studies, aircraft performance, and detection and warning techniques used to develop fine scale structure of thunderstorm dynamics and kinematics in the vicinity of a major airport; effect of thunderstorm low level wind shear on aircraft performance; and development of real time testing of flow level wind shear detection and warning techniques and displays are described.

  8. Prediction of Weather Impacted Airport Capacity using Ensemble Learning

    NASA Technical Reports Server (NTRS)

    Wang, Yao Xun

    2011-01-01

    Ensemble learning with the Bagging Decision Tree (BDT) model was used to assess the impact of weather on airport capacities at selected high-demand airports in the United States. The ensemble bagging decision tree models were developed and validated using the Federal Aviation Administration (FAA) Aviation System Performance Metrics (ASPM) data and weather forecast at these airports. The study examines the performance of BDT, along with traditional single Support Vector Machines (SVM), for airport runway configuration selection and airport arrival rates (AAR) prediction during weather impacts. Testing of these models was accomplished using observed weather, weather forecast, and airport operation information at the chosen airports. The experimental results show that ensemble methods are more accurate than a single SVM classifier. The airport capacity ensemble method presented here can be used as a decision support model that supports air traffic flow management to meet the weather impacted airport capacity in order to reduce costs and increase safety.

  9. Airport Noise Tech Challenge Overview

    NASA Technical Reports Server (NTRS)

    Bridges, James

    2011-01-01

    The Supersonics Project, operating under NASA Aeronautics Mission Directorate#s Fundamental Aero Program, has been organized around the Technical Challenges that have historically precluded commercial supersonic flight. One of these Challenges is making aircraft that are capable of such high aerodynamic performance quiet enough around airports that they will not be objectionable. It is recognized that a successful civilian supersonic aircraft will be a system where many new technologies will come together, and for this to happen not only will new low noise propulsion concepts be required, but new engineering tools that predict the noise of the aircraft as these technologies are combined and compromised with the rest of the aircraft design. These are the two main objectives of the Airport Noise Tech Challenge. " ! As a Project in the Fundamental Aero Program, we work at a relatively low level of technology readiness. However, we have high level milestones which force us to integrate our efforts to impact systems-level activities. To keep the low-level work tied to delivering engineering tools and low-noise concepts, we have structured our milestones around development of the concepts and organized our activities around developing and applying our engineering tools to these concepts. The final deliverables in these milestones are noise prediction modules validated against the best embodiment of each concept. These will then be used in cross-disciplinary exercises to demonstrate the viability of aircraft designs to meet all the Technical Challenges. Some of the concepts being developed are shown: Fan Flow Diverters, Multi-jet Shielding, High-Aspect Ratio Embedded Nozzles, Plasma Actuated Instability Manipulation, Highly Variable Cycle Mixer- Ejectors, and Inverted Velocity Profiles. These concepts are being developed for reduced jet noise along with the design tools which describe how they perform when used in various aircraft configurations. Several key upcoming

  10. 77 FR 3031 - Release of Airport Property: Tampa International Airport, Tampa, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-20

    ...The FAA hereby provides notice of intent to release certain airport properties, approximately 3.407 acres, at the Tampa International Airport, Tampa, FL from the conditions, reservations, and restrictions as contained in federal grant assurances. The release of property will allow the Hillsborough County Aviation Authority to dispose of the property for other than aeronautical purposes. The......

  11. 75 FR 57829 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-22

    ... Register on September 9, 2010 (75 FR 54946). DATES: Effective September 22, 2010. FOR FURTHER INFORMATION... Administration published a Notice of Proposed Policy in the Federal Register at 75 FR 54946 proposing to amend.... Correction In the Notice published on September 9, 2010 (75 FR 54946) FR Doc. 2010-22095, on page 54947...

  12. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Contingency Measures § 1542.303 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify airport operators of security concerns. When TSA determines that additional... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information...

  13. The airnoise boundary concept for airport noise management

    NASA Astrophysics Data System (ADS)

    Dickinson, Philip J.

    Attention is given to the draft New Zealand Standard on Airport Noise, which tells airport users exactly how much noise exposure they may make over any residential area; only in a fixed airport control zone, enclosed by the 'airnoise boundary', may they make more noise than this amount. The airnoise boundary concept for airport noise management is argued to be feasible and applicable to any airport irrespective of size. Use of the concept may greatly ease the related health problems around many busy airports, and still allow for necessary growth.

  14. Investigation of the 1987 Indianapolis Airport Ramada Inn incident.

    PubMed

    Clark, M A; Hawley, D A; McClain, J L; Pless, J E; Marlin, D C; Standish, S M

    1994-05-01

    On October 20, 1987, a military reserve aircraft lost power during a transcontinental flight and attempted an emergency landing at The Indianapolis International Airport. The pilot ejected and the disabled and pilotless aircraft struck a bank building. It then skidded across the street and entered the lobby of The Airport Ramada Inn where it exploded. This incident was unusual in that the fatal injuries occurred in individuals on the ground and not in the occupant of the aircraft. Seven people were killed in the lobby area and two were trapped in a laundry where they died of smoke inhalation. A tenth person died of burns ten days later. Minor injuries were reported among four hotel guests, two firefighters and the Air Force pilot. A multiagency mass disaster-plan had been formulated and rehearsed in preparation for the Panamerican Games, which had been held in Indianapolis in August 1987. A number of volunteers arrived before a security perimeter was established. They began an undocumented removal of the bodies from the scene and were about to remove valuables for "safekeeping" when stopped by coroners' office personnel. Fatalities resulted from smoke inhalation, burns or a combination. Bodies were identified by a combination of dental records, personal effects and visual means within 24 hours. The problems encountered in managing this disaster scene will also be compared with previously reported incidents. PMID:8006612

  15. 75 FR 78262 - Intent To Request Approval From OMB of One New Public Collection of Information: Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-15

    ...The Transportation Security Administration (TSA) invites public comment on a new Information Collection Request (ICR) (abstracted below) that we will submit to the Office of Management and Budget (OMB) for approval in compliance with the Paperwork Reduction Act (PRA). The ICR describes the nature of the information collection and its expected burden. The collection involves the airport......

  16. Occupational Exposure to Ultrafine Particles among Airport Employees - Combining Personal Monitoring and Global Positioning System

    PubMed Central

    Møller, Karina Lauenborg; Thygesen, Lau Caspar; Schipperijn, Jasper; Loft, Steffen; Bonde, Jens Peter; Mikkelsen, Sigurd; Brauer, Charlotte

    2014-01-01

    Background Exposure to ultrafine particles (UFP) has been linked to cardiovascular and lung diseases. Combustion of jet fuel and diesel powered handling equipment emit UFP resulting in potentially high exposure levels among employees working at airports. High levels of UFP have been reported at several airports, especially on the apron, but knowledge on individual exposure profiles among different occupational groups working at an airport is lacking. Purpose The aim of this study was to compare personal exposure to UFP among five different occupational groups working at Copenhagen Airport (CPH). Method 30 employees from five different occupational groups (baggage handlers, catering drivers, cleaning staff and airside and landside security) at CPH were instructed to wear a personal monitor of particle number concentration in real time and a GPS device. The measurements were carried out on 8 days distributed over two weeks in October 2012. The overall differences between the groups were assessed using linear mixed model. Results Data showed significant differences in exposure levels among the groups when adjusted for variation within individuals and for effect of time and date (p<0.01). Baggage handlers were exposed to 7 times higher average concentrations (geometric mean, GM: 37×103 UFP/cm3, 95% CI: 25–55×103 UFP/cm3) than employees mainly working indoors (GM: 5×103 UFP/cm3, 95% CI: 2–11×103 UFP/cm3). Furthermore, catering drivers, cleaning staff and airside security were exposed to intermediate concentrations (GM: 12 to 20×103 UFP/cm3). Conclusion The study demonstrates a strong gradient of exposure to UFP in ambient air across occupational groups of airport employees. PMID:25203510

  17. Secure portal.

    SciTech Connect

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal

  18. ICAO's anti-SARS airport activities.

    PubMed

    Finkelstein, Silvio; Curdt-Christiansen, Claus M

    2003-11-01

    To prevent SARS from spreading through air travel and in order to rebuild the confidence of the traveling public in the safety of air travel, ICAO has set up an "Anti-SARS Airport Evaluation Project." The first phase of this project was to develop a set of protective measures for international airports in affected areas to adopt and implement and then to send out, on the request of Contracting States, a team of inspectors to evaluate and assess airports and issue a "statement of evaluation" that the airport inspected complies with the ICAO anti-SARS protective measures. In cooperation with the World Health Organization (WHO), the first part of phase 1 was completed in early June this year, and the second part of phase 1 followed soon after. By mid-July, five international airports in Southeast Asia had been inspected and found to be in full compliance with the ICAO anti-SARS protective measures. The success of this ICAO project is believed to have contributed significantly to the recovery of international air travel and related industries now taking place. Phase 2 of the project is now being developed. It is aimed at preventing a resurgence of SARS, but it also contains elements to make the methodology developed applicable to future outbreaks of any other communicable disease in which the mode of transmission could involve aviation and/or the need to prevent the spread of the disease by air travel.

  19. Northern New Mexico regional airport market feasibility

    SciTech Connect

    Drake, R.H.; Williams, D.S.

    1998-06-01

    This report is about the market for airline travel in northern New Mexico. Interest in developing a northern New Mexico regional airport has periodically surfaced for a number of years. The New Mexico State Legislature passed a memorial during the 1998 Second Session calling for the conduct of a study to determine the feasibility of building a new regional airport in NNM. This report is a study of the passenger market feasibility of such an airport. In addition to commercial passenger market feasibility, there are other feasibility issues dealing with siting, environmental impact, noise, economic impact, intermodal transportation integration, region-wide transportation services, airport engineering requirements, and others. These other feasibility issues are not analyzed in any depth in this report although none were discovered to be show-stoppers as a by-product of the authors doing research on the passenger market itself. Preceding the need for a detailed study of these other issues is the determination of the basic market need for an airport with regular commercial airline service in the first place. This report is restricted to an in-depth look at the market for commercial passenger air service in NNM. 20 figs., 8 tabs.

  20. Yeager Airport Hydrogen Vehicle Test Project

    SciTech Connect

    Davis, Williams

    2015-10-01

    The scope of this project was changed during the course of the project. Phase I of the project was designed to have the National Alternative Fuels Training Consortium (NAFTC), together with its partners, manage the Hydrogen Vehicle Test Project at the Yeager Airport in conjunction with the Central West Virginia Regional Airport Authority (CWVRAA) in coordination with the United States Department of Energy National Energy Technology Laboratory (U.S. DOE NETL). This program would allow testing and evaluation of the use of hydrogen vehicles in the state of West Virginia utilizing the hydrogen fueling station at Yeager Airport. The NAFTC and CWVRAA to raise awareness and foster a greater understanding of hydrogen fuel and hydrogen-powered vehicles through a targeted utilization and outreach and education effort. After initial implementation of the project, the project added, determine the source(s) of supply for hydrogen powered vehicles that could be used for the testing. After completion of this, testing was begun at Yeager Airport. During the course of the project, the station at Yeager Airport was closed and moved to Morgantown and the West Virginia University Research Corporation. The vehicles were then moved to Morgantown and a vehicle owned by the CWVRAA was purchased to complete the project at the new location. Because of a number of issues detailed in the report for DE-FE0002994 and in this report, this project did not get to evaluate the effectiveness of the vehicles as planned.

  1. 19 CFR 122.15 - User fee airports.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., see the List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume... Centennial Airport. Fort Worth, Texas Fort Worth Alliance Airport. Fresno, California Fresno...

  2. 19 CFR 122.15 - User fee airports.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Federal Register citations affecting § 122.15, see the List of CFR Sections Affected, which appears in the...-Palomar Airport. Dallas, Texas Dallas Love Field Municipal Airport Daytona Beach, Florida Daytona...

  3. 19 CFR 122.15 - User fee airports.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Register citations affecting § 122.15, see the List of CFR Sections Affected, which appears in the Finding... Love Field Municipal Airport Daytona Beach, Florida Daytona Beach International Airport....

  4. 19 CFR 122.15 - User fee airports.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Register citations affecting § 122.15, see the List of CFR Sections Affected, which appears in the Finding... Love Field Municipal Airport Daytona Beach, Florida Daytona Beach International Airport....

  5. Aerial overview of the Denver International Airport site, looking southwest ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Aerial overview of the Denver International Airport site, looking southwest - Denver International Airport Site, Between Fifty-sixth & 128th Avenues, Buckley Road & Box Elder Creek, Denver, Denver County, CO

  6. The Aviation System Analysis Capability Airport Capacity and Delay Models

    NASA Technical Reports Server (NTRS)

    Lee, David A.; Nelson, Caroline; Shapiro, Gerald

    1998-01-01

    The ASAC Airport Capacity Model and the ASAC Airport Delay Model support analyses of technologies addressing airport capacity. NASA's Aviation System Analysis Capability (ASAC) Airport Capacity Model estimates the capacity of an airport as a function of weather, Federal Aviation Administration (FAA) procedures, traffic characteristics, and the level of technology available. Airport capacity is presented as a Pareto frontier of arrivals per hour versus departures per hour. The ASAC Airport Delay Model allows the user to estimate the minutes of arrival delay for an airport, given its (weather dependent) capacity. Historical weather observations and demand patterns are provided by ASAC as inputs to the delay model. The ASAC economic models can translate a reduction in delay minutes into benefit dollars.

  7. 14 CFR 139.325 - Airport emergency plan.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... certificate holder must develop and maintain an airport emergency plan designed to minimize the possibility...) Coordination of airport and control tower functions relating to emergency actions, as appropriate. (e) The...

  8. Photocopy of aerial photograph taken in 1959, showing Newark Airport. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Photocopy of aerial photograph taken in 1959, showing Newark Airport. Photographer unknown. Original photograph property of Continental Airlines, Houston, Texas - Newark International Airport, Between New Jersey Turnpike, U.S. Routes 1 & 9, & Interstate 78, Newark, Essex County, NJ

  9. 14 CFR 152.107 - Project eligibility: Airport development.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... airport that is safe, useful, and usable; or, (2) An additional facility that increases the safety... incorporated into this part by § 152.11; and (3) Be described in an approved airport layout plan. (d)...

  10. TRIZ Tool for Optimization of Airport Runway

    NASA Astrophysics Data System (ADS)

    Rao, K. Venkata; Selladurai, V.; Saravanan, R.

    TRIZ tool is used for conceptual design and layout of the novel ascending and descending runway model for the effective utilization of short length airports. Handling bigger aircrafts at smaller airports become the necessity for economic consideration and for the benefit of vast airliners and the aspiring air travelers of the region. The authors’ proposal of ascending and descending runway would enable the operational need of wide body aircrafts such as Boeing 747 and Airbus A380-800. Negotiating take-off and landing of bigger aircrafts at less than 10000 feet runway is an optimization solution. This conceptual model and the theoretical design with its layout is dealt in this paper as Part - I. The computer-aided design and analysis using MATLAB with Simulink tool box to confirm the adequacy of the runway length for the bigger aircrafts at smaller airports is however dealt in subsequent papers.

  11. The noise impact of proposed runway alternatives at Craig Airport

    NASA Technical Reports Server (NTRS)

    Deloach, R.

    1982-01-01

    Four proposed runway expansion alternatives at Craig Airport in Jacksonville, Florida have been assessed with respect to their forecasted noise impact in the year 2005. The assessment accounts for population distributions around the airport and human subjective response to noise, as well as the distribution of noise levels in the surrounding community (footprints). The impact analysis was performed using the Airport-noise Levels and Annoyance Model (ALAMO), an airport community response model recently developd at Langley Research Center.

  12. Integrated mobile radar-camera system in airport perimeter security

    NASA Astrophysics Data System (ADS)

    Zyczkowski, M.; Szustakowski, M.; Ciurapinski, W.; Dulski, R.; Kastek, M.; Trzaskawka, P.

    2011-11-01

    The paper presents the test results of a mobile system for the protection of large-area objects, which consists of a radar and thermal and visual cameras. Radar is used for early detection and localization of an intruder and the cameras with narrow field of view are used for identification and tracking of a moving object. The range evaluation of an integrated system are presented as well as the probability of human detection as a function of the distance from radar-camera unit.

  13. Secure Large-Scale Airport Simulations Using Distributed Computational Resources

    NASA Technical Reports Server (NTRS)

    McDermott, William J.; Maluf, David A.; Gawdiak, Yuri; Tran, Peter; Clancy, Dan (Technical Monitor)

    2001-01-01

    To fully conduct research that will support the far-term concepts, technologies and methods required to improve the safety of Air Transportation a simulation environment of the requisite degree of fidelity must first be in place. The Virtual National Airspace Simulation (VNAS) will provide the underlying infrastructure necessary for such a simulation system. Aerospace-specific knowledge management services such as intelligent data-integration middleware will support the management of information associated with this complex and critically important operational environment. This simulation environment, in conjunction with a distributed network of supercomputers, and high-speed network connections to aircraft, and to Federal Aviation Administration (FAA), airline and other data-sources will provide the capability to continuously monitor and measure operational performance against expected performance. The VNAS will also provide the tools to use this performance baseline to obtain a perspective of what is happening today and of the potential impact of proposed changes before they are introduced into the system.

  14. Airport baggage handling--where do human factors fit in the challenges that airports put on a baggage system?

    PubMed

    Lenior, O N M

    2012-01-01

    The challenges put on large baggage systems by airports can be summarized as: handling a high number of bags in a short period of time, in a limited space, with all sorts of disruptions, whilst complying with stringent regulation upon security, sustainability and health and safety. The aim of this company case study is to show in the different project phases--as indicated in the system ergonomic approach--how the human factors specialist can play a major part in tackling these challenges. By describing different projects in terms of scope, organization, human factors topics covered, phases and lessons learned, the importance of Human-Computer Interaction, automation as well as manual handling and work organization in baggage is addressed.

  15. 49 CFR 1560.105 - Denial of transport or sterile area access; designation for enhanced screening.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List... airport. (2) Transmission of Updated Secure Flight Passenger Data. Upon reviewing a passenger's verifying... for covered flights to or overflying the United States. Covered aircraft operators may permit...

  16. 49 CFR 1560.105 - Denial of transport or sterile area access; designation for enhanced screening.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List... airport. (2) Transmission of Updated Secure Flight Passenger Data. Upon reviewing a passenger's verifying... for covered flights to or overflying the United States. Covered aircraft operators may permit...

  17. 49 CFR 1560.105 - Denial of transport or sterile area access; designation for enhanced screening.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List... airport. (2) Transmission of Updated Secure Flight Passenger Data. Upon reviewing a passenger's verifying... for covered flights to or overflying the United States. Covered aircraft operators may permit...

  18. 49 CFR 1560.105 - Denial of transport or sterile area access; designation for enhanced screening.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List... airport. (2) Transmission of Updated Secure Flight Passenger Data. Upon reviewing a passenger's verifying... for covered flights to or overflying the United States. Covered aircraft operators may permit...

  19. 49 CFR 1560.105 - Denial of transport or sterile area access; designation for enhanced screening.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List... airport. (2) Transmission of Updated Secure Flight Passenger Data. Upon reviewing a passenger's verifying... for covered flights to or overflying the United States. Covered aircraft operators may permit...

  20. 14 CFR 152.103 - Sponsors: Airport development.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Sponsors: Airport development. 152.103 Section 152.103 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION... Sponsors: Airport development. (a) To be eligible to apply for a project for airport development...

  1. 14 CFR 139.203 - Contents of Airport Certification Manual.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Contents of Airport Certification Manual. 139.203 Section 139.203 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... succession of airport operational responsibility X X X X 2. Each current exemption issued to the airport...

  2. 14 CFR 139.203 - Contents of Airport Certification Manual.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Contents of Airport Certification Manual. 139.203 Section 139.203 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... succession of airport operational responsibility X X X X 2. Each current exemption issued to the airport...

  3. 14 CFR 139.203 - Contents of Airport Certification Manual.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Contents of Airport Certification Manual. 139.203 Section 139.203 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... succession of airport operational responsibility X X X X 2. Each current exemption issued to the airport...

  4. Airports, Hotel, and Ground Transportation Information | Division of Cancer Prevention

    Cancer.gov

    Airports in and near Washington, DC Reagan National Approximate 30 minute drive from Rockville* Has its own Metro stop on the blue and yellow lines in Virginia NOTE: This airport may be the closest and easiest option if not renting a car or do not want to pay for an airport cab/shuttle.   Dulles International Approximate 1 hour drive from Rockville* |

  5. 14 CFR 137.45 - Nonobservance of airport traffic pattern.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Nonobservance of airport traffic pattern... AGRICULTURAL AIRCRAFT OPERATIONS Operating Rules § 137.45 Nonobservance of airport traffic pattern. Notwithstanding part 91 of this chapter, the pilot in command of an aircraft may deviate from an airport...

  6. 14 CFR 137.45 - Nonobservance of airport traffic pattern.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Nonobservance of airport traffic pattern... AGRICULTURAL AIRCRAFT OPERATIONS Operating Rules § 137.45 Nonobservance of airport traffic pattern. Notwithstanding part 91 of this chapter, the pilot in command of an aircraft may deviate from an airport...

  7. 78 FR 44188 - Notice of Request To Release Airport Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-23

    ... Gateway Airport/Col. Bud Day Field, Sioux City, Iowa. ] SUMMARY: The FAA proposes to rule and invites public comment on the release of land at Sioux Gateway Airport/Col. Bud Day Field, Sioux City, Iowa... Airport/Col. Bud Day Field (SUX) under the provisions of 49 U.S.C. 47107(h)(2). On April 13, 2013,...

  8. Un Viaje al Aeropuerto (A Trip to the Airport).

    ERIC Educational Resources Information Center

    Federal Aviation Administration (DOT), Washington, DC.

    This illustrated, bilingual Spanish-English intermediate reader describes a class trip to an airport, in which the class tours the airport, and learns about airport activities, the parts of an airplane, and other related topics. Each page of the text is illustrated with a drawing. The narrative is followed by a list of 24 suggested learning…

  9. 77 FR 12905 - Land Release for Penn Yan Airport

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-02

    ... Federal Aviation Administration Land Release for Penn Yan Airport AGENCY: Federal Aviation Administration... requesting public comment on the Penn Yan Airport (PEO), Penn Yan, New York, Notice of Proposed Release from Aeronautical Use of approximately 10.00 +/- acres of airport property, to allow for...

  10. 77 FR 28667 - Land Release for Plattsburgh International Airport

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-15

    ... Federal Aviation Administration Land Release for Plattsburgh International Airport AGENCY: Federal... Administration is requesting public comment on the Plattsburgh International Airport (PBG), Plattsburgh, New York, Notice of Proposed Release from Aeronautical Use, and from the Airport, of approximately 1.73 +/-...

  11. 77 FR 27272 - Land Release for Dunkirk Airport

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-09

    ... Federal Aviation Administration Land Release for Dunkirk Airport AGENCY: Federal Aviation Administration... requesting public comment on the Dunkirk Airport (DKK), Dunkirk, New York, Notice of Proposed Release from Aeronautical Use of approximately 2.666 +/- acres of airport property, to allow for...

  12. 77 FR 55895 - Permanent Closure of Cincinnati Blue Ash Airport

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Federal Aviation Administration Permanent Closure of Cincinnati Blue Ash Airport AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of permanent closure of Cincinnati Blue Ash Airport (ISZ). SUMMARY: The... Cincinnati advising that on August 29, 2012, it was permanently closing Cincinnati Blue Ash Airport...

  13. 14 CFR 156.4 - Airport and project eligibility.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Airport and project eligibility. 156.4... (CONTINUED) AIRPORTS STATE BLOCK GRANT PILOT PROGRAM § 156.4 Airport and project eligibility. (a) A participating State shall use monies distributed pursuant to a State block grant agreement for...

  14. 78 FR 53184 - Land Release for Penn Yan Airport

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-28

    ... Federal Aviation Administration Land Release for Penn Yan Airport AGENCY: Federal Aviation Administration... requesting public comment on the Penn Yan Airport (PEO), Penn Yan, New York, Notice of Proposed Release from Aeronautical Use of approximately 0.069 +/- acres of airport property, to allow for...

  15. 14 CFR 121.624 - ETOPS Alternate Airports.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false ETOPS Alternate Airports. 121.624 Section... Alternate Airports. (a) No person may dispatch or release an airplane for an ETOPS flight unless enough ETOPS Alternate Airports are listed in the dispatch or flight release such that the airplane...

  16. 14 CFR 135.223 - IFR: Alternate airport requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) to— (1) Complete the flight to the first airport of intended landing; (2) Fly from that airport to the alternate airport; and (3) Fly after that for 45 minutes at normal cruising speed or, for helicopters, fly after that for 30 minutes at normal cruising speed. (b) Paragraph (a)(2) of this section...

  17. 78 FR 49790 - Notice of Request To Release Airport Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-15

    ... Federal Aviation Administration Notice of Request To Release Airport Property AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of intent to rule on request to release airport property at the Ottumwa Regional Airport (OTM), Ottumwa, Iowa. SUMMARY: The FAA proposes to rule and invites public comment on...

  18. 14 CFR 135.221 - IFR: Alternate airport weather minimums.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false IFR: Alternate airport weather minimums... VFR/IFR Operating Limitations and Weather Requirements § 135.221 IFR: Alternate airport weather minimums. No person may designate an alternate airport unless the weather reports or forecasts, or...

  19. 14 CFR 135.221 - IFR: Alternate airport weather minimums.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false IFR: Alternate airport weather minimums... VFR/IFR Operating Limitations and Weather Requirements § 135.221 IFR: Alternate airport weather minimums. No person may designate an alternate airport unless the weather reports or forecasts, or...

  20. 14 CFR 135.221 - IFR: Alternate airport weather minimums.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false IFR: Alternate airport weather minimums... VFR/IFR Operating Limitations and Weather Requirements § 135.221 IFR: Alternate airport weather minimums. No person may designate an alternate airport unless the weather reports or forecasts, or...

  1. 14 CFR 135.221 - IFR: Alternate airport weather minimums.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false IFR: Alternate airport weather minimums... VFR/IFR Operating Limitations and Weather Requirements § 135.221 IFR: Alternate airport weather minimums. No person may designate an alternate airport unless the weather reports or forecasts, or...

  2. 14 CFR 135.221 - IFR: Alternate airport weather minimums.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false IFR: Alternate airport weather minimums... VFR/IFR Operating Limitations and Weather Requirements § 135.221 IFR: Alternate airport weather minimums. No person may designate an alternate airport unless the weather reports or forecasts, or...

  3. 14 CFR 152.113 - Application requirements: Airport planning.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Application requirements: Airport planning. 152.113 Section 152.113 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Eligibility Requirements and Application Procedures §...

  4. 75 FR 55401 - Notice of Intent To Rule on Request To Release Airport Property at the Air Park South Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ... reinvested in another eligible airport improvement project for general aviation facilities at the Springfield... Federal Aviation Administration Notice of Intent To Rule on Request To Release Airport Property at the Air Park South Airport (2K2), Ozark, MO AGENCY: Federal Aviation Administration (FAA), DOT. ACTION:...

  5. 75 FR 41922 - Notice of Intent To Rule on Request To Release Airport Property at Fort Smith Regional Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-19

    ... Smith Regional Airport, Fort Smith, AR AGENCY: Federal Aviation Administration (FAA), DOT. ACTION... comment on the release of land at Fort Smith Regional Airport under the provisions of Title 49, U.S.C... comments submitted to the FM must be mailed or delivered to Mr. John Parker, Airport Director, Fort...

  6. 76 FR 30422 - Notice of Intent To Rule on Request To Release Airport Property at the Helena Regional Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ... Federal Aviation Administration Notice of Intent To Rule on Request To Release Airport Property at the Helena Regional Airport, Helena, Montana AGENCY: Federal Aviation Administration (FAA), Department of Transportation (DOT). ACTION: Notice of Request to Release Airport Property. SUMMARY: The FAA proposes to...

  7. 76 FR 69321 - Intent To Rule On Request To Release Airport Property at the Malden Regional Airport and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-08

    ... Federal Aviation Administration Intent To Rule On Request To Release Airport Property at the Malden Regional Airport and Industrial Park (MAW), Malden, MO AGENCY: Federal Aviation Administration (FAA), DOT... the Malden Regional Airport & Industrial Park (MAW), Malden, Missouri, under the provisions of 49...

  8. 76 FR 23854 - Notice of Intent To Rule on Request To Release Airport Property at the Dubois Regional Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-28

    ... Federal Aviation Administration Notice of Intent To Rule on Request To Release Airport Property at the Dubois Regional Airport, Reynoldsville, PA AGENCY: Federal Aviation Administration (FAA) DOT. ACTION: Notice of request to release airport property. SUMMARY: The FAA proposes to rule and invite...

  9. 77 FR 12906 - Notice of Intent To Rule on Request To Release Airport Property at the Dubois Regional Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-02

    ... Federal Aviation Administration Notice of Intent To Rule on Request To Release Airport Property at the Dubois Regional Airport, Reynoldsville, PA AGENCY: Federal Aviation Administration (FAA) DOT. ACTION: Notice of request to release airport property. SUMMARY: The FAA proposes to rule and invite...

  10. 78 FR 20168 - Notice of Intent To Rule on Request To Release Airport Property at the Boulder Municipal Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-03

    ... Federal Aviation Administration Notice of Intent To Rule on Request To Release Airport Property at the Boulder Municipal Airport, Boulder, CO AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of request to release airport property. SUMMARY: The FAA proposes to rule and invite public...

  11. 75 FR 23841 - Notice of Intent To Rule on Request To Release Airport Property at the Reading Regional Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-04

    ... Reading Regional Airport, Reading, PA AGENCY: Federal Aviation Administration (FAA) DOT. ACTION: Notice of... release of land at the Reading Regional Airport, Reading, Pennsylvania under the provisions of Section...: Terry P. Sroka, Manager, Reading Regional Airport Authority, 2501 Bernville Road, Reading, PA 19605,...

  12. 76 FR 19517 - Orders Limiting Scheduled Operations at John F. Kennedy International Airport, LaGuardia Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-07

    ....\\1\\ \\1\\ 75 FR 9017 (Feb. 26, 2010). ATA also stated the National Oceanic and Atmospheric...\\ 14 CFR 93.227 (DCA); 74 FR 51648 (Oct. 7, 2009) (EWR); 74 FR 51650 (Oct. 7, 2009) (JFK); 74 FR 51653... Airport, LaGuardia Airport, and Newark Liberty International Airport; High Density Rule at Reagan...

  13. Analysis and Modeling of Ground Operations at Hub Airports

    NASA Technical Reports Server (NTRS)

    Atkins, Stephen (Technical Monitor); Andersson, Kari; Carr, Francis; Feron, Eric; Hall, William D.

    2000-01-01

    Building simple and accurate models of hub airports can considerably help one understand airport dynamics, and may provide quantitative estimates of operational airport improvements. In this paper, three models are proposed to capture the dynamics of busy hub airport operations. Two simple queuing models are introduced to capture the taxi-out and taxi-in processes. An integer programming model aimed at representing airline decision-making attempts to capture the dynamics of the aircraft turnaround process. These models can be applied for predictive purposes. They may also be used to evaluate control strategies for improving overall airport efficiency.

  14. Aircraft noise in the region of the Bucharest-Otopeni Airport. [noise pollution in airport environment

    NASA Technical Reports Server (NTRS)

    Costescu, M.; Gherghel, C.; Curtoglu, A.

    1974-01-01

    Aircraft noise, especially in the region adjoining airports, constitutes a problem that will be aggravated in the near future because of increasing aircraft traffic and the appearance of new types of large tonnage aircraft with continuously increasing powers and speeds. Criteria for the evaluation of aircraft noise are reported and some results of studies carried out in the region of Bucharest-Otopeni Airport are detailed.

  15. Airport noise impact reduction through operations

    NASA Technical Reports Server (NTRS)

    Deloach, R.

    1981-01-01

    The effects of various aeronautical, operational, and land-use noise impact reduction alternatives are assessed for a major midwestern airport. Specifically, the relative effectiveness of adding sound absorbing material to aircraft engines, imposing curfews, and treating houses with acoustic insulation are examined.

  16. Airport Surface Movement Technologies: Atlanta Demonstrations Overview

    NASA Technical Reports Server (NTRS)

    Jones, Denise R.; Young, Steven D.

    1997-01-01

    A flight demonstration was conducted in August 1997 at the Hartsfield Atlanta (ATL) International Airport as part of low visibility landing and surface operations (LVLASO) research activities. This research was aimed at investigating technology to improve the safety and efficiency of aircraft movements on the surface during the operational phases of roll-out, turnoff, and taxi in any weather condition down to a runway visual range of 300 feet. The system tested at ATL was composed of airborne and ground-based components that were integrated to provide both the flight crew and controllers with supplemental information to enable safe, expedient surface operations. Experimental displays were installed on a Boeing 757-200 research aircraft in both headup and head-down formats. On the ground, an integrated system maintained surveillance of the airport surface and a controller interface provided routing and control instructions. While at ATL, the research aircraft performed a series of flight and taxi operations to show the validity of the operational concept at a major airport facility, to validate simulation findings, and to assess each of the individual technologies performance in an airport environment. The concept was demonstrated to over 100 visitors from the Federal Aviation Administration (FAA) and the aviation community. This paper gives an overview of the LVLASO system and ATL test activities.

  17. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  18. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement. PMID:27581899

  19. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  20. A decision framework for managing risk to airports from terrorist attack.

    PubMed

    Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R

    2015-02-01

    This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period.

  1. A decision framework for managing risk to airports from terrorist attack.

    PubMed

    Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R

    2015-02-01

    This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period. PMID:25109326

  2. 77 FR 73310 - Technical Amendment to List of User Fee Airports: Addition of Bozeman Yellowstone International...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-10

    ... Airports: Addition of Bozeman Yellowstone International Airport, Belgrade, MT AGENCY: U.S. Customs and... user fee airports to reflect the recent user fee airport designation for Bozeman Yellowstone... approving the designation of user fee status for Bozeman Yellowstone International Airport was signed...

  3. 14 CFR 121.187 - Airplanes: Reciprocating engine-powered: Landing limitations: Alternate airport.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...: Landing limitations: Alternate airport. 121.187 Section 121.187 Aeronautics and Space FEDERAL AVIATION...: Alternate airport. (a) No person may list an airport as an alternate airport in a dispatch or flight release unless the airplane (at the weight anticipated at the time of arrival at the airport), based on...

  4. Monitoring Wake Vortices for More Efficient Airports

    NASA Technical Reports Server (NTRS)

    2005-01-01

    Wake vortices are generated by all aircraft during flight. The larger the aircraft, the stronger the wake, so the Federal Aviation Administration (FAA) separates aircraft to ensure wake turbulence has no effect on approaching aircraft. Currently, though, the time between planes is often larger than it needs to be for the wake to dissipate. This unnecessary gap translates into arrival and departure delays, but since the wakes are invisible, the delays are nearly inevitable. If, however, the separation between aircraft can be reduced safely, then airport capacity can be increased without the high cost of additional runways. Scientists are currently studying these patterns to identify and introduce new procedures and technologies that safely increase airport capacity. NASA, always on the cutting edge of aerospace research, has been contributing knowledge and testing to these endeavors.

  5. The Airport Gate Assignment Problem: A Survey

    PubMed Central

    Ghaleb, Mageed A.; Salem, Ahmed M.

    2014-01-01

    The airport gate assignment problem (AGAP) is one of the most important problems operations managers face daily. Many researches have been done to solve this problem and tackle its complexity. The objective of the task is assigning each flight (aircraft) to an available gate while maximizing both conveniences to passengers and the operational efficiency of airport. This objective requires a solution that provides the ability to change and update the gate assignment data on a real time basis. In this paper, we survey the state of the art of these problems and the various methods to obtain the solution. Our survey covers both theoretical and real AGAP with the description of mathematical formulations and resolution methods such as exact algorithms, heuristic algorithms, and metaheuristic algorithms. We also provide a research trend that can inspire researchers about new problems in this area. PMID:25506074

  6. Miami International Airport stormwater NPDES plan

    SciTech Connect

    Perez, A.I.; Goldman, J.Z.; Schmidt, M.F.; Clark, E.E.

    1994-12-31

    Miami International Airport (MIA) is endeavoring to essentially double its traffic volume by the turn of the century. This is a great challenge since the site is already highly developed. Space, safety and other constraints make it difficult to implement conventional detention/retention stormwater practices. Other practices were evaluated to control stormwater quantity/quality, since some of the downstream bodies of water are flood-prone or environmentally sensitive.

  7. The annoyance caused by noise around airports

    NASA Technical Reports Server (NTRS)

    JOSSE

    1980-01-01

    A comprehensive study of noise around selected airports in France was performed. By use of questionnaires, the degree of annoyance caused by aircraft noise was determined. Three approaches used in the study were: (1) analytical study on the influence of noise on sleep; (2) sociological study on the satisfaction of occupants of buildings which conform to laws which are supposed to guarantee sufficient comfort; and (3) statistical study of correlations between external noises and psychological and pathological disturbances in residences.

  8. Noise zoning around airports in the Netherlands

    NASA Astrophysics Data System (ADS)

    Evers, F. W. R.

    1980-01-01

    The situation in the Netherlands with respect to noise abatement is dominated by a steadily increasing activity both at the political and the administrative level. A new law with respect to the designation of noise zones around existing and future airports and military airfields was enacted on 1 October 1978. A comprehensive new noise nuisance act was signed by the Queen on 16 February 1979. Both laws were accepted by Parliament unanimously. This article describes the new regulations with respect to noise zoning around airports. To maintain the habitability of the environment around airports, a demarcation will be made between the interest of the people living there and those of aviation. A noise zone will be designated outside which the noise load from aircraft movements may not exceed a fixed maximum. Within this area, where a noise load above the fixed maximum is allowed, planning and building design measures will have to be taken. Although the exclusion of new housing within the noise zone is an essential element, the area will be used for other purposes by exchanging previously intended developments with those from areas outside the zone. The Minister in charge of physical planning will issue directives concerning the contents of local development plans and will indicate how such plans, once amended, should be put into effect. Termination of the use or habitation of existing buildings is possible as well as soundproofing of buildings. The costs of measures taken to prevent undesirable new developments and measures taken to improve the existing state of affairs are borne by the central government. But a charge has to be paid by the users of the airports to defray the costs.

  9. The problem with security: Public perception versus reality

    SciTech Connect

    Caskey, D.L.

    1991-01-01

    The public perception of security'', both of the requirements and the implementation, is often at odds with the judgment of security professionals. There is clearly a need to bridge the existing gulf, both by better education of the public, and by the security community gaining a better understanding of public policy, its constraints and limitations, and the effects of public perception. This paper explores the topic through the examination of a case study. The example chosen was the recent Gulf War's effects on airport security in the US. The paper provides an analysis of the threat, as perceived by the FAA and the airports, the security measures imposed by the FAA, and their effects, on both public perception and in fact, from a technical security view. It also suggests that the lack of vulnerability analysis is a major problem in providing effective security.

  10. The problem with security: Public perception versus reality

    SciTech Connect

    Caskey, D.L.

    1991-12-31

    The public perception of ``security``, both of the requirements and the implementation, is often at odds with the judgment of security professionals. There is clearly a need to bridge the existing gulf, both by better education of the public, and by the security community gaining a better understanding of public policy, its constraints and limitations, and the effects of public perception. This paper explores the topic through the examination of a case study. The example chosen was the recent Gulf War`s effects on airport security in the US. The paper provides an analysis of the threat, as perceived by the FAA and the airports, the security measures imposed by the FAA, and their effects, on both public perception and in fact, from a technical security view. It also suggests that the lack of vulnerability analysis is a major problem in providing effective security.

  11. Balancing Security and Learning. School Security Supplement.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2002-01-01

    Discusses ways to provide vital safety to schools without inhibiting the learning environment for students. Describes security efforts at Orange County, Florida schools, such as using video cameras, school police officers, and access-control systems. (EV)

  12. Aircraft hydrocarbon emissions at Oakland International Airport.

    PubMed

    Herndon, Scott C; Wood, Ezra C; Northway, Megan J; Miake-Lye, Richard; Thornhill, Lee; Beyersdorf, Andreas; Anderson, Bruce E; Dowlin, Renee; Dodds, Willard; Knighton, W Berk

    2009-03-15

    To help airports improve emission inventory data, speciated hydrocarbon emission indices have been measured from in-use commercial, airfreight, and general aviation aircraft at Oakland International Airport. The compounds reported here include formaldehyde, acetaldehyde, ethene, propene, and benzene. At idle, the magnitude of hydrocarbon emission indices was variable and reflected differences in engine technology, actual throttle setting, and ambient temperature. Scaling the measured emission indices to the simultaneously measured formaldehyde (HCHO) emission index eliminated most of the observed variability. This result supports a uniform hydrocarbon emissions profile across engine types when the engine is operating near idle, which can greatly simplify how speciated hydrocarbons are handled in emission inventories. The magnitude of the measured hydrocarbon emission index observed in these measurements (ambient temperature range 12-22 degrees C) is a factor of 1.5-2.2 times larger than the certification benchmarks. Using estimates of operational fuel flow rates at idle, this analysis suggests that current emission inventories at the temperatures encountered at this airport underestimate hydrocarbon emissions from the idle phase of operation by 16-45%.

  13. The Integrated Airport Competition Model, 1998

    NASA Technical Reports Server (NTRS)

    Veldhuis, J.; Essers, I.; Bakker, D.; Cohn, N.; Kroes, E.

    1999-01-01

    This paper addresses recent model development by the Directorate General of Civil Aviation (DGCA) and Hague Consulting Group (HCG) concerning long-distance travel. Long-distance travel demand is growing very quickly and raising a great deal of economic and policy issues. There is increasing competition among the main Western European airports, and smaller, regional airports are fighting for market share. New modes of transport, such as high speed rail, are also coming into the picture and affect the mode split for medium distance transport within Europe. Developments such as these are demanding the attention of policy makers and a tool is required for their analysis. For DGCA, Hague Consulting Group has developed a model system to provide answers to the policy questions posed by these expected trends, and to identify areas where policy makers can influence the traveller choices. The development of this model system, the Integrated Airport Competition Model/integraal Luchthaven Competitie Model (ILCM), began in 1992. Since that time the sub-models, input data and user interface have been expanded, updated and improved. HCG and DGCA have transformed the ILCM from a prototype into an operational forecasting tool.

  14. The Integrated Airport Competition Model, 1998

    NASA Technical Reports Server (NTRS)

    Veldhuis, J.; Essers, I.; Bakker, D.; Cohn, N.; Kroes, E.

    1999-01-01

    This paper addresses recent model development by the Directorate General of Civil Aviation (DGCA) and Hague Consulting Group (HCG) concerning long-distance travel, Long-distance travel demand is growing very quickly and raising a great deal of economic and policy issues. There is increasing competition among the main Western European airports, and smaller, regional airports are fighting for market share. New modes of transport, such as high speed rail, arc also coming into the picture and affect the mode split for medium distance transport within Europe. Developments such as these are demanding the attention of policy makers and a tool is required for their analysis. For DGCA, Hague Consulting Group has developed a model system to provide answers to the policy questions posed by these expected trends, and to identify areas where policy makers can influence the traveller choices. The development of this model system, the Integrated Airport Competition Model/Integral Luchthaven Competitive Model (ILCM), began in 1992. Since that time the sub-models, input data and user interface have been expanded, updated and improved. HCG and DGCA have transformed the ILCM from a prototype into an operational forecasting tool.

  15. Expanding Regional Airport Usage to Accommodate Increased Air Traffic Demand

    NASA Technical Reports Server (NTRS)

    Russell, Carl R.

    2009-01-01

    Small regional airports present an underutilized source of capacity in the national air transportation system. This study sought to determine whether a 50 percent increase in national operations could be achieved by limiting demand growth at large hub airports and instead growing traffic levels at the surrounding regional airports. This demand scenario for future air traffic in the United States was generated and used as input to a 24-hour simulation of the national airspace system. Results of the demand generation process and metrics predicting the simulation results are presented, in addition to the actual simulation results. The demand generation process showed that sufficient runway capacity exists at regional airports to offload a significant portion of traffic from hub airports. Predictive metrics forecast a large reduction of delays at most major airports when demand is shifted. The simulation results then show that offloading hub traffic can significantly reduce nationwide delays.

  16. Amsterdam's Airport Library Serves Passengers in 30 Languages

    ERIC Educational Resources Information Center

    Dempsey, Kathy

    2011-01-01

    In the summer of 2010, Schiphol Airport in Amsterdam started offering the world's first library in an airport. This article describes Airport Library which is no ordinary library. It holds more than 1,200 items, but it lends nothing. It operates 24/7, yet it's only staffed by volunteers for 2 or 3 hours a day. It offers just nine public-access…

  17. FOILFEST :community enabled security.

    SciTech Connect

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6

  18. Digital security technology simplified.

    PubMed

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  19. Christchurch International Airport Personnel and Local Media Visit SOFIA

    NASA Video Gallery

    Dr. Eric Becklin, SOFIA chief science advisor, briefs airport personnel and media on the Stratospheric Observatory for Infrared Astronomy program and the reasons for infrared astronomy missions in ...

  20. Integrated Analysis of Airport Capacity and Environmental Constraints

    NASA Technical Reports Server (NTRS)

    Hasan, Shahab; Long, Dou; Hart, George; Eckhause, Jeremy; Hemm, Robert; Busick, Andrew; Graham, Michael; Thompson, Terry; Murphy, Charles; Poage, James

    2010-01-01

    LMI conducted an integrated analysis of airport capacity and environmental constraints. identifying and ranking the key factors limiting achievement of NextGen capacity goals. The primary metric used was projected throughput, which was estimated for the years 2015 and 2025 based on the unconstrained demand forecast from the Federal Aviation Administration, and planned improvements including those proposed in the NextGen plan. A set of 310 critical airports was identified.. collectively accounting for more than 99 percent of domestic air traffic volume; a one-off analytical approach was used to isolate the constraint being assessed. The study considered three capacity constraints (runway.. taxiway, and gate) and three environmental constraints (fuel, NO(x) emissions, and noise). For the ten busiest airports, runway and noise are the primary and secondary constraints in both 2015 and 2025. For the OEP 35 airports and overall for the remaining airports, the most binding constraint is noise. Six of the 10 busiest airports, will face runway constraints in 2025, and 95 will face gate constraints. Nearly every airport will be subject to constraints due to emissions and NOx. Runway and taxi constraints are more concentrated in the large airports: environmental constraints are present at almost every airport regardless of size.