Science.gov

Sample records for airport security access

  1. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  2. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  3. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  4. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Federal Aviation Administration Eleventh Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  5. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  6. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  7. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  8. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... Federal Aviation Administration Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224, Airport Security Access Control. DATES:...

  9. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Federal Aviation Administration Twelfth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  10. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... TRANSPORTATION Federal Aviation Administration Ninth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  11. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  12. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  13. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  14. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  15. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... TRANSPORTATION Federal Aviation Administration Thirteenth Meeting: RTCA Special Committee 224, Airport Security... (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  16. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... TRANSPORTATION Federal Aviation Administration Eighth Meeting: RTCA Special Committee 224: Airport Security... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  17. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21, 2013... Federal Aviation Administration Nineteenth Meeting: RTCA Special Committee 224, Airport Security...

  18. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Second Meeting: RTCA Special Committee 224, Airport Security...

  19. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Federal Aviation Administration Fourth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  20. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Federal Aviation Administration Second Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  1. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Federal Aviation Administration Seventh Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  2. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ... Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on... TRANSPORTATION Federal Aviation Administration Twenty-Fourth Meeting: RTCA Special Committee 224,...

  3. A novel wireless local positioning system for airport (indoor) security

    NASA Astrophysics Data System (ADS)

    Zekavat, Seyed A.; Tong, Hui; Tan, Jindong

    2004-09-01

    A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).

  4. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport..., and may be subject to civil penalties for failing to protect sensitive security information....

  5. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport..., and may be subject to civil penalties for failing to protect sensitive security information....

  6. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport..., and may be subject to civil penalties for failing to protect sensitive security information....

  7. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport..., and may be subject to civil penalties for failing to protect sensitive security information....

  8. Surveillance of ground vehicles for airport security

    NASA Astrophysics Data System (ADS)

    Blasch, Erik; Wang, Zhonghai; Shen, Dan; Ling, Haibin; Chen, Genshe

    2014-06-01

    Future surveillance systems will work in complex and cluttered environments which require systems engineering solutions for such applications such as airport ground surface management. In this paper, we highlight the use of a L1 video tracker for monitoring activities at an airport. We present methods of information fusion, entity detection, and activity analysis using airport videos for runway detection and airport terminal events. For coordinated airport security, automated ground surveillance enhances efficient and safe maneuvers for aircraft, unmanned air vehicles (UAVs) and unmanned ground vehicles (UGVs) operating within airport environments.

  9. Components of the airport access system

    NASA Technical Reports Server (NTRS)

    1978-01-01

    The organizations and agencies which make up or influence the airport access system are examined. These include the airport, the airline industry, the public and private transit agencies which provide ground access to the airport, and the regulatory agencies which affect all of these organizations and their actions. Each component, with the exception of the regulatory agencies is described in terms of its legal status, its sources of funds, and the nature of its relationship with the other components. Conclusions regarding the system components' effects on airport access and recommendations for changes which appear practical are presented.

  10. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Airport tenant security programs. 1542.113 Section 1542.113 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport...

  11. 76 FR 15028 - Airport Improvement Program (AIP): Interim Policy Regarding Access to Airports From Residential...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-18

    ... Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property (75 FR 54946..., Safety Management System for Certificated Airports (75 FR 62008, October 7, 2010). However, the...

  12. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Airport security coordinator. 1542.3 Section 1542.3 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.3 Airport security coordinator. (a) Each...

  13. 61 FR 25729 - Security Measures; Hellenikon International Airport, Athens, Greece

    Federal Register 2010, 2011, 2012, 2013, 2014

    1996-05-22

    ... Security Measures; Hellenikon International Airport, Athens, Greece Summary The Secretary of Transportation has now determined that Hellenikon International Airport, Athens, Greece, maintains and carries out... that Hellenikon International Airport, Athens, Greece, did not maintain and carry out...

  14. Airport Viz - a 3D Tool to Enhance Security Operations

    SciTech Connect

    Koch, Daniel B

    2006-01-01

    In the summer of 2000, the National Safe Skies Alliance (NSSA) awarded a project to the Applied Visualization Center (AVC) at the University of Tennessee, Knoxville (UTK) to develop a 3D computer tool to assist the Federal Aviation Administration security group, now the Transportation Security Administration (TSA), in evaluating new equipment and procedures to improve airport checkpoint security. A preliminary tool was demonstrated at the 2001 International Aviation Security Technology Symposium. Since then, the AVC went on to construct numerous detection equipment models as well as models of several airports. Airport Viz has been distributed by the NSSA to a number of airports around the country which are able to incorporate their own CAD models into the software due to its unique open architecture. It provides a checkpoint design and passenger flow simulation function, a layout design and simulation tool for checked baggage and cargo screening, and a means to assist in the vulnerability assessment of airport access points for pedestrians and vehicles.

  15. Role of helicopters in airport access

    NASA Technical Reports Server (NTRS)

    Dajani, J. S.; Snyder, W. J.

    1978-01-01

    The paper briefly reviews the role of helicopter systems in the provision of airport access services and evaluates the potential for the future development of such services in major metropolitan areas in the United States. The evaluation is based on a computer simulation of potential helicopter system proposed for 20 metropolitan areas. The simulation provides two indicators that are used to gage the extent of the feasibility of developing successful systems in these areas: (1) the cost per seat mile, and (2) the break-even number of passengers, expressed as a percentage of total air travelers. It is found that a few metropolitan areas presently have the potential of marginally supporting intra-urban helicopter airport access service. The access systems offer a viable alternative for air passengers placing a high value on their time, and provides the opportunity for better integrating the air transportation service of multiple airports in a given urban region.

  16. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Airport security coordinator. 1542.3 Section 1542.3 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.3...

  17. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Airport security coordinator. 1542.3 Section 1542.3 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.3...

  18. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Airport security coordinator. 1542.3 Section 1542.3 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.3...

  19. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Airport security coordinator. 1542.3 Section 1542.3 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.3...

  20. Airport Security Act of 2013

    THOMAS, 113th Congress

    Rep. Johnson, Henry C. "Hank," Jr. [D-GA-4

    2013-11-14

    01/09/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Aviation safety inspector airport access. 153.5 Section 153.5 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation...

  2. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aviation safety inspector airport access. 153.5 Section 153.5 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation...

  3. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Aviation safety inspector airport access. 153.5 Section 153.5 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation...

  4. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Aviation safety inspector airport access. 153.5 Section 153.5 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation...

  5. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Aviation safety inspector airport access. 153.5 Section 153.5 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation...

  6. 78 FR 42419 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-16

    ...This action adopts a Policy Statement, based on Federal law, concerning through-the-fence access to a federally-obligated airport from an adjacent or nearby property, when that property is used as a residence. This Policy Statement replaces FAA's previously published Interim Policy (76 FR 15028; March 18, 2011) with regard to commercial service airports, and establishes how FAA will implement......

  7. 76 FR 70468 - Extension of Agency Information Collection Activity Under OMB Review: Airport Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-14

    ... OMB Review: Airport Security AGENCY: Transportation Security Administration, DHS. ACTION: 30-day... other forms of information technology. Information Collection Requirement Title: Airport Security, 49... is seeking to renew its OMB control number 1542-0002, Airport Security, 49 CFR part 1542....

  8. Planning for airport access: An analysis of the San Francisco Bay area. The setting

    NASA Technical Reports Server (NTRS)

    1978-01-01

    The regional setting for the three San Franscisco Bay area airports is described. The general role of the airports in the national air transportation system, the demand for air transportation, and the relationship of airport location to the demand for air transportation are examined. The problem of airport access is also considered. Various access modes, their destination, frequency, and cost are presented.

  9. The systems approach to airport security: The FAA (Federal Aviation Administration)/BWI (Baltimore-Washington International) Airport demonstration project

    SciTech Connect

    Caskey, D.L.; Olascoaga, M.T.

    1990-01-01

    Sandia National Laboratories has been involved in designing, installing and evaluating security systems for various applications during the past 15 years. A systems approach to security that evolved from this experience was applied to aviation security for the Federal Aviation Administration. A general systems study of aviation security in the United States was concluded in 1987. One result of the study was a recommendation that an enhanced security system concept designed to meet specified objectives be demonstrated at an operational airport. Baltimore-Washington International Airport was selected as the site for the demonstration project which began in 1988 and will be completed in 1992. This article introduced the systems approach to airport security and discussed its application at Baltimore-Washington International Airport. Examples of design features that could be included in an enhanced security concept also were presented, including details of the proposed Ramps Area Intrusion Detection System (RAIDS).

  10. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  11. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  12. Gerardo Hernandez Airport Security Act of 2014

    THOMAS, 113th Congress

    Rep. Hudson, Richard [R-NC-8

    2014-06-05

    07/23/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  13. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Airport Customs Security Area Bond A Appendix A to Part 113 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security...

  14. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Airport Customs Security Area Bond A Appendix A to Part 113 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security...

  15. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Airport Customs Security Area Bond A Appendix A to Part 113 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security...

  16. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Airport Customs Security Area Bond A Appendix A to Part 113 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security...

  17. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Airport Customs Security Area Bond A Appendix A to Part 113 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security...

  18. Los Alamos Shows Airport Security Technology at Work

    ScienceCinema

    Espy, Michelle; Schultz, Larry; Hunter, James

    2014-06-24

    Los Alamos scientists have advanced a Magnetic Resonance Imaging (MRI) technology that may provide a breakthrough for screening liquids at airport security. They've added low-power X-ray data to the mix, and as a result have unlocked a new detection technology. Funded in part by the Department of Homeland Security's Science and Technology Directorate, the new system is named MagRay. The goal is to quickly and accurately distinguish between liquids that visually appear identical. For example, what appears to be a bottle of white wine could potentially be nitromethane, a liquid that could be used to make an explosive. Both are clear liquids, one would be perfectly safe on a commercial aircraft, the other would be strictly prohibited. How to tell them apart quickly without error at an airport security area is the focus of Michelle Espy, Larry Schultz and their team. In this video, Espy and the MagRay team explain how the new technology works, how they've developed an easy operator interface, and what the next steps might be in transitioning this technology to the private sector.

  19. Los Alamos Shows Airport Security Technology at Work

    SciTech Connect

    Espy, Michelle; Schultz, Larry; Hunter, James

    2013-11-25

    Los Alamos scientists have advanced a Magnetic Resonance Imaging (MRI) technology that may provide a breakthrough for screening liquids at airport security. They've added low-power X-ray data to the mix, and as a result have unlocked a new detection technology. Funded in part by the Department of Homeland Security's Science and Technology Directorate, the new system is named MagRay. The goal is to quickly and accurately distinguish between liquids that visually appear identical. For example, what appears to be a bottle of white wine could potentially be nitromethane, a liquid that could be used to make an explosive. Both are clear liquids, one would be perfectly safe on a commercial aircraft, the other would be strictly prohibited. How to tell them apart quickly without error at an airport security area is the focus of Michelle Espy, Larry Schultz and their team. In this video, Espy and the MagRay team explain how the new technology works, how they've developed an easy operator interface, and what the next steps might be in transitioning this technology to the private sector.

  20. Manufacturing Accomplices: ICT Use in Securing the Safety State at Airports

    NASA Astrophysics Data System (ADS)

    Østerlie, Thomas; Asak, Ole Martin; Pettersen, Ole Georg; Tronhus, Håvard

    Based on a study of ICT use at an airport security checkpoint, this paper explores a possible explanation to the paradox that travelers find existing airport security measures inadequate while at the same time believing air travel to be sufficiently secure. We pursue this explanation by showing that, for the security checkpoint to function properly in relation to the overall function of the airport, travelers have to be enrolled in a particular program of action. They are then locked into this program through sanctions. Travelers are forced into participating in a system many of them find ethically and morally objectionable. Yet, active participation makes it difficult for them to object to the moral and ethical issues of their actions without damning themselves. Our explanation of the security paradox is, therefore, that while travelers remain critical of airport security, they avoid damning themselves by criticizing the system in terms of its own logic. They have been made accomplices.

  1. Planning for airport access: An analysis of the San Francisco Bay area. Introduction and conclusions

    NASA Technical Reports Server (NTRS)

    1978-01-01

    The problems of airport access are examined and recommendations are made based on current transportation availability, public costs, and future transportation demand. Major conclusions presented include: (1) access must be considered in the contex of the overall urban transportation system, (2) expensive and inflexible travel modes designed primarily for airport access are not justifiable, (3) VTOL and STOL are presently too expensive for large-scale commercial use, and (4) the automobile will continue to be the predominant access mode in the future.

  2. Airport Screening

    MedlinePlus

    ... 2011 Photo courtesy of Dan Paluska/Flickr Denver Airport Security Screening Introduction With air travel regaining popularity and increased secu- rity measures, airport security screening has become an area of interest for ...

  3. 75 FR 54946 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-09

    ... Federal Register on October 13, 2009 (74 FR 52524). Comments were due on March 31, 2010. Comments on the... the airport in local politics. Response: Owners of residential lots with through-the-fence...

  4. Three-dimensional imaging of hold baggage for airport security

    NASA Astrophysics Data System (ADS)

    Kolokytha, S.; Speller, R.; Robson, S.

    2014-06-01

    This study describes a cost-effective check-in baggage screening system, based on "on-belt tomosynthesis" (ObT) and close-range photogrammetry, that is designed to address the limitations of the most common system used, conventional projection radiography. The latter's limitations can lead to loss of information and an increase in baggage handling time, as baggage is manually searched or screened with more advanced systems. This project proposes a system that overcomes such limitations creating a cost-effective automated pseudo-3D imaging system, by combining x-ray and optical imaging to form digital tomograms. Tomographic reconstruction requires a knowledge of the change in geometry between multiple x-ray views of a common object. This is uniquely achieved using a close range photogrammetric system based on a small network of web-cameras. This paper presents the recent developments of the ObT system and describes recent findings of the photogrammetric system implementation. Based on these positive results, future work on the advancement of the ObT system as a cost-effective pseudo-3D imaging of hold baggage for airport security is proposed.

  5. 77 FR 51948 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-28

    ... 14, 2012. DATES: The comment period for the proposed policy document published July 30, 2012 (77 FR... Proposed Policy in the Federal Register at 77 FR 44515 proposing an FAA policy, based on Federal law... previously published interim policy (76 FR 15028; March 18, 2011) to commercial service airports...

  6. Interacting forms of expertise in security governance: the example of CCTV surveillance at Geneva International Airport.

    PubMed

    Klauser, Francisco

    2009-06-01

    The paper investigates the multiple public-private exchanges and cooperation involved in the installation and development of CCTV surveillance at Geneva International Airport. Emphasis is placed on the interacting forms of authority and expertise of five parties: the user(s), owner and supplier of the camera system, as well as the technical managers of the airport and the Swiss regulatory bodies in airport security. While placing the issues of airport surveillance in the particular context of a specific range of projects and transformations relating to the developments of CCTV at Geneva Airport, the paper not only provides important insights into the micro-politics of surveillance at Geneva Airport, but aims to re-institute these as part of a broader 'problematic': the mediating role of expertise and the growing functional fragmentation of authority in contemporary security governance. On this basis, the paper also exemplifies the growing mutual interdependences between security and business interests in the ever growing 'surveillant assemblage' in contemporary security governance. PMID:19489820

  7. Computer access security code system

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  8. An RFID-based luggage and passenger tracking system for airport security control applications

    NASA Astrophysics Data System (ADS)

    Vastianos, George E.; Kyriazanos, Dimitris M.; Kountouriotis, Vassilios I.; Thomopoulos, Stelios C. A.

    2014-06-01

    Market analysis studies of recent years have shown a steady and significant increase in the usage of RFID technology. Key factors for this growth were the decreased costs of passive RFIDs and their improved performance compared to the other identification technologies. Besides the benefits of RFID technologies into the supply chains, warehousing, traditional inventory and asset management applications, RFID has proven itself worth exploiting on experimental, as well as on commercial level in other sectors, such as healthcare, transport and security. In security sector, airport security is one of the biggest challenges. Airports are extremely busy public places and thus prime targets for terrorism, with aircraft, passengers, crew and airport infrastructure all subject to terrorist attacks. Inside this labyrinth of security challenges, the long range detection capability of the UHF passive RFID technology can be turned into a very important tracking tool that may outperform all the limitations of the barcode tracking inside the current airport security control chain. The Integrated Systems Lab of NCSR Demokritos has developed an RFID based Luggage and Passenger tracking system within the TASS (FP7-SEC-2010-241905) EU research project. This paper describes application scenarios of the system categorized according to the structured nature of the environment, the system architecture and presents evaluation results extracted from measurements with a group of different massive production GEN2 UHF RFID tags that are widely available in the world market.

  9. Planning for airport access: An analysis of the San Francisco Bay area. Technological options

    NASA Technical Reports Server (NTRS)

    1978-01-01

    Current transportation technology and expected technological trends are reviewed. These technologies are assessed within the framework of the airport access system in the San Francisco Bay area. Four types of technological options are considered: (1) automotive systems, (2) commuter air systems, (3) automated guideways, and (4) water systems.

  10. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... requirements of the Department of Transportation's ADA rules (49 CFR parts 37 and 38). (4) Your contracts or... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF...

  11. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... requirements of the Department of Transportation's ADA rules (49 CFR parts 37 and 38). (4) Your contracts or... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF...

  12. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... requirements of the Department of Transportation's ADA rules (49 CFR parts 37 and 38). (4) Your contracts or... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF...

  13. Securing America's access to space

    SciTech Connect

    Rendine, M.; Wood, L.

    1990-05-23

    We review pertinent aspects of the history of the space launch capabilities of the United States and survey its present status and near-term outlook. Steps which must be taken, pitfalls which much be avoided, and a core set of National options for re-acquiring in the near term the capability to access the space environment with large payloads are discussed. We devote considerable attention to the prospect of creating an interim heavy-lift space launch vehicle of at least 100,000 pound payload-orbiting capacity to serve National needs during the next dozen years, suggesting that such a capability can be demonstrated within 5 years for less than $1 B. Such capability will apparently be essential for meeting the first-phase goals of the President's Space Exploration Initiative. Some other high-leverage aspects of securing American access to space are also noted briefly, emphasizing unconventional technological approaches of presently high promise.

  14. 33 CFR 165.1192 - Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Specific Regulated Navigation Areas and Limited Access Areas Eleventh Coast Guard District § 165.1192...-FM channel 16 (156.8 MHz) to seek permission to transit the area. If permission is granted,...

  15. 61 FR 13917 - Hellenikon International Airport, Athens, Greece; Notification of Ineffective Security Measures

    Federal Register 2010, 2011, 2012, 2013, 2014

    1996-03-28

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Hellenikon International Airport, Athens, Greece; Notification of Ineffective... Republic of Greece that I had determined that Hellenikon International Airport, Athens, Greece, did...

  16. A voice password system for access security

    SciTech Connect

    Birnbaum, M.; Cohen, L.A.; Welsh, F.X.

    1986-09-01

    A voice password system for access security using speaker verification technology has been designed for use over dial-up telephone lines. The voice password system (VPS) can provide secure access to telephone networks, computers, rooms, and buildings. It also has application in office automation systems, electric funds transfer, and ''smart cards'' (interactive computers embedded in credit-card-sized packages). As increasing attention is focused on access security in the public, private, and government sectors, the voice password system can provide a timely solution to the security dilemma. The VPS uses modes of communication available to almost everyone (the human voice and the telephone). A user calls the VPS, enters his or her identification number (ID) by touch-tone telephone, and then speaks a password. This is usually a phrase or a sentence of about seven syllables. On initial calls, the VPS creates a model of the user's voice, called a reference template, and labels it with the caller's unique user ID. To gain access later, the user calls the system, enters the proper user ID, and speaks the password phrase. The VPS compares the user's stored reference template with the spoken password and produces a distance score.

  17. Airport Remote Tower Sensor Systems

    NASA Technical Reports Server (NTRS)

    Maluf, David A.; Gawdiak, Yuri; Leidichj, Christopher; Papasin, Richard; Tran, Peter B.; Bass, Kevin

    2006-01-01

    Networks of video cameras, meteorological sensors, and ancillary electronic equipment are under development in collaboration among NASA Ames Research Center, the Federal Aviation Administration (FAA), and the National Oceanic Atmospheric Administration (NOAA). These networks are to be established at and near airports to provide real-time information on local weather conditions that affect aircraft approaches and landings. The prototype network is an airport-approach-zone camera system (AAZCS), which has been deployed at San Francisco International Airport (SFO) and San Carlos Airport (SQL). The AAZCS includes remotely controlled color video cameras located on top of SFO and SQL air-traffic control towers. The cameras are controlled by the NOAA Center Weather Service Unit located at the Oakland Air Route Traffic Control Center and are accessible via a secure Web site. The AAZCS cameras can be zoomed and can be panned and tilted to cover a field of view 220 wide. The NOAA observer can see the sky condition as it is changing, thereby making possible a real-time evaluation of the conditions along the approach zones of SFO and SQL. The next-generation network, denoted a remote tower sensor system (RTSS), will soon be deployed at the Half Moon Bay Airport and a version of it will eventually be deployed at Los Angeles International Airport. In addition to remote control of video cameras via secure Web links, the RTSS offers realtime weather observations, remote sensing, portability, and a capability for deployment at remote and uninhabited sites. The RTSS can be used at airports that lack control towers, as well as at major airport hubs, to provide synthetic augmentation of vision for both local and remote operations under what would otherwise be conditions of low or even zero visibility.

  18. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  19. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  20. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  1. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  2. 14 CFR § 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Access to security areas. § 1203a.103 Section § 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor...

  3. 14 CFR 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Access to security areas. 1203a.103 Section 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor employees,...

  4. 14 CFR 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Access to security areas. 1203a.103 Section 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor employees,...

  5. 14 CFR 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Access to security areas. 1203a.103 Section 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor employees,...

  6. 14 CFR 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Access to security areas. 1203a.103 Section 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor employees,...

  7. Identity and Access Management and Security in Higher Education.

    ERIC Educational Resources Information Center

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  8. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., including, but not limited to, moving sidewalks, shuttle vehicles and people movers, comply with applicable requirements of the Department of Transportation's ADA rules (49 CFR parts 37 and 38). (4) Your contracts or... airport operator and in consultation with local service animal training organization(s), you must...

  9. 49 CFR 1548.15 - Access to cargo: Security threat assessments for individuals having unescorted access to cargo.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for... SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.15 Access to cargo: Security threat... must successfully complete a security threat assessment or comparable security threat...

  10. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... individuals authorized to have unescorted access to the secured area are able to gain entry; (2) Ensure...

  11. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured...

  12. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  13. The Battle to Secure Our Public Access Computers

    ERIC Educational Resources Information Center

    Sendze, Monique

    2006-01-01

    Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…

  14. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  15. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  16. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  17. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  18. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION AGENCY... Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access to restricted data and national security......

  19. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION AGENCY... Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access to restricted data and national security......

  20. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  1. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  2. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  3. Airport noise

    NASA Technical Reports Server (NTRS)

    Pendley, R. E.

    1982-01-01

    The problem of airport noise at several airports and air bases is detailed. Community reactions to the noise, steps taken to reduce jet engine noise, and the effect of airport use restrictions and curfews on air transportation are discussed. The adverse effect of changes in allowable operational noise on airport safety and altenative means for reducing noise pollution are considered. Community-airport relations and public relations are discussed.

  4. Quantum secured gigabit optical access networks.

    PubMed

    Fröhlich, Bernd; Dynes, James F; Lucamarini, Marco; Sharpe, Andrew W; Tam, Simon W-B; Yuan, Zhiliang; Shields, Andrew J

    2015-01-01

    Optical access networks connect multiple endpoints to a common network node via shared fibre infrastructure. They will play a vital role to scale up the number of users in quantum key distribution (QKD) networks. However, the presence of power splitters in the commonly used passive network architecture makes successful transmission of weak quantum signals challenging. This is especially true if QKD and data signals are multiplexed in the passive network. The splitter introduces an imbalance between quantum signal and Raman noise, which can prevent the recovery of the quantum signal completely. Here we introduce a method to overcome this limitation and demonstrate coexistence of multi-user QKD and full power data traffic from a gigabit passive optical network (GPON) for the first time. The dual feeder implementation is compatible with standard GPON architectures and can support up to 128 users, highlighting that quantum protected GPON networks could be commonplace in the future. PMID:26656307

  5. Quantum secured gigabit optical access networks

    NASA Astrophysics Data System (ADS)

    Fröhlich, Bernd; Dynes, James F.; Lucamarini, Marco; Sharpe, Andrew W.; Tam, Simon W.-B.; Yuan, Zhiliang; Shields, Andrew J.

    2015-12-01

    Optical access networks connect multiple endpoints to a common network node via shared fibre infrastructure. They will play a vital role to scale up the number of users in quantum key distribution (QKD) networks. However, the presence of power splitters in the commonly used passive network architecture makes successful transmission of weak quantum signals challenging. This is especially true if QKD and data signals are multiplexed in the passive network. The splitter introduces an imbalance between quantum signal and Raman noise, which can prevent the recovery of the quantum signal completely. Here we introduce a method to overcome this limitation and demonstrate coexistence of multi-user QKD and full power data traffic from a gigabit passive optical network (GPON) for the first time. The dual feeder implementation is compatible with standard GPON architectures and can support up to 128 users, highlighting that quantum protected GPON networks could be commonplace in the future.

  6. Quantum secured gigabit optical access networks

    PubMed Central

    Fröhlich, Bernd; Dynes, James F.; Lucamarini, Marco; Sharpe, Andrew W.; Tam, Simon W.-B.; Yuan, Zhiliang; Shields, Andrew J.

    2015-01-01

    Optical access networks connect multiple endpoints to a common network node via shared fibre infrastructure. They will play a vital role to scale up the number of users in quantum key distribution (QKD) networks. However, the presence of power splitters in the commonly used passive network architecture makes successful transmission of weak quantum signals challenging. This is especially true if QKD and data signals are multiplexed in the passive network. The splitter introduces an imbalance between quantum signal and Raman noise, which can prevent the recovery of the quantum signal completely. Here we introduce a method to overcome this limitation and demonstrate coexistence of multi-user QKD and full power data traffic from a gigabit passive optical network (GPON) for the first time. The dual feeder implementation is compatible with standard GPON architectures and can support up to 128 users, highlighting that quantum protected GPON networks could be commonplace in the future. PMID:26656307

  7. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... requirements of the Department of Transportation's ADA rules (49 CFR parts 37 and 38). (4) Your contracts or... terminal to which any passengers have access on May 13, 2009. The captioning must be high-contrast insofar... passengers with safety briefings, information, or entertainment that do not have high-contrast...

  8. 14 CFR 382.57 - What accessibility requirements apply to automated airport kiosks?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    .... Department of Justice's 2010 ADA Standards for Accessible Design, 28 CFR 35.104 (defining the “2010 Standards” for title II as the requirements set forth in appendices B and D to 36 CFR part 1191 and the requirements contained in 28 CFR 35.151) (hereinafter 2010 ADA Standards) must be provided. (3) Operable...

  9. Emotional Exhaustion and Job Satisfaction in Airport Security Officers – Work–Family Conflict as Mediator in the Job Demands–Resources Model

    PubMed Central

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD–R) model and using work–family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed. PMID:27242581

  10. Emotional Exhaustion and Job Satisfaction in Airport Security Officers - Work-Family Conflict as Mediator in the Job Demands-Resources Model.

    PubMed

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners' job performance. The present study bridges this research gap by applying the job demands-resources (JD-R) model and using work-family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD-R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed. PMID:27242581

  11. Airport Remote Tower Sensor Systems

    NASA Technical Reports Server (NTRS)

    Papasin, Richard; Gawdiak, Yuri; Maluf, David A.; Leidich, Christopher; Tran, Peter B.

    2001-01-01

    Remote Tower Sensor Systems (RTSS) are proof-of-concept prototypes being developed by NASA/Ames Research Center (NASA/ARC) with collaboration with the FAA (Federal Aviation Administration) and NOAA (National Oceanic Atmospheric Administration). RTSS began with the deployment of an Airport Approach Zone Camera System that includes real-time weather observations at San Francisco International Airport. The goal of this research is to develop, deploy, and demonstrate remotely operated cameras and sensors at several major airport hubs and un-towered airports. RTSS can provide real-time weather observations of airport approach zone. RTSS will integrate and test airport sensor packages that will allow remote access to realtime airport conditions and aircraft status.

  12. A Service Access Security Control Model in Cyberspace

    NASA Astrophysics Data System (ADS)

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  13. High-Performance Secure Database Access Technologies for HEP Grids

    SciTech Connect

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  14. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  15. Secure Payload Access to the International Space Station

    NASA Technical Reports Server (NTRS)

    Pitts, R. Lee; Reid, Chris

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  16. Conservation science in a terrorist age: the impact of airport security screening on the viability and DNA integrity of frozen felid spermatozoa.

    PubMed

    Gloor, Kayleen T; Winget, Doug; Swanson, William F

    2006-09-01

    In response to growing terrorism concerns, the Transportation Security Administration now requires that all checked baggage at U.S. airports be scanned through a cabinet x-ray system, which may increase risk of radiation damage to transported biologic samples and other sensitive genetic material. The objective of this study was to investigate the effect of these new airport security regulations on the viability and DNA integrity of frozen felid spermatozoa. Semen was collected from two domestic cats (Felis silvestris catus) and one fishing cat (Prionailurus viverrinus), cryopreserved in plastic freezing straws, and transferred into liquid nitrogen dry shippers for security screening. Treatment groups included frozen samples from each male scanned once or three times using a Transportation Security Administration-operated cabinet x-ray system, in addition to non-scanned samples (i.e., negative control) and samples previously scanned three times and exposed to five additional high-intensity x-ray bursts (i.e., positive control). Dosimeters placed in empty dry shippers were used to quantify radiation exposure. Following treatment, straws were thawed and spermatozoa analyzed for post-thaw motility (percentage motile and rate of progressive movement), acrosome status, and DNA integrity using single-cell gel electrophoresis (i.e., the comet assay). Dosimeter measurements determined that each airport screening procedure produced approximately 16 mrem of radiation exposure. Our results indicated that all levels of radiation exposure adversely affected (P < 0.05) post-thaw sperm motility, but the percentage of acrosome-intact spermatozoa did not differ (P > 0.05) among treatment groups. Results also showed that the amount of double-stranded DNA damage was greater (P < 0.05) in sperm samples from both cat species scanned three times compared to samples scanned once or negative controls. Findings suggest that new airport security measures may cause radiation-induced damage to

  17. 77 FR 16552 - Extension of Agency Information Collection Activity Under OMB Review: Maryland-Three Airports...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-21

    ... an individual to serve as an airport security coordinator at one of these three airports. DATES: Send... Maryland airports, or to serve as an airport security coordinator at one of these three airports. Abstract..., of the following collection of information on January 5, 2012, 77 FR 513. This collection...

  18. Hand geometry biometric device for secure access control

    SciTech Connect

    Colbert, C.; Moles, D.R. )

    1991-01-01

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Security Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.

  19. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS. PMID:23828650

  20. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a)...

  1. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a)...

  2. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a)...

  3. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted...

  4. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted...

  5. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted...

  6. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted...

  7. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted...

  8. Establishing a Secure Data Center with Remote Access: Preprint

    SciTech Connect

    Gonder, J.; Burton, E.; Murakami, E.

    2012-04-01

    Access to existing travel data is critical for many analysis efforts that lack the time or resources to support detailed data collection. High-resolution data sets provide particular value, but also present a challenge for preserving the anonymity of the original survey participants. To address this dilemma of providing data access while preserving privacy, the National Renewable Energy Laboratory and the U.S. Department of Transportation have launched the Transportation Secure Data Center (TSDC). TSDC data sets include those from regional travel surveys and studies that increasingly use global positioning system devices. Data provided by different collecting agencies varies with respect to formatting, elements included and level of processing conducted in support of the original purpose. The TSDC relies on a number of geospatial and other analysis tools to ensure data quality and to generate useful information outputs. TSDC users can access the processed data in two different ways. The first is by downloading summary results and second-by-second vehicle speed profiles (with latitude/longitude information removed) from a publicly-accessible website. The second method involves applying for a remote connection account to a controlled-access environment where spatial analysis can be conducted, but raw data cannot be removed.

  9. CONNECTICUT AIRPORTS

    EPA Science Inventory

    This is a 1:24,000-scale datalayer that includes all of the airports that appear on the U.S. Geological Survey (USGS) 7½ minute topographic quadrangle maps that cover the State of Connecticut. It includes the perimeter of airport, heliport, and seaplane landing areas as depicted...

  10. RDFacl: A Secure Access Control Model Based on RDF Triple

    NASA Astrophysics Data System (ADS)

    Kim, Jaehoon; Park, Seog

    An expectation for more intelligent Web is recently being reflected through the new research field called Semantic Web. In this paper, related with Semantic Web security, we introduce an RDF triple based access control model having explicit authorization propagation by inheritance and implicit authorization propagation by inference. Especially, we explain an authorization conflict problem between the explicit and the implicit authorization propagation, which is an important concept in access control for Semantic Web. We also propose a novel conflict detection algorithm using graph labeling techniques in order to efficiently find authorization conflicts. Some experimental results show that the proposed detection algorithm has much better performance than the existing detection algorithm when data size and number of specified authorizations become larger.

  11. Aeronautical Mobile Airport Communications System (AeroMACS)

    NASA Technical Reports Server (NTRS)

    Budinger, James M.; Hall, Edward

    2011-01-01

    To help increase the capacity and efficiency of the nation s airports, a secure wideband wireless communications system is proposed for use on the airport surface. This paper provides an overview of the research and development process for the Aeronautical Mobile Airport Communications System (AeroMACS). AeroMACS is based on a specific commercial profile of the Institute of Electrical and Electronics Engineers (IEEE) 802.16 standard known as Wireless Worldwide Interoperability for Microwave Access or WiMAX (WiMax Forum). The paper includes background on the need for global interoperability in air/ground data communications, describes potential AeroMACS applications, addresses allocated frequency spectrum constraints, summarizes the international standardization process, and provides findings and recommendations from the world s first AeroMACS prototype implemented in Cleveland, Ohio, USA.

  12. 10 CFR 110.121 - Security clearances and access to classified information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security clearances and access to classified information... EQUIPMENT AND MATERIAL Special Procedures for Classified Information in Hearings § 110.121 Security clearances and access to classified information. (a) No person without a security clearance will have...

  13. 10 CFR 110.121 - Security clearances and access to classified information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security clearances and access to classified information... EQUIPMENT AND MATERIAL Special Procedures for Classified Information in Hearings § 110.121 Security clearances and access to classified information. (a) No person without a security clearance will have...

  14. 10 CFR 110.121 - Security clearances and access to classified information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security clearances and access to classified information... EQUIPMENT AND MATERIAL Special Procedures for Classified Information in Hearings § 110.121 Security clearances and access to classified information. (a) No person without a security clearance will have...

  15. 10 CFR 110.121 - Security clearances and access to classified information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security clearances and access to classified information... EQUIPMENT AND MATERIAL Special Procedures for Classified Information in Hearings § 110.121 Security clearances and access to classified information. (a) No person without a security clearance will have...

  16. 10 CFR 110.121 - Security clearances and access to classified information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security clearances and access to classified information... EQUIPMENT AND MATERIAL Special Procedures for Classified Information in Hearings § 110.121 Security clearances and access to classified information. (a) No person without a security clearance will have...

  17. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security...

  18. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security...

  19. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security...

  20. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security...

  1. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security...

  2. 76 FR 5058 - Airports of Entry or Departure for Flights to and From Cuba

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-28

    ...Under Department of Homeland Security (DHS) regulations, direct flights between the United States and Cuba must arrive at or depart from one of three named U.S. airports: John F. Kennedy International Airport, Los Angeles International Airport, or Miami International Airport. This document amends current DHS regulations to allow additional U.S. airports that are able to process international......

  3. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis

    PubMed Central

    2011-01-01

    Background The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Methods Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with metal detectors (n = 106), and MRI radiographers who work with MRI (n = 193), were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Results Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. Conclusions These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF. PMID:22070906

  4. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Restricting access to select agents and toxins; security risk assessments. 73.10 Section 73.10 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES QUARANTINE, INSPECTION, LICENSING SELECT AGENTS AND TOXINS § 73.10 Restricting access to select agents and toxins; security...

  5. 76 FR 49503 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Airport Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-10

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request Renewal From OMB of One Current Public... approximately 535,705 hours per year to process. The current estimated annual burden is 535,705 hours...

  6. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 7 2012-10-01 2012-10-01 false Security requirements for access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470 Section 3004.470 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR)...

  7. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Security requirements for access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470 Section 3004.470 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR)...

  8. Restricted access processor - An application of computer security technology

    NASA Technical Reports Server (NTRS)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  9. 77 FR 17492 - Expansion of Global Entry to Additional Airports

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-26

    ... selection process, and the initial airport locations. See 77 FR 5681 and 8 CFR 235.12. Travelers who wish to... SECURITY U.S. Customs and Border Protection Expansion of Global Entry to Additional Airports AGENCY: U.S.... This document announces the expansion of the program to include four additional airports. DATES:...

  10. Guidelines to improve airport preparedness against chemical and biological terrorism.

    SciTech Connect

    Edwards, Donna M.; Price, Phillip N.; Gordon, Susanna P.; Gadgil, Ashok

    2005-05-01

    Guidelines to Improve Airport Preparedness Against Chemical and Biological Terrorism is a 100-page document that makes concrete recommendations on improving security and assessing vulnerable areas and helps its readers understand the nature of chemical and biological attacks. The report has been turned over to Airports Council International (ACI) and the American Association of Airport Executives (AAAE), two organizations that together represent the interests of thousands of airport personnel and facilities in the U.S. and around the world.

  11. Airport Surface Network Architecture Definition

    NASA Technical Reports Server (NTRS)

    Nguyen, Thanh C.; Eddy, Wesley M.; Bretmersky, Steven C.; Lawas-Grodek, Fran; Ellis, Brenda L.

    2006-01-01

    Currently, airport surface communications are fragmented across multiple types of systems. These communication systems for airport operations at most airports today are based dedicated and separate architectures that cannot support system-wide interoperability and information sharing. The requirements placed upon the Communications, Navigation, and Surveillance (CNS) systems in airports are rapidly growing and integration is urgently needed if the future vision of the National Airspace System (NAS) and the Next Generation Air Transportation System (NGATS) 2025 concept are to be realized. To address this and other problems such as airport surface congestion, the Space Based Technologies Project s Surface ICNS Network Architecture team at NASA Glenn Research Center has assessed airport surface communications requirements, analyzed existing and future surface applications, and defined a set of architecture functions that will help design a scalable, reliable and flexible surface network architecture to meet the current and future needs of airport operations. This paper describes the systems approach or methodology to networking that was employed to assess airport surface communications requirements, analyze applications, and to define the surface network architecture functions as the building blocks or components of the network. The systems approach used for defining these functions is relatively new to networking. It is viewing the surface network, along with its environment (everything that the surface network interacts with or impacts), as a system. Associated with this system are sets of services that are offered by the network to the rest of the system. Therefore, the surface network is considered as part of the larger system (such as the NAS), with interactions and dependencies between the surface network and its users, applications, and devices. The surface network architecture includes components such as addressing/routing, network management, network

  12. English for Airport Ground Staff

    ERIC Educational Resources Information Center

    Cutting, Joan

    2012-01-01

    This article describes part of a European Commission Leonardo project that aimed to design a multimedia course for English language learners seeking work as ground staff in European airports. The structural-functional analysis of the dialogues written from the course showed that, across the four trades explored (security guards, ground handlers,…

  13. 47 CFR 76.1204 - Availability of equipment performing conditional access or security functions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Competitive... security functions. (a)(1) A multichannel video programming distributor that utilizes navigation devices to... access functions of such devices. Commencing on July 1, 2007, no multichannel video...

  14. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  15. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR DISCLOSURE OF MATERIAL OR INFORMATION Exemption of Records Systems Under the Privacy Act § 16.74 Exemption of National Security...

  16. Implementing Solar Technologies at Airports

    SciTech Connect

    Kandt, A.; Romero, R.

    2014-07-01

    Federal agencies, such as the Department of Defense and Department of Homeland Security, as well as numerous private entities are actively pursuing the installation of solar technologies to help reduce fossil fuel energy use and associated emissions, meet sustainability goals, and create more robust or reliable operations. One potential approach identified for siting solar technologies is the installation of solar energy technologies at airports and airfields, which present a significant opportunity for hosting solar technologies due to large amounts of open land. This report focuses largely on the Federal Aviation Administration's (FAA's) policies toward siting solar technologies at airports.

  17. Whiffing the Airport Interview

    ERIC Educational Resources Information Center

    Williamson, David

    2008-01-01

    An airport interview is an initial interview for a senior administrative position conducted at an airport hotel not too far from the campus in question. Meeting at an airport enables a search committee to interview a large number of candidates in a short period of time with a degree of confidentiality. At the conclusion of the airport interviews,…

  18. A Delicate Balance: National Security vs. Public Access

    ERIC Educational Resources Information Center

    Klein, Bonnie; Schwalb, Sandy

    2005-01-01

    Sometimes people want to see data that the government thinks should be kept under wraps. How does the Department of Defense balance the scales of justice while still ensuring information security? In the aftermath of September 11, 2001, the Defense Technical Information Center (DTIC) found itself in the spotlight as journalists, academics, and…

  19. 49 CFR 1560.111 - Covered airport operators.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Covered airport operators. 1560.111 Section 1560.111 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY... Transmission of Secure Flight Passenger Data for Watch List Matching § 1560.111 Covered airport operators....

  20. 49 CFR 1560.111 - Covered airport operators.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Covered airport operators. 1560.111 Section 1560.111 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY... Transmission of Secure Flight Passenger Data for Watch List Matching § 1560.111 Covered airport operators....

  1. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... measures for access control. (a) General. The facility owner or operator must ensure the implementation...

  2. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... measures for access control. (a) General. The facility owner or operator must ensure the implementation...

  3. Secure Web-Site Access with Tickets and Message-Dependent Digests

    USGS Publications Warehouse

    Donato, David I.

    2008-01-01

    Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.

  4. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access to cargo: Security threat assessments for cargo personnel in the United States. 1546.213 Section 1546.213 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR...

  5. Climate Change and Global Food Security: Food Access, Utilization, and the US Food System

    NASA Astrophysics Data System (ADS)

    Brown, M. E.; Antle, J. M.; Backlund, P. W.; Carr, E. R.; Easterling, W. E.; Walsh, M.; Ammann, C. M.; Attavanich, W.; Barrett, C. B.; Bellemare, M. F.; Dancheck, V.; Funk, C.; Grace, K.; Ingram, J. S. I.; Jiang, H.; Maletta, H.; Mata, T.; Murray, A.; Ngugi, M.; Ojima, D. S.; O'Neill, B. C.; Tebaldi, C.

    2015-12-01

    This paper will summarize results from the USDA report entitled 'Climate change, Global Food Security and the U.S. Food system'. The report focuses on the impact of climate change on global food security, defined as "when all people at all times have physical, social, and economic access to sufficient, safe, and nutritious food to meet their dietary needs and food preferences for an active and healthy life". The assessment brought together authors and contributors from twenty federal, academic, nongovernmental, intergovernmental, and private organizations in four countries to identify climate change effects on food security through 2100, and analyze the U.S.'s likely connections with that world. This talk will describe how climate change will likely affect food access and food utilization, and summarize how the U.S. food system contributes to global food security, and will be affected by climate change.

  6. Productivity Analysis of Public and Private Airports: A Causal Investigation

    NASA Technical Reports Server (NTRS)

    Vasigh, Bijan; Gorjidooz, Javad

    2007-01-01

    Around the world, airports are being viewed as enterprises, rather than public services, which are expected to be managed efficiently and provide passengers with courteous customer services. Governments are, increasingly, turning to the private sectors for their efficiency in managing the operation, financing, and development, as well as providing security for airports. Operational and financial performance evaluation has become increasingly important to airport operators due to recent trends in airport privatization. Assessing performance allows the airport operators to plan for human resources and capital investment as efficiently as possible. Productivity measurements may be used as comparisons and guidelines in strategic planning, in the internal analysis of operational efficiency and effectiveness, and in assessing the competitive position of an airport in transportation industry. The primary purpose of this paper is to investigate the operational and financial efficiencies of 22 major airports in the United States and Europe. These airports are divided into three groups based on private ownership (7 British Airport Authority airports), public ownership (8 major United States airports), and a mix of private and public ownership (7 major European Union airports. The detail ownership structures of these airports are presented in Appendix A. Total factor productivity (TFP) model was utilized to measure airport performance in terms of financial and operational efficiencies and to develop a benchmarking tool to identify the areas of strength and weakness. A regression model was then employed to measure the relationship between TFP and ownership structure. Finally a Granger causality test was performed to determine whether ownership structure is a Granger cause of TFP. The results of the analysis presented in this paper demonstrate that there is not a significant relationship between airport TFP and ownership structure. Airport productivity and efficiency is

  7. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-07-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  8. Experimental realization of an entanglement access network and secure multi-party computation

    PubMed Central

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  9. Experimental realization of an entanglement access network and secure multi-party computation.

    PubMed

    Chang, X-Y; Deng, D-L; Yuan, X-X; Hou, P-Y; Huang, Y-Y; Duan, L-M

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  10. A human engineering and ergonomic evaluation of the security access panel interface

    SciTech Connect

    Hartney, C.; Banks, W.W.

    1995-02-01

    The purpose of this study was to empirically determine which of several security hardware interface designs produced the highest levels of end-user performance and acceptance. The FESSP Security Alarms and Monitoring Systems program area commissioned the authors study as decision support for upgrading the Argus security system`s primary user interface so that Argus equipment will support the new DOE and DoD security access badges. Twenty-two test subjects were repeatedly tested using six remote access panel (RAP) designs. Lawrence Livermore National Laboratory (LLNL) uses one of these interface designs in its security access booths. Along with the RAP B insert-style reader, the authors tested five prototype RAP variants, each with a different style of swipe badge reader, through which a badge is moved or swiped. The authors asked the untrained test subjects to use each RAP while they described how they thought they should respond so that the system would operate correctly in reading the magnetic strip on a security badge. With each RAP variant, subjects were required to make four successful card reads (swipes) in which the card reader correctly read and logged the transaction. After each trial, a subject completed a 10-item interface acceptance evaluation before approaching the next RAP. After interacting with the RAP interfaces (for a total of the six RAP trials), each subject completed a 7-item overview evaluation that compared and ranked the five experimental RAPs, using the original (RAP B) insert style as a standard.

  11. K-12 access to internet: Securing the legal framework

    NASA Astrophysics Data System (ADS)

    Blauassociate, Andrew

    1993-09-01

    While many people in government, education, and industry have lauded the potential educational value of Internet access for students in grades K-12, there is as yet no legal or regulatory framework within which this new medium is being offered to students. The Communications Policy Forum, a nonpartisan project of the Electronic Frontier Foundation, recently convened a roundtable to discuss some of the legal issues that arise when K-12 schools provide Internet access to their students. Approximately 15 people, representing carriers who provide connections to the Internet, schools or school systems who are connected to the Internet, and legal experts with expertise in this and related areas, met to discuss questions of legal liability as this new medium enters an educational setting for minors. The following attempts to capture the major issues, suggestions, and directions for further collaborative efforts raised during the course of that discussion. In brief, the group identified statutory language aimed at other types of electronic communication that may offer some guidance; was briefed on a host of state laws that could be used to prosecute providers of certain materials found on the Internet; and concluded that there is no case law that clearly applies to this setting. The discussion revealed an interest in anticipating issues and developing responses before problems arose, and the need for shared approaches to allow carriers to move forward in serving and expanding this field. Members of the group offered to pursue these issues jointly and agreed upon a handful of concrete steps for further exploration and discussion.

  12. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    NASA Astrophysics Data System (ADS)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  13. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Restricting access to select agents and toxins; security risk assessments. 121.10 Section 121.10 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE VIRUSES, SERUMS, TOXINS, AND ANALOGOUS PRODUCTS; ORGANISMS AND VECTORS POSSESSION, USE,...

  14. Securing TCP/IP and Dial-up Access to Administrative Data.

    ERIC Educational Resources Information Center

    Conrad, L. Dean

    1992-01-01

    This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…

  15. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    ERIC Educational Resources Information Center

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  16. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 9 Animals and Animal Products 1 2012-01-01 2012-01-01 false Restricting access to select agents and toxins; security risk assessments. 121.10 Section 121.10 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE VIRUSES, SERUMS, TOXINS, AND ANALOGOUS PRODUCTS; ORGANISMS AND VECTORS POSSESSION, USE,...

  17. 47 CFR 76.1204 - Availability of equipment performing conditional access or security functions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... security functions. (a)(1) A multichannel video programming distributor that utilizes navigation devices to... access functions of such devices. Commencing on July 1, 2007, no multichannel video programming... requirement shall not apply to a multichannel video programming distributor that supports the active use...

  18. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo and cargo screening: Security... COMMERCIAL OPERATORS Operations § 1544.228 Access to cargo and cargo screening: Security threat assessments... authorizes to screen cargo or to supervise the screening of cargo under § 1544.205....

  19. 49 CFR 27.71 - Airport facilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Access Act rules (49 CFR part 382) for carriers. (g) If an airport operator who receives Federal... 305 of the U.S. Department of Justice's 2010 ADA Standards for Accessible Design, 28 CFR 35.104 (defining the “2010 Standards” for title II as the requirements set forth in appendices B and D to 36...

  20. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for...: Security threat assessments for cargo personnel in the United States. This section applies in the United...— (1) Each individual must successfully complete a security threat assessment or comparable...

  1. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access to cargo and cargo screening: Security threat assessments for cargo personnel in the United States. 1544.228 Section 1544.228 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  2. 17 CFR 256.310 - Aircraft and airport equipment.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Aircraft and airport equipment... UTILITY HOLDING COMPANY ACT OF 1935 Service Company Property Accounts § 256.310 Aircraft and airport equipment. This account shall include the delivered cost of all service company owned aircraft...

  3. Inguinal Hernia and Airport Scanners: An Emerging Indication for Repair?

    PubMed Central

    Cawich, Shamir O.; Maharaj, Ravi; Dan, Dilip

    2013-01-01

    The use of advanced imaging technology at international airports is increasing in popularity as a corollary to heightened security concerns across the globe. Operators of airport scanners should be educated about common medical disorders such as inguinal herniae in order to avoid unnecessary harassment of travelers since they will encounter these with increasing frequency. PMID:24368923

  4. 19 CFR 122.12 - Operation of international airports.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Administration in 14 CFR part 91. (2) Customs and Border Protection. CBP, based on security or other risk... 19 Customs Duties 1 2012-04-01 2012-04-01 false Operation of international airports. 122.12...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.12 Operation of...

  5. 19 CFR 122.12 - Operation of international airports.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Administration in 14 CFR part 91. (2) Customs and Border Protection. CBP, based on security or other risk... 19 Customs Duties 1 2010-04-01 2010-04-01 false Operation of international airports. 122.12...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.12 Operation of...

  6. 19 CFR 122.12 - Operation of international airports.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Administration in 14 CFR part 91. (2) Customs and Border Protection. CBP, based on security or other risk... 19 Customs Duties 1 2011-04-01 2011-04-01 false Operation of international airports. 122.12...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.12 Operation of...

  7. 19 CFR 122.12 - Operation of international airports.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Administration in 14 CFR part 91. (2) Customs and Border Protection. CBP, based on security or other risk... 19 Customs Duties 1 2014-04-01 2014-04-01 false Operation of international airports. 122.12...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.12 Operation of...

  8. 19 CFR 122.12 - Operation of international airports.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Administration in 14 CFR part 91. (2) Customs and Border Protection. CBP, based on security or other risk... 19 Customs Duties 1 2013-04-01 2013-04-01 false Operation of international airports. 122.12...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.12 Operation of...

  9. 17 CFR 256.310 - Aircraft and airport equipment.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Aircraft and airport equipment... UTILITY HOLDING COMPANY ACT OF 1935 Service Company Property Accounts § 256.310 Aircraft and airport equipment. This account shall include the delivered cost of all service company owned aircraft...

  10. Airport Choice in Sao Paulo Metropolitan Area: An Application of the Conditional Logit Model

    NASA Technical Reports Server (NTRS)

    Moreno, Marcelo Baena; Muller, Carlos

    2003-01-01

    Using the conditional LOGIT model, this paper addresses the airport choice in the Sao Paulo Metropolitan Area. In this region, Guarulhos International Airport (GRU) and Congonhas Airport (CGH) compete for passengers flying to several domestic destinations. The airport choice is believed to be a result of the tradeoff passengers perform considering airport access characteristics, airline level of service characteristics and passenger experience with the analyzed airports. It was found that access time to the airports better explain the airport choice than access distance, whereas direct flight frequencies gives better explanation to the airport choice than the indirect (connections and stops) and total (direct plus indirect) flight frequencies. Out of 15 tested variables, passenger experience with the analyzed airports was the variable that best explained the airport choice in the region. Model specifications considering 1, 2 or 3 variables were tested. The model specification most adjusted to the observed data considered access time, direct flight frequencies in the travel period (morning or afternoon peak) and passenger experience with the analyzed airports. The influence of these variables was therefore analyzed across market segments according to departure airport and flight duration criteria. The choice of GRU (located neighboring Sao Paulo city) is not well explained by the rationality of access time economy and the increase of the supply of direct flight frequencies, while the choice of CGH (located inside Sao Paulo city) is. Access time was found to be more important to passengers flying shorter distances while direct flight frequencies in the travel period were more significant to those flying longer distances. Keywords: Airport choice, Multiple airport region, Conditional LOGIT model, Access time, Flight frequencies, Passenger experience with the analyzed airports, Transportation planning

  11. An efficient and secure attribute based signcryption scheme with LSSS access structure.

    PubMed

    Hong, Hanshu; Sun, Zhixin

    2016-01-01

    Attribute based encryption (ABE) and attribute based signature (ABS) provide flexible access control with authentication for data sharing between users, but realizing both functions will bring about too much computation burden. In this paper, we combine the advantages of CP-ABE with ABS and propose a ciphertext policy attribute based signcryption scheme. In our scheme, only legal receivers can decrypt the ciphertext and verify the signature signed by data owner. Furthermore, we use linear secret sharing scheme instead of tree structure to avoid the frequent calls of recursive algorithm. By security and performance analysis, we prove that our scheme is secure as well as gains higher efficiency. PMID:27330910

  12. Catheter Securement Systems for Peripherally Inserted and Nontunneled Central Vascular Access Devices

    PubMed Central

    Krenik, Karen M.; Smith, Graham E.

    2016-01-01

    Sutureless catheter securement systems are intended to eliminate risks associated with sutures. The clinical acceptability of a novel system was investigated compared with the current method of securement for peripherally inserted central catheters (19 facilities using StatLock or sutures) or nontunneled central vascular access devices (3 facilities using StatLock or sutures or HubGuard + Sorbaview Shield). More than 94% of respondents rated the novel system as same, better, or much better than their current product. More than 82% of respondents were willing to replace their current system with the new one. PMID:27379679

  13. Toward Federated Security and Data Access Control within a Services Oriented Architecture for Publishing Hydrologic Data

    NASA Astrophysics Data System (ADS)

    Horsburgh, J. S.; Tarboton, D. G.; Schreuders, K.; Patil, K. S.

    2010-12-01

    , while restricting access to preliminary or raw versions of the data; and 6) integrate data organization, management, and publication rather than maintaining separate systems for each of these functions. To address the need for controlling access to data within the CUAHSI HIS, we describe the design for new HydroServer functionality for enabling security and access control via the existing HIS services oriented architecture. This design addresses the significant challenges of identity management, authorization, and access control for hydrologic data resources hosted on separate HydroServers that make up a federated, web service-based data publication system. The core of this new security extension is a new security web service and a related database where local HydroServer managers and their delegates determine the exact access allowed for their own data. We invite input and feedback from the Hydrologic Science Community in meeting the specific needs for data security and access control. Details of the CUAHSI HIS can be found at http://his.cuahsi.org, and details of the design for security and data access control can be found on the HydroServer collaboration site http://hydroserver.codeplex.com.

  14. On the Evaluation of a Secure Solution to Access 802.11 Networks

    NASA Astrophysics Data System (ADS)

    da Costa, Fernando; Gaspary, Luciano; Barbosa, Jorge; Cavalheiro, Gerson; Pfitscher, Luciano; Ramos, José Dirceu G.

    Despite offering the possibility to develop and distribute a new set of applications to its users, the widespread and unrestricted use of mobile computing depends on the provisioning of a secure network environment. Regarding the communication established from mobile devices such as PDAs (Personal Digital Assistants), one of the most currently used standards is the IEEE 802.11b, which presents known security flaws. To overcome them, some alternative setups are commonly deployed, based on link, network, transport or application-layer. In this paper we evaluate the impact on data reception rate and energy consumption of IPSec-based PDAs access to 802.11b (WiFi) wireless LANs. As a result of this work we identify the overhead imposed by the security mechanisms and the capacity of the device to run CPU and network-intensive applications.

  15. Isolated user security enhancement in optical code division multiple access network against eavesdropping

    NASA Astrophysics Data System (ADS)

    Jyoti, Vishav; Kaler, Rajinder Singh

    2012-09-01

    A novel virtual user system is modeled for enhancing the security of an optical code division multiple access (OCDMA) network. Although the OCDMA system implementing code shift keying (CSK) is secure against a conventional power detector, it is susceptible to differential eavesdropping. An analytical framework is developed for the CSK-OCDMA system to show eavesdropper's code interception performance for a single transmitting user in the presence of a virtual user. It is shown that the eavesdropper's probability of correct bit interception decreases from 7.1×10-1 to 1.85×10-5 with the inclusion of the virtual user. Furthermore, the results confirm that the proposed virtual user scheme increases the confidentiality of the CSK-OCDMA system and outperforms the conventional OCDMA scheme in terms of security.

  16. Joint robustness security in optical OFDM access system with Turbo-coded subcarrier rotation.

    PubMed

    Zhang, Lijia; Liu, Bo; Xin, Xiangjun; Wang, Yongjun

    2015-01-12

    This paper proposes a novel robust physical secure method for optical orthogonal frequency division multiplexing (OFDM) access system based on Turbo-coded subcarrier rotation. It can realize a secure communication while keep robustness to channel noise. The subcarrier rotation is controlled by the interleaver module of Turbo coding, which is under the charge of Logistic map. The random puncturing can further enhance the security. The channel feedback can ensure the puncturing module working at a suitable coding rate. A 72.28 Gb/s encrypted 16QAM-OFDM signal is successfully demonstrated in the experiment. The results show robust performance under different channel noise conditions and good resistance to illegal optical network unit (ONU). PMID:25835649

  17. Efforts to secure universal access to HIV/AIDS treatment: a comparison of BRICS countries.

    PubMed

    Sun, Jing; Boing, Alexandra Crispim; Silveira, Marysabel P T; Bertoldi, Andréa D; Ziganshina, Liliya E; Khaziakhmetova, Veronica N; Khamidulina, Rashida M; Chokshi, Maulik R; McGee, Shelley; Suleman, Fatima

    2014-02-01

    This article illustrates how the BRICS countries have been building their focused leadership, making important high level commitment and national policy changes, and improving their health systems, in addressing the HIV/AIDS epidemics in respective settings. Specific aspects are focused on efforts of creating public provisions to secure universal access to ARVs from the aspects of active responsive system and national program, health system strengthening, fostering local production of ARVs, supply chain management, and information system strengthening. Challenges in each BRICS country are analyzed respectively. The most important contributors to the success of response to HIV/AIDS include: creating legal basis for healthcare as a fundamental human right; political commitment to necessary funding for universal access and concrete actions to secure equal quality care; comprehensive system to secure demands that all people in need are capable of accessing prevention, treatment and care; active community involvement; decentralization of the management system considering the local settings; integration of treatment and prevention; taking horizontal approach to strengthen health systems; fully use of the TRIPS flexibility; and regular monitoring and evaluation to serve evidence based decision making. PMID:25155561

  18. Security of social network credentials for accessing course portal: Users' experience

    NASA Astrophysics Data System (ADS)

    Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee

    2015-12-01

    Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.

  19. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  20. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  1. New MagViz Airport Liquid Analysis System Undergoes Testing

    SciTech Connect

    2008-12-18

    LOS ALAMOS, New Mexico, December 16, 2008—An innovative application of a technology first used for medical imaging may enhance airport security if Los Alamos National Laboratory scientists are successful. Los Alamos technologists have adapted Magnetic Res

  2. New MagViz Airport Liquid Analysis System Undergoes Testing

    ScienceCinema

    None

    2010-01-08

    LOS ALAMOS, New Mexico, December 16, 2008?An innovative application of a technology first used for medical imaging may enhance airport security if Los Alamos National Laboratory scientists are successful. Los Alamos technologists have adapted Magnetic Res

  3. Applying the Earth System Grid Security System in a Heterogeneous Environment of Data Access Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Lawrence, Bryan; Lowe, Dominic; Norton, Peter; Pascoe, Stephen

    2010-05-01

    CEDA (Centre for Environmental Data Archival) based at STFC Rutherford Appleton Laboratory is host to the BADC (British Atmospheric Data Centre) and NEODC (NERC Earth Observation Data Centre) with data holdings of over half a Petabyte. In the coming months this figure is set to increase by over one Petabyte through the BADC's role as one of three data centres to host the CMIP5 (Coupled Model Intercomparison Project Phase 5) core archive of climate model data. Quite apart from the problem of managing the storage of such large volumes there is the challenge of collating the data together from the modelling centres around the world and enabling access to these data for the user community. An infrastructure to support this is being developed under the US Earth System Grid (ESG) and related projects bringing together participating organisations together in a federation. The ESG architecture defines Gateways, the web interfaces that enable users to access data and data serving applications organised into Data Nodes. The BADC has been working in collaboration with US Earth System Grid team and other partners to develop a security system to restrict access to data. This provides single sign-on via both OpenID and PKI based means and uses role based authorisation facilitated by SAML and OpenID based interfaces for attribute retrieval. This presentation will provide an overview of the access control architecture and look at how this has been implemented for CEDA. CEDA has developed an expertise in data access and information services over several years through a number of projects to develop and enhance these capabilities. Participation in CMIP5 comes at a time when a number of other software development activities are coming to fruition. New services are in the process of being deployed alongside services making up the system for ESG. The security system must apply access control across this heterogeneous environment of different data services and technologies. One strand

  4. New Advanced Technologies to Provide Decentralised and Secure Access to Medical Records: Case Studies in Oncology

    PubMed Central

    Quantin, Catherine; Coatrieux, Gouenou; Allaert, François André; Fassa, Maniane; Bourquard, Karima; Boire, Jean-Yves; de Vlieger, Paul; Maigne, Lydia; Breton, Vincent

    2009-01-01

    The main problem for health professionals and patients in accessing information is that this information is very often distributed over many medical records and locations. This problem is particularly acute in cancerology because patients may be treated for many years and undergo a variety of examinations. Recent advances in technology make it feasible to gain access to medical records anywhere and anytime, allowing the physician or the patient to gather information from an “ephemeral electronic patient record”. However, this easy access to data is accompanied by the requirement for improved security (confidentiality, traceability, integrity, ...) and this issue needs to be addressed. In this paper we propose and discuss a decentralised approach based on recent advances in information sharing and protection: Grid technologies and watermarking methodologies. The potential impact of these technologies for oncology is illustrated by the examples of two experimental cases: a cancer surveillance network and a radiotherapy treatment plan. It is expected that the proposed approach will constitute the basis of a future secure “google-like” access to medical records. PMID:19718446

  5. Benchmark Airport Charges

    NASA Technical Reports Server (NTRS)

    de Wit, A.; Cohn, N.

    1999-01-01

    The Netherlands Directorate General of Civil Aviation (DGCA) commissioned Hague Consulting Group (HCG) to complete a benchmark study of airport charges at twenty eight airports in Europe and around the world, based on 1996 charges. This study followed previous DGCA research on the topic but included more airports in much more detail. The main purpose of this new benchmark study was to provide insight into the levels and types of airport charges worldwide and into recent changes in airport charge policy and structure. This paper describes the 1996 analysis. It is intended that this work be repeated every year in order to follow developing trends and provide the most up-to-date information possible.

  6. Benchmark Airport Charges

    NASA Technical Reports Server (NTRS)

    deWit, A.; Cohn, N.

    1999-01-01

    The Netherlands Directorate General of Civil Aviation (DGCA) commissioned Hague Consulting Group (HCG) to complete a benchmark study of airport charges at twenty eight airports in Europe and around the world, based on 1996 charges. This study followed previous DGCA research on the topic but included more airports in much more detail. The main purpose of this new benchmark study was to provide insight into the levels and types of airport charges worldwide and into recent changes in airport charge policy and structure, This paper describes the 1996 analysis. It is intended that this work be repeated every year in order to follow developing trends and provide the most up-to-date information possible.

  7. A secure WDM ring access network employing silicon micro-ring based remote node

    NASA Astrophysics Data System (ADS)

    Sung, Jiun-Yu; Chow, Chi-Wai; Yeh, Chien-Hung; Xu, Ke; Hsu, Chin-Wei; Su, Hong-Quan; Tsang, Hon-Ki

    2014-08-01

    A secure and scalable wavelength-division-multiplexing (WDM) ring-based access network is proposed and demonstrated using proof-of-concept experiments. In the remote node (RN), wavelength hopping for specific optical networking unit (ONU) is deployed by using silicon micro-ring resonators (SMR). Using silicon-based devices could be cost-effective for the cost-sensitive access network. Hence the optical physical layer security is introduced. The issues of denial of service (DOS) attacks, eavesdropping and masquerading can be made more difficult in the proposed WDM ring-based access network. Besides, the SMRs with different dropped wavelengths can be cascaded, such that the signals pass through the preceding SMRs can be dropped by a succeeding SMR. This can increase the scalability of the RN for supporting more ONUs for future upgrade. Here, error-free 10 Gb/s downlink and 1.25 Gb/s uplink transmission are demonstrated to show the feasibility of the proposed network.

  8. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area....

  9. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Security and Emergency Preparedness (NSEP) B Appendix B to Part 64 Telecommunication FEDERAL COMMUNICATIONS.... 64, App. B Appendix B to Part 64—Priority Access Service (PAS) for National Security and Emergency...'s Order to CMRS providers and users to comply with policies and procedures establishing the...

  10. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Security and Emergency Preparedness (NSEP) B Appendix B to Part 64 Telecommunication FEDERAL COMMUNICATIONS.... 64, App. B Appendix B to Part 64—Priority Access Service (PAS) for National Security and Emergency...'s Order to CMRS providers and users to comply with policies and procedures establishing the...

  11. 75 FR 5609 - Privacy Act of 1974; Department of Homeland Security/ALL-024 Facility and Perimeter Access...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-03

    ...In accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to update and reissue Department of Homeland Security/ALL--024 Facility and Perimeter Access Control and Visitor Management System of Records to include record systems within the Federal Protective Service. Categories of individuals, categories of records, purpose and routine uses of this system have been......

  12. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    NASA Astrophysics Data System (ADS)

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  13. Access and privacy rights using web security standards to increase patient empowerment.

    PubMed

    Falcão-Reis, Filipa; Costa-Pereira, Altamiro; Correia, Manuel E

    2008-01-01

    Electronic Health Record (EHR) systems are becoming more and more sophisticated and include nowadays numerous applications, which are not only accessed by medical professionals, but also by accounting and administrative personnel. This could represent a problem concerning basic rights such as privacy and confidentiality. The principles, guidelines and recommendations compiled by the OECD protection of privacy and trans-border flow of personal data are described and considered within health information system development. Granting access to an EHR should be dependent upon the owner of the record; the patient: he must be entitled to define who is allowed to access his EHRs, besides the access control scheme each health organization may have implemented. In this way, it's not only up to health professionals to decide who have access to what, but the patient himself. Implementing such a policy is walking towards patient empowerment which society should encourage and governments should promote. The paper then introduces a technical solution based on web security standards. This would give patients the ability to monitor and control which entities have access to their personal EHRs, thus empowering them with the knowledge of how much of his medical history is known and by whom. It is necessary to create standard data access protocols, mechanisms and policies to protect the privacy rights and furthermore, to enable patients, to automatically track the movement (flow) of their personal data and information in the context of health information systems. This solution must be functional and, above all, user-friendly and the interface should take in consideration some heuristics of usability in order to provide the user with the best tools. The current official standards on confidentiality and privacy in health care, currently being developed within the EU, are explained, in order to achieve a consensual idea of the guidelines that all member states should follow to transfer

  14. Resource reliability, accessibility and governance: pillars for managing water resources to achieve water security in Nepal

    NASA Astrophysics Data System (ADS)

    Biggs, E. M.; Duncan, J.; Atkinson, P.; Dash, J.

    2013-12-01

    As one of the world's most water-abundant countries, Nepal has plenty of water yet resources are both spatially and temporally unevenly distributed. With a population heavily engaged in subsistence farming, whereby livelihoods are entirely dependent on rain-fed agriculture, changes in freshwater resources can substantially impact upon survival. The two main sources of water in Nepal come from monsoon precipitation and glacial runoff. The former is essential for sustaining livelihoods where communities have little or no access to perennial water resources. Much of Nepal's population live in the southern Mid-Hills and Terai regions where dependency on the monsoon system is high and climate-environment interactions are intricate. Any fluctuations in precipitation can severely affect essential potable resources and food security. As the population continues to expand in Nepal, and pressures build on access to adequate and clean water resources, there is a need for institutions to cooperate and increase the effectiveness of water management policies. This research presents a framework detailing three fundamental pillars for managing water resources to achieve sustainable water security in Nepal. These are (i) resource reliability; (ii) adequate accessibility; and (iii) effective governance. Evidence is presented which indicates that water resources are adequate in Nepal to sustain the population. In addition, aspects of climate change are having less impact than previously perceived e.g. results from trend analysis of precipitation time-series indicate a decrease in monsoon extremes and interannual variation over the last half-century. However, accessibility to clean water resources and the potential for water storage is limiting the use of these resources. This issue is particularly prevalent given the heterogeneity in spatial and temporal distributions of water. Water governance is also ineffective due to government instability and a lack of continuity in policy

  15. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  16. A Framework for Federated Two-Factor Authentication Enabling Cost-Effective Secure Access to Distributed Cyberinfrastructure

    SciTech Connect

    Ezell, Matthew A; Rogers, Gary L; Peterson, Gregory D.

    2012-01-01

    As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus thwarting credential replay attacks. The credential changes regularly, making brute-force attacks significantly more difficult. In high performance computing, end users may require access to resources housed at several different service provider locations. The ability to share a strong token between multiple computing resources reduces cost and complexity. The National Science Foundation (NSF) Extreme Science and Engineering Discovery Environment (XSEDE) provides access to digital resources, including supercomputers, data resources, and software tools. XSEDE will offer centralized strong authentication for services amongst service providers that leverage their own user databases and security profiles. This work implements a scalable framework built on standards to provide federated secure access to distributed cyberinfrastructure.

  17. 48 CFR 3036.570 - Special precautions for work at operating airports.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... clause at (HSAR) 48 CFR 3052.236-70, Special Precautions for Work at Operating Airports, in solicitations... work at operating airports. 3036.570 Section 3036.570 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SPECIAL CATEGORIES...

  18. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  19. Airport vulnerability assessment: an analytical approach

    NASA Astrophysics Data System (ADS)

    Lazarick, Richard T.

    1998-12-01

    The Airport Vulnerability Assessment Project (AVAP) is the direct result of congressional funding of recommendation 3.13 of the White House Commission on Aviation Safety and Security. This project takes a new approach to the assessment of U.S. commercial airports. AVAP uses automation, analytical methods and tools to evaluate vulnerability and risk, and to analyze cost/benefits in a more quantitative manner. This paper addresses both the process used to conduct this program, as well as a generalized look at the results, which have been achieved for the initial airport assessments. The process description covers the acquisition approach, the project structure, and a review of the various methodologies and tools being used by the sever performing organizations (Abacus Technology, Battelle, CTI, Lockwood Greene, Naval Facilities Engineering Service Center, SAIC, and Science & Engineering Associates). The tools described include ASSESS, SAM, RiskWatch, CASRAP, and AVAT. Included in the process is the utilization of an advisory panel made up predominantly of experts from the National Laboratories 9Sandia, Oak Ridge, Argonne and Brookhaven). The results portion addresses the findings and products resulting from the initial airport assessments. High level (unrestricted) summaries of the results are presented, along with initial trends in commonly recommended security improvements (countermeasures). Opportunities for the application of optics technology are identified.

  20. Secure web-based access to radiology: forms and databases for fast queries

    NASA Astrophysics Data System (ADS)

    McColl, Roderick W.; Lane, Thomas J.

    2002-05-01

    Currently, Web-based access to mini-PACS or similar databases commonly utilizes either JavaScript, Java applets or ActiveX controls. Many sites do not permit applets or controls or other binary objects for fear of viruses or worms sent by malicious users. In addition, the typical CGI query mechanism requires several parameters to be sent with the http GET/POST request, which may identify the patient in some way; this in unacceptable for privacy protection. Also unacceptable are pages produced by server-side scripts which can be cached by the browser, since these may also contain sensitive information. We propose a simple mechanism for access to patient information, including images, which guarantees security of information, makes it impossible to bookmark the page, or to return to the page after some defined length of time. In addition, this mechanism is simple, therefore permitting rapid access without the need to initially download an interface such as an applet or control. In addition to image display, the design of the site allows the user to view and save movies of multi-phasic data, or to construct multi-frame datasets from entire series. These capabilities make the site attractive for research purposes such as teaching file preparation.

  1. [National pharmaceutical policy in Colombia and social security reform: access and rational use of medicines].

    PubMed

    Mejia Restrepo, Samuel; Velez Arango, Alba Lucía; Buritica Arboleda, Olga Clemencia; Arango Mejia, María Cristina; Rio Gomez, Jaime Alberto del

    2002-01-01

    Based on the new social security system in Colombia (1993), which establishes equity and mandatory care as the basis for public health care provision, the authors analyze whether the formulation and implementation of pharmaceutical policy promote accessibility, availability, and rational use of medicines, thereby contributing to equity in health. Two approaches were used: a macro approach centered on the legal framework and various actors in the reform process and a micro approach related to the processes and results in the drug supply system. The authors studied the legal instruments backing the country's pharmaceutical policy and evaluated their application, using indicators and a specific disease (diabetes mellitus) as a marker. Although there is a legal framework providing the people's right to access health care services and essential medicines, the country lacks a comprehensive pharmaceuticals policy. Most of the institutions experience problems in distributing the medicines listed under the Mandatory Health Plan, a low percentage of medicines is dispensed at zero cost, and a major portion of patients purchase medicines through associations of diabetics or rely on alternative medicine. The study unveiled several obstacles to equity in health care coverage and access to essential medicines. PMID:12118308

  2. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... security measures are necessary to respond to a threat assessment or to a specific threat against civil aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator...

  3. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... security measures are necessary to respond to a threat assessment or to a specific threat against civil aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator...

  4. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... security measures are necessary to respond to a threat assessment or to a specific threat against civil aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator...

  5. Utilizing SELinux to mandate ultra-secure access control of medical records.

    PubMed

    Croll, Peter R; Henricksen, Matt; Caelli, Bill; Liu, Vicky

    2007-01-01

    Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure that sensitive health information can be adequately protected yet still be accessible only to those that "need-to-know". To achieve this and ensure sustainability over the longer term, it is advocated that an alternative, stable and secure system architecture is required. This paper considers the adoption of a model targeted at health information that provides much higher degrees of protection. A purpose built demonstrator that was developed based on enterprise-level systems software products is detailed. The long term aim is to provide a viable solution by utilizing contemporary, commercially supported operating system and allied software. The advantages and limitations in its application with a medical database are discussed. The future needs in terms of research, software development and changes in organizational policy for healthcare providers, are outlined. PMID:17911767

  6. PKI-based secure mobile access to electronic health services and data.

    PubMed

    Kambourakis, G; Maglogiannis, I; Rouskas, A

    2005-01-01

    Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks. PMID:16340094

  7. Consequences of Slot Transactions on Airport Congestion and Environmental Protection

    NASA Technical Reports Server (NTRS)

    Abeyratne, Ruwantissa I.R.

    2000-01-01

    Recent trends in the liberalization of market access by many commercial airlines have opened the skies to virtually unlimited flights between many countries. However, this liberalization is stultified by the lack of airport capacity to accommodate the many flights that are generated by demand for capacity. Accordingly, the allocation of slots for open skies airlines remain dependent on the expansion and effective management of airport capacity. This article examines the ramifications of slot allocation on traffic peaking at airports and environmental concerns, which may emerge with this activity.

  8. Integrated Airport Surface Operations

    NASA Technical Reports Server (NTRS)

    Koczo, S.

    1998-01-01

    The current air traffic environment in airport terminal areas experiences substantial delays when weather conditions deteriorate to Instrument Meteorological Conditions (IMC). Research activity at NASA has culminated in the development, flight test and demonstration of a prototype Low Visibility Landing and Surface Operations (LVLASO) system. A NASA led industry team and the FAA developed the system which integrated airport surface surveillance systems, aeronautical data links, DGPS navigation, automation systems, and controller and flight deck displays. The LVLASO system was demonstrated at the Hartsfield-Atlanta International Airport using a Boeing 757-200 aircraft during August, 1997. This report documents the contractors role in this testing particularly in the area of data link and DGPS navigation.

  9. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    SciTech Connect

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors, as

  10. Convenient Airports: Point of View of the Passengers

    NASA Technical Reports Server (NTRS)

    Magri, Adival Aparecido, Jr.; Alves, Claudio Jorge Pinto

    2003-01-01

    The competition among airlines or among airports aiming at to increase the demand for its services has been more and more incited. Knowledge the perception of the users for the offered services means to meet the customer's needs and expectations in order either to keep the customer, and therefore keep a significant advantage over competitors. The passenger of the air transportation wants rapidity, security and convenience. Convenience can be translated by comfort that the passenger wants for the price that he can pay. In this paper had been identified. as a result of a survey achieved in six Brazilian airports during 2002, the best indicators in the passenger's perception. These indicators among any others were listed m the handbook of Airports Council International (ACI). Distinctive perceptions were observed among passengers with different travel motivations. This survey had been carried through in the airports of Brasilia, Porto Alegre, Salvador. Fortaleza, Curitiba and Bel6m. Considering this survey we can identified the most attractive airport among them. This work is a way to help improve quality of service, in particular, m these six airports of the Brazilian network. The results should be published and made available to all the parties concerned (airport authority, airlines and service providers) and should lead to corrective action when the passenger is not satisfied with the service.

  11. Accessibility

    MedlinePlus

    ... www.nlm.nih.gov/medlineplus/accessibility.html MedlinePlus Accessibility To use the sharing features on this page, ... Subscribe to RSS Follow us Disclaimers Copyright Privacy Accessibility Quality Guidelines Viewers & Players MedlinePlus Connect for EHRs ...

  12. 78 FR 48044 - Safety Zone; San Diego International Airport Terminal Two West Grand Opening Fireworks; San Diego...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    .... SUPPLEMENTARY INFORMATION: Table of Acronyms DHS Department of Homeland Security FR Federal Register NPRM Notice... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; San Diego International Airport Terminal... support of a fireworks display for the Grand Opening of Lindbergh Airport Terminal Two West on August...

  13. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Airport-approved and exclusive area personnel identification systems. 1544.231 Section 1544.231 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY:...

  14. 8 CFR 234.4 - International airports for entry of aliens.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false International airports for entry of aliens. 234.4 Section 234.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.4 International airports for...

  15. 8 CFR 234.4 - International airports for entry of aliens.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false International airports for entry of aliens. 234.4 Section 234.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.4 International airports for...

  16. 8 CFR 234.4 - International airports for entry of aliens.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false International airports for entry of aliens. 234.4 Section 234.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.4 International airports for...

  17. 8 CFR 234.4 - International airports for entry of aliens.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false International airports for entry of aliens. 234.4 Section 234.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.4 International airports for...

  18. 8 CFR 234.4 - International airports for entry of aliens.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false International airports for entry of aliens. 234.4 Section 234.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.4 International airports for...

  19. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems. PMID:23392626

  20. 7 CFR 331.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... individual is approved by the Administrator or the HHS Secretary following a security risk assessment by the... risk assessment to the Attorney General. (e) An individual's security risk assessment may be...

  1. Software Tools to Support Research on Airport Departure Planning

    NASA Technical Reports Server (NTRS)

    Carr, Francis; Evans, Antony; Feron, Eric; Clarke, John-Paul

    2003-01-01

    A simple, portable and useful collection of software tools has been developed for the analysis of airport surface traffic. The tools are based on a flexible and robust traffic-flow model, and include calibration, validation and simulation functionality for this model. Several different interfaces have been developed to help promote usage of these tools, including a portable Matlab(TM) implementation of the basic algorithms; a web-based interface which provides online access to automated analyses of airport traffic based on a database of real-world operations data which covers over 250 U.S. airports over a 5-year period; and an interactive simulation-based tool currently in use as part of a college-level educational module. More advanced applications for airport departure traffic include taxi-time prediction and evaluation of "windowing" congestion control.

  2. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Administrator or the HHS Secretary following a security risk assessment by the Attorney General. (b) An... approval, each individual must submit the information necessary to conduct a security risk assessment to the Attorney General. (e) An individual's security risk assessment may be expedited upon...

  3. 7 CFR 331.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... individual is approved by the Administrator or the HHS Secretary following a security risk assessment by the... risk assessment to the Attorney General. (e) An individual's security risk assessment may be expedited...; security risk assessments. 331.10 Section 331.10 Agriculture Regulations of the Department of...

  4. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Administrator, following a security risk assessment by the Attorney General. (b) An individual will be deemed to... individual must submit the information necessary to conduct a security risk assessment to the Attorney General. (e) An individual's security risk assessment may be expedited upon written request by...

  5. 7 CFR 331.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... individual is approved by the Administrator or the HHS Secretary following a security risk assessment by the... risk assessment to the Attorney General. (e) An individual's security risk assessment may be expedited...; security risk assessments. 331.10 Section 331.10 Agriculture Regulations of the Department of...

  6. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Administrator, following a security risk assessment by the Attorney General. (b) An individual will be deemed to... individual must submit the information necessary to conduct a security risk assessment to the Attorney General. (e) An individual's security risk assessment may be expedited upon written request by...

  7. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Administrator, following a security risk assessment by the Attorney General. (b) An individual will be deemed to... individual must submit the information necessary to conduct a security risk assessment to the Attorney General. (e) An individual's security risk assessment may be expedited upon written request by...

  8. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Administrator or the HHS Secretary following a security risk assessment by the Attorney General. (b) An... approval, each individual must submit the information necessary to conduct a security risk assessment to... for a specified period of time. (f) An individual's security risk assessment may be expedited...

  9. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Administrator or the HHS Secretary following a security risk assessment by the Attorney General. (b) An... approval, each individual must submit the information necessary to conduct a security risk assessment to... for a specified period of time. (f) An individual's security risk assessment may be expedited...

  10. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Administrator, following a security risk assessment by the Attorney General. (b) An individual will be deemed to... individual must submit the information necessary to conduct a security risk assessment to the Attorney... period of time. (f) An individual's security risk assessment may be expedited upon written request by...

  11. Catheter Securement Systems for Peripherally Inserted and Nontunneled Central Vascular Access Devices: Clinical Evaluation of a Novel Sutureless Device.

    PubMed

    Krenik, Karen M; Smith, Graham E; Bernatchez, Stéphanie F

    2016-01-01

    Sutureless catheter securement systems are intended to eliminate risks associated with sutures. The clinical acceptability of a novel system was investigated compared with the current method of securement for peripherally inserted central catheters (19 facilities using StatLock or sutures) or nontunneled central vascular access devices (3 facilities using StatLock or sutures or HubGuard + Sorbaview Shield). More than 94% of respondents rated the novel system as same, better, or much better than their current product. More than 82% of respondents were willing to replace their current system with the new one. PMID:27379679

  12. Supersonics--Airport Noise

    NASA Technical Reports Server (NTRS)

    Bridges, James

    2007-01-01

    At this, the first year-end meeting of the Fundamental Aeronautics Program, an overview of the Airport Noise discipline of the Supersonics Project leads the presentation of technical plans and achievements in this area of the Project. The overview starts by defining the Technical Challenges targeted by Airport Noise efforts, and the Approaches planned to meet these challenges. These are fleshed out in Elements, namely Prediction, Diagnostics, and Engineering, and broken down into Tasks. The Tasks level is where individual researchers' work is defined and from whence the technical presentations to follow this presentation come. This overview also presents the Milestones accomplished to date and to be completed in the next year. Finally, the NASA Research Announcement cooperative agreement activities are covered and tied to the Tasks and Milestones.

  13. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  14. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  15. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  16. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  17. Central venous Access device SeCurement And Dressing Effectiveness (CASCADE) in paediatrics: protocol for pilot randomised controlled trials

    PubMed Central

    Gibson, Victoria; Long, Debbie A; Williams, Tara; Hallahan, Andrew; Mihala, Gabor; Cooke, Marie; Rickard, Claire M

    2016-01-01

    Introduction Paediatric central venous access devices (CVADs) are associated with a 25% incidence of failure. Securement and dressing are strategies used to reduce failure and complication; however, innovative technologies have not been evaluated for their effectiveness across device types. The primary aim of this research is to evaluate the feasibility of launching a full-scale randomised controlled efficacy trial across three CVAD types regarding CVAD securement and dressing, using predefined feasibility criteria. Methods and analysis Three feasibility randomised, controlled trials are to be undertaken at the Royal Children's Hospital and the Lady Cilento Children's Hospital, Brisbane, Australia. CVAD securement and dressing interventions under examination compare current practice with sutureless securement devices, integrated securement dressings and tissue adhesive. In total, 328 paediatric patients requiring a peripherally inserted central catheter (n=100); non-tunnelled CVAD (n=180) and tunnelled CVAD (n=48) to be inserted will be recruited and randomly allocated to CVAD securement and dressing products. Primary outcomes will be study feasibility measured by eligibility, recruitment, retention, attrition, missing data, parent/staff satisfaction and effect size. CVAD failure and complication (catheter-associated bloodstream infection, local infection, venous thrombosis, occlusion, dislodgement and breakage) will be compared between groups. Ethics and dissemination Ethical approval to conduct the research has been obtained. All dissemination will be undertaken using the CONSORT Statement recommendations. Additionally, the results will be sent to the relevant organisations which lead CVAD focused clinical practice guidelines development. Trial registration numbers ACTRN12614001327673; ACTRN12615000977572; ACTRN12614000280606. PMID:27259529

  18. 78 FR 7476 - Airport Improvement Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-01

    ... Federal Aviation Administration Airport Improvement Program AGENCY: Department of Transportation, Federal Aviation Administration. ACTION: Invitation to comment on draft FAA Order 5100-38, Airport Improvement...-38D, Airport Improvement Program Handbook. When finalized, this Order will replace Order...

  19. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... provide the target of a surveillance or collection activity with the disclosure accounting records... the interests of national security, it is necessary to retain this information to aid in establishing... activity and compromise national security. For example, a target could, once made aware that...

  20. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... provide the target of a surveillance or collection activity with the disclosure accounting records... the interests of national security, it is necessary to retain this information to aid in establishing... activity and compromise national security. For example, a target could, once made aware that...

  1. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... provide the target of a surveillance or collection activity with the disclosure accounting records... the interests of national security, it is necessary to retain this information to aid in establishing... activity and compromise national security. For example, a target could, once made aware that...

  2. 7 CFR 331.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... individual is approved by the Administrator or the HHS Secretary following a security risk assessment by the... risk assessment to the Attorney General. (e) A person with valid approval from the HHS Secretary or... individual or entity for a specified period of time. (f) An individual's security risk assessment may...

  3. Some New Caves under Airport in Dubrovnik

    NASA Astrophysics Data System (ADS)

    Garasic, Mladen; Garasic, Davor

    2013-04-01

    Till today six speleological sites are known to exist at the premises of the Dubrovnik Airport in Croatia. This is a highly weathered area that has been in the focus of attention of speleologists ever since the airport was built in 1961/62. Two vertical caves measuring 31 m and 10.5 m in depth were discovered at that time. These two caves are now situated right underneath the new control tower of the Dubrovnik Airport. A tunnel entrance to the cave that has been known to local population for a long time is situated in the immediate vicinity of the control tower. In late 1950's the entrance to the cave was closed with concrete because of a military airport construction, but a tunnel was built so as to enable access to the cave. The cave is about 200 meters long and it fully occupies the space underneath the concrete runways of the Dubrovnik Airport. Thanks to efforts made by speleologists in 2006-2010 the cave was adapted to enable tourist visits, and it is now the world's only tourist cave underneath an operating airport. During apron extension activities in May 2012, three additional speleological sites were discovered and examined, together with other previously discovered caves, from the standpoint of geophysics, geology and speleology. Results of exploration shows that there are several faults zones in karstified limestones. The water flow in the caverns varies depending on climatic conditions on the ground surface. Water reaches the caverns via joints directly from the ground surface (to a lesser extent) or in deeper parts via joints and paraclases from other parts of Cretaceous carbonate formations (in most cases). The weathering zone depth in the area of these speleological features, are estimated at 300 to 500 meters (included under sea levels) , and the zone of vertical circulation varies from 50 to 150 m. It is followed by the zone of horizontal circulation in which the ground water is carried via Cretaceous limestones toward submarine springs in the

  4. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  5. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  6. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  7. Airport Pricing Strategies

    NASA Technical Reports Server (NTRS)

    Pels, Eric; Verhoef, Erik T.

    2003-01-01

    Conventional economic wisdom suggests that congestion pricing would be an appropriate response to cope with the growing congestion levels currently experienced at many airports. Several characteristics of aviation markets, however, may make naive congestion prices equal to the value of marginal travel delays a non-optimal response. This paper has developed a model of airport pricing that captures a number of these features. The model in particular reflects that airlines typically have market power and are engaged in oligopolistic competition at different sub-markets; that part of external travel delays that aircraft impose are internal to an operator and hence should not be accounted for in congestion tolls. We presented an analytical treatment for a simple bi-nodal symmetric network, which through the use of 'hyper-networks' would be readily applicable to dynamic problems (in discrete time) such as peak - off-peak differences, and some numerical exercises for the same symmetric network, which was only designed to illustrate the possible comparative static impacts of tolling, in addition to marginal equilibrium conditions as could be derived for the general model specification. Some main conclusions are that second-best optimal tolls are typically lower than what would be suggested by congestion costs alone and may even be negative, and that the toll as derived by Brueckner (2002) may not lead to an increase in total welfare. While Brueckner (2002) has made clear that congestion tolls on airports may be smaller than expected when congestion costs among aircraft are internal for a firm, our analysis adds to this that a further downward adjustment may be in order due to market power. The presence of market power (which causes prices to exceed marginal costs) may cause the pure congestion toll to be suboptimal, because the resulting decrease in demand is too high (the pure congestion tall does not take into account the decrease in consumer surplus). The various

  8. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    NASA Astrophysics Data System (ADS)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  9. 75 FR 47891 - Notice of Intent to Rule on Request to Release Airport Property at the Dubois Regional Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-09

    ...-aeronautical airport property to Joseph and Rosemary Barber. Also, Joseph and Rosemary Barber desire to... Rosemary Barber. The ROW continues to be needed by Joseph and Rosemary Barber to access SR 830 from their property. Therefore, the Authority desires to convey their half of the former ROW to Joseph and...

  10. Prosthetic metal implants and airport metal detectors

    PubMed Central

    Dancey, A; Titley, OG

    2013-01-01

    Introduction Metal detectors have been present in airports and points of departure for some time. With the introduction of heightened security measures in response to fears of an increased threat of terrorism, they may become more prevalent in other public locations. The aim of this study was to ascertain which prosthetic devices activated metal detector devices used for security purposes. Methods A range of prosthetic devices used commonly in orthopaedic and plastic surgery procedures were passed through an arch metal detector at Birmingham Airport in the UK. Additionally, each item was passed under a wand detector. Items tested included expandable breast prostheses, plates used in wrist and hand surgery, screws, K-wires, Autosuture™ ligation clips and staples. Results No prostheses were detected by the arch detector. The expandable implants and wrist plates were the only devices detected by passing the wand directly over them. No device was detected by the wand when it was under cover of the axillary soft tissue. Screws, K-wires, Autosuture™ clips and staples were not detected under any of the study conditions. Conclusions Although unlikely to trigger a detector, it is possible that an expandable breast prosthesis or larger plate may do so. It is therefore best to warn patients of this so they can anticipate detection and further examination. PMID:23827294

  11. Airport Careers. Aviation Careers Series. Revised.

    ERIC Educational Resources Information Center

    Zaharevitz, Walter

    This booklet, one in a series on aviation careers, outlines the variety of careers available in airports. The first part of the booklet provides general information about careers at airports, while the main part of the booklet outlines the following nine job categories: airport director, assistant airport director, engineers, support personnel,…

  12. Auctioning Airport Slots?

    NASA Technical Reports Server (NTRS)

    Gruyer, Nicolas; Lenoir, Nathalie

    2003-01-01

    The current allocation of slots on congested European airports constitutes an obstacle to the effective liberalisation of air transportation undertaken in Europe. With a view to favouring effluent slot utilisation and competition, as is the goal of the Euopean commission, we propose to use a market mechanism, based on temporary" utilisation licences. In order to allocate those licences, we propose and describe an iterated combinatorial auction mechanism where a percentage of licences would be reallocated each season. A secondary market would also be set up in order to reallocate slots during a season. Since a combinatorial auction involve a complex optimisation procedure, we describe how it can be made to work in the case of auctions.

  13. Methods for Determining Aircraft Surface State at Lesser-Equipped Airports

    NASA Technical Reports Server (NTRS)

    Roach, Keenan; Null, Jody

    2016-01-01

    Tactical departure scheduling within a terminal airspace must accommodate a wide spectrum of surveillance and communication capabilities at multiple airports. The success of such a scheduler is highly dependent upon the knowledge of a departure's state while it is still on the surface. Airports within a common Terminal RAdar CONtrol (TRACON) airspace possess varying levels of surface surveillance infrastructure which directly impacts uncertainties in wheels-off times. Large airports have access to surface surveillance data, which is shared with the TRACON, while lesser-equipped airports still rely solely on controllers in Air Traffic Control Towers (Towers). Coordination between TRACON and Towers can be greatly enhanced when the TRACON controller has access to the surface surveillance and the associated decision-support tools at well-equipped airports. Similar coordination at lesser-equipped airports is still based on verbal communications. This paper investigates possible methods to reduce the uncertainty in wheels-off time predictions at the lesser-equipped airports through the novel use of Over-the-Air (OTA) data transmissions. We also discuss the methods and equipment used to collect sample data at lesser-equipped airports within a large US TRACON, as well as the data evaluation to determine if meaningful information can be extracted from it.

  14. Investigation Into The Needs of Part 135 Operators to Access Airports Restricted Under FAR Part 135 Sections 135.213, 135.219 and/or 135.225

    NASA Technical Reports Server (NTRS)

    Eckert, Clifford A.; Stough, H. P. (Technical Monitor)

    2002-01-01

    NASA and the FAA have joint interests and responsibilities for developing guidelines and standards for cockpit displays of Flight Information Services (FIS) information and for developing enhancements to the planned FAA Data Link (FISDL) services. NASA and the FAA have established responsibilities in connection with development tasks for enhancements to the FISDL project. This report is the result of NASA Task 2, "Weather Support Concept- Part 135 Operations." The objective of the task was to determine the needs of Part 135 operators as they relate to FAA Part 135 Sections 135.213, 135.219 and 135.225, which pertain to weather reporting requirements at destination airports. This report discusses the results of two questionnaires completed by volunteer Part 135 operators that questioned their operations, their needs for flying to airports without weather reporting compatibilities, and suggestions for modifying FARs 135.213, 135.219 and 135.225. The operators pointed out airports in areas of the CONUS that were needed for IFR operations but lacked weather reporting capabilities and they offered practical suggestions for changes to the FARs. Related to operators's needs, and discussed in this report, were the Fractional Ownership NPRM and the possible impact of GPS WAAS and LAAS approaches.

  15. 78 FR 7334 - Port Authority Access to Facility Vulnerability Assessments and the Integration of Security Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-01

    ...This notice requests comments from facility owners and operators, State and local law enforcement agencies, port authorities, relevant security industry participants, and all other interested members of the public regarding how to best implement Section 822 of the Coast Guard Authorization Act of 2010. In particular, this notice discusses the Coast Guard's preliminary thoughts on how owners or......

  16. Against All Odds: Latinas Activate Agency to Secure Access to College

    ERIC Educational Resources Information Center

    Sapp, Vicki T.; Kiyama, Judy Marquez; Dache-Gerbino, Amalia

    2016-01-01

    This qualitative study seeks to understand Latinas' college-going behaviors by examining their agency and role in securing opportunity for college. The authors examine the activation of agency among 16 urban Latinas when navigating the structures influencing college opportunity through a cultural ecological model. Examples of agency are…

  17. Airport surface operations requirements analysis

    NASA Technical Reports Server (NTRS)

    Groce, John L.; Vonbokern, Greg J.; Wray, Rick L.

    1993-01-01

    This report documents the results of the Airport Surface Operations Requirements Analysis (ASORA) study. This study was conducted in response to task 24 of NASA Contract NAS1-18027. This study is part of NASA LaRC's Low Visibility Surface Operations program, which is designed to eliminate the constraints on all-weather arrival/departure operations due to the airport/aircraft ground system. The goal of this program is to provide the capability for safe and efficient aircraft operations on the airport surface during low visibility conditions down to zero. The ASORA study objectives were to (1) develop requirements for operation on the airport surface in visibilities down to zero; (2) survey and evaluate likely technologies; (3) develop candidate concepts to meet the requirements; and (4) select the most suitable concept based on cost/benefit factors.

  18. Wireless digital-ultrasonic sensors for proximity ID, access control, firearm control, and C3I in homeland security and law enforcement applications

    NASA Astrophysics Data System (ADS)

    Forcier, Bob

    2003-09-01

    This paper describes a new patent-pending digital-ultrasonic sensor network technology, which provides a "security protection sphere" around the authorized user(s) and the infrastructure system or system(s) to achieve C3I in Homeland Security and Law Enforcement Applications. If the system device, such as a firearm, a secure computer, PDA, or vehicle is misplaced, stolen or removed from the security protective sphere, an alarm is activated. A digital-ultrasonic sensor/tag utilizes the system"s physical structure to form a 2 to 20 Meter programmable protection sphere around the device and the authorized user. In addition, the system allows only authorized users to utilize the system, thereby creating personalized weapons, secure vehicle access or secure computer hardware. If an unauthorized individual accesses the system device, the system becomes inoperative and an alarm is activated. As the command and control, the authorized individual is provided a secure wristwatch/PDA. Access control is provided by "touch" and is controlled through the wristwatch/PDA/smartcard with a unique digital-ultrasonic coding and matching protocol that provides a very high level of security for each wireless sensor.

  19. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: A privacy-protecting remote access system for health-related research and evaluation☆

    PubMed Central

    Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.

    2014-01-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148

  20. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  1. A secure web-based approach for accessing transitional health information for people with traumatic brain injury.

    PubMed

    Lemaire, E D; Deforge, D; Marshall, S; Curran, D

    2006-03-01

    A web-based transitional health record was created to provide regional healthcare professionals with ubiquitous access to information on people with brain injuries as they move through the healthcare system. Participants included public, private, and community healthcare organizations/providers in Eastern Ontario (Canada). One hundred and nineteen service providers and 39 brain injury survivors registered over 6 months. Fifty-eight percent received English and 42% received bilingual services (English-French). Public health providers contacted the regional service coordinator more than private providers (52% urban centres, 26% rural service providers, and 22% both areas). Thirty-five percent of contacts were for technical difficulties, 32% registration inquiries, 21% forms and processes, 6% resources, and 6% education. Seventeen technical enquiries required action by technical support personnel: 41% digital certificates, 29% web forms, and 12% log-in. This web-based approach to clinical information sharing provided access to relevant data as clients moved through or re-entered the health system. Improvements include automated digital certificate management, institutional health records system integration, and more referral tracking tools. More sensitive test data could be accessed on-line with increasing consumer/clinician confidence. In addition to a strong technical infrastructure, human resource issues are a major information security component and require continuing attention to ensure a viable on-line information environment. PMID:16469409

  2. Secure remote access to a clinical data repository using a wireless personal digital assistant (PDA).

    PubMed

    Duncan, R G; Shabot, M M

    2000-01-01

    TCP/IP and World-Wide-Web (WWW) technology have become the universal standards for networking and delivery of information. Personal digital assistants (PDAs), cellular telephones, and alphanumeric pagers are rapidly converging on a single pocket device that will leverage wireless TCP/IP networks and WWW protocols and can be used to deliver clinical information and alerts anytime, anywhere. We describe a wireless interface to clinical information for physicians based on Palm Corp.'s Palm VII pocket computer, a wireless digital network, encrypted data transmission, secure web servers, and a clinical data repository (CDR). PMID:11079875

  3. Access to Network Login by Three-Factor Authentication for Effective Information Security.

    PubMed

    Vaithyasubramanian, S; Christy, A; Saravanan, D

    2016-01-01

    Today's technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret key mapping validate if the logging user is the intended client. Secret key is assumed an indispensable part in security. The objective of MFA is to make a layered safeguard and make it more troublesome for an unauthenticated entity to get to an objective, for example, a physical area, processing gadget, system, or database. In the event that one element is bargained or broken, the assailant still has two more boundaries to rupture before effectively breaking into the objective. An endeavor has been made by utilizing three variable types of authentication. In this way managing additional secret key includes an additional layer of security. PMID:27006976

  4. Access to Network Login by Three-Factor Authentication for Effective Information Security

    PubMed Central

    Vaithyasubramanian, S.; Christy, A.; Saravanan, D.

    2016-01-01

    Today's technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret key mapping validate if the logging user is the intended client. Secret key is assumed an indispensable part in security. The objective of MFA is to make a layered safeguard and make it more troublesome for an unauthenticated entity to get to an objective, for example, a physical area, processing gadget, system, or database. In the event that one element is bargained or broken, the assailant still has two more boundaries to rupture before effectively breaking into the objective. An endeavor has been made by utilizing three variable types of authentication. In this way managing additional secret key includes an additional layer of security. PMID:27006976

  5. Wireless Channel Characterization in the Airport Surface Environment

    NASA Technical Reports Server (NTRS)

    Neville, Joshua T.

    2004-01-01

    Given the anticipated increase in air traffic in the coming years, modernization of the National Airspace System (NAS) is a necessity. Part of this modernization effort will include updating current communication, navigation, and surveillance (CNS) systems to deal with the increased traffic as well as developing advanced CNS technologies for the systems. An example of such technology is the integrated CNS (ICNS) network being developed by the Advanced CNS Architecture and Systems Technology (ACAST) group for use in the airport surface environment. The ICNS network would be used to convey voice/data between users in a secure and reliable manner. The current surface system only supports voice and does so through an obsolete physical infrastructure. The old system is vulnerable to outages and costly to maintain. The proposed ICNS network will include a wireless radio link. To ensure optimal performance, a thorough and accurate characterization of the channel across which the link would operate is necessary. The channel is the path the signal takes from the transmitter to the receiver and is prone to various forms of interference. Channel characterization involves a combination of analysis, simulation, and measurement. My work this summer was divided into four tasks. The first task required compiling and reviewing reference material that dealt with the characterization and modeling of aeronautical channels. The second task involved developing a systematic approach that could be used to group airports into classes, e.g. small airfields, medium airports, large open airports, large cluttered airports, etc. The third task consisted of implementing computer simulations of existing channel models. The fourth task entailed measuring possible interference sources in the airport surface environment via a spectrum analyzer.

  6. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Airport-approved and exclusive area personnel identification systems. 1544.231 Section 1544.231 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  7. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Airport-approved and exclusive area personnel identification systems. 1544.231 Section 1544.231 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  8. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Airport-approved and exclusive area personnel identification systems. 1544.231 Section 1544.231 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  9. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Airport-approved and exclusive area personnel identification systems. 1544.231 Section 1544.231 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  10. Aviation security: A system's perspective

    SciTech Connect

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  11. 77 FR 4394 - Release of Airport Property: Orlando Executive Airport, Orlando, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-27

    ... Federal Aviation Administration Release of Airport Property: Orlando Executive Airport, Orlando, FL AGENCY... provides notice of intent to release certain airport properties 12.4 acres at the Orlando Executive Airport, Orlando, FL from the conditions, release certain properties from all terms, conditions, reservations...

  12. Evolution of Chinese airport network

    NASA Astrophysics Data System (ADS)

    Zhang, Jun; Cao, Xian-Bin; Du, Wen-Bo; Cai, Kai-Quan

    2010-09-01

    With the rapid development of the economy and the accelerated globalization process, the aviation industry plays a more and more critical role in today’s world, in both developed and developing countries. As the infrastructure of aviation industry, the airport network is one of the most important indicators of economic growth. In this paper, we investigate the evolution of the Chinese airport network (CAN) via complex network theory. It is found that although the topology of CAN has remained steady during the past few years, there are many dynamic switchings inside the network, which have changed the relative importance of airports and airlines. Moreover, we investigate the evolution of traffic flow (passengers and cargoes) on CAN. It is found that the traffic continues to grow in an exponential form and has evident seasonal fluctuations. We also found that cargo traffic and passenger traffic are positively related but the correlations are quite different for different kinds of cities.

  13. Equity in access to health care provision under the medicare security for small scale entrepreneurs in Dar es Salaam.

    PubMed

    Urassa, J A E

    2012-03-01

    The main objective of this study was to assess equity in access to health care provision under the Medicare Security for Small Scale Entrepreneurs (SSE). Methodological triangulation was used to an exploratory and randomized cross- sectional study in order to supplement information on the topic under investigation. Questionnaires were administered to 281 respondents and 6 Focus Group Discussions (FGDs) were held with males and females. Documentary review was also used. For quantitative aspect of the study, significant associations were measured using confidence intervals (95% CI) testing. Qualitative data were analyzed with assistance of Open code software. The results show that inequalities in access to health care services were found in respect to affordability of medical care costs, distance from home to health facilities, availability of drugs as well as medical equipments and supplies. As the result of existing inequalities some of clients were not satisfied with the provided health services. The study concludes by drawing policy and research implications of the findings. PMID:23120940

  14. Noise monitoring in airport communities

    NASA Astrophysics Data System (ADS)

    Connor, W. K.

    Current noise monitoring practices at airports are surveyed, with emphasis placed on extent, implementation, and rationale. It is noted that contemporary aircraft monitoring systems can perform a wide variety of functions in support of an airport noise abatement program. In establishing a system, the importance of developing the program before locating the stations and specifying functions is stressed. Among the basic design considerations are the location and type of the central station, the number and locations of the remote stations, the type of data output, the amount of data to be stored, and the operating costs.

  15. Planning, Management, and Economics of Airport Operation

    NASA Technical Reports Server (NTRS)

    Wiley, J.

    1972-01-01

    An overview of the role of the airport in the transportation complex and in the community is presented. The establishment of the airport including its requirements in regional planning and the operation of the airport as a social and economic force are discussed.

  16. 75 FR 39090 - Airport Privatization Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-07

    ... procedures to be used in applications for exemption under the Airport Privatization Pilot Program (62 FR... Federal Aviation Administration Airport Privatization Pilot Program AGENCY: Federal Aviation... application for participation in the airport privatization pilot program received under 49 U.S.C....

  17. Examining Passenger Flow Choke Points at Airports Using Discrete Event Simulation

    NASA Technical Reports Server (NTRS)

    Brown, Jeremy R.; Madhavan, Poomima

    2011-01-01

    The movement of passengers through an airport quickly, safely, and efficiently is the main function of the various checkpoints (check-in, security. etc) found in airports. Human error combined with other breakdowns in the complex system of the airport can disrupt passenger flow through the airport leading to lengthy waiting times, missing luggage and missed flights. In this paper we present a model of passenger flow through an airport using discrete event simulation that will provide a closer look into the possible reasons for breakdowns and their implications for passenger flow. The simulation is based on data collected at Norfolk International Airport (ORF). The primary goal of this simulation is to present ways to optimize the work force to keep passenger flow smooth even during peak travel times and for emergency preparedness at ORF in case of adverse events. In this simulation we ran three different scenarios: real world, increased check-in stations, and multiple waiting lines. Increased check-in stations increased waiting time and instantaneous utilization. while the multiple waiting lines decreased both the waiting time and instantaneous utilization. This simulation was able to show how different changes affected the passenger flow through the airport.

  18. Technology and politics: The regional airport experience

    NASA Technical Reports Server (NTRS)

    Starling, J. D.; Brown, J.; Gerhardt, J. M.; Dominus, M. I.

    1976-01-01

    The findings of a comparative study of the following six regional airports were presented: Dallas/Fort Worth, Kansas City, Washington, D.C., Montreal, Tampa, and St. Louis. Each case was approached as a unique historical entity, in order to investigate common elements such as: the use of predictive models in planning, the role of symbolism to heighten dramatic effects, the roles of community and professional elites, and design flexibility. Some of the factors considered were: site selection, consolidation of airline service, accessibility, land availability and cost, safety, nuisance, and pollution constraints, economic growth, expectation of regional growth, the demand forecasting conundrum, and design decisions. The hypotheses developed include the following: the effect of political, social, and economic conflicts, the stress on large capacity and dramatic, high-technology design, projections of rapid growth to explain the need for large capital outlays.

  19. 49 CFR 1554.101 - Security Measures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... display area of an airport covered by an airport security program under 49 CFR part 1542 in the United... repair station who has successfully undergone a check as described in paragraph (b)(3) of this section... history. The repair station obtains the employee's employment history for the most recent five year...

  20. Poverty, food security and universal access to sexual and reproductive health services: a call for cross-movement advocacy against neoliberal globalisation.

    PubMed

    Sundari Ravindran, T K

    2014-05-01

    Universal access to sexual and reproductive health services is one of the goals of the International Conference on Population and Development of 1994. The Millennium Development Goals were intended above all to end poverty. Universal access to health and health services are among the goals being considered for the post-2015 agenda, replacing or augmenting the MDGs. Yet we are not only far from reaching any of these goals but also appear to have lost our way somewhere along the line. Poverty and lack of food security have, through their multiple linkages to health and access to health care, deterred progress towards universal access to health services, including for sexual and reproductive health needs. A more insidious influence is neoliberal globalisation. This paper describes neoliberal globalisation and the economic policies it has engendered, the ways in which it influences poverty and food security, and the often unequal impact it has had on women as compared to men. It explores the effects of neoliberal economic policies on health, health systems, and universal access to health care services, and the implications for access to sexual and reproductive health. To be an advocate for universal access to health and health care is to become an advocate against neoliberal globalisation. PMID:24908453

  1. Determination and Applications of Environmental Costs at Different Sized Airports: Aircraft Noise and Engine Emissions

    NASA Technical Reports Server (NTRS)

    Lu, Cherie; Lierens, Abigail

    2003-01-01

    With the increasing trend of charging for externalities and the aim of encouraging the sustainable development of the air transport industry, there is a need to evaluate the social costs of these undesirable side effects, mainly aircraft noise and engine emissions, for different airports. The aircraft noise and engine emissions social costs are calculated in monetary terms for five different airports, ranging from hub airports to small regional airports. The number of residences within different levels of airport noise contours and the aircraft noise classifications are the main determinants for accessing aircraft noise social costs. Whist, based on the damages of different engine pollutants on the human health, vegetation, materials, aquatic ecosystem and climate, the aircraft engine emissions social costs vary from engine types to aircraft categories. The results indicate that the relationship appears to be curvilinear between environmental costs and the traffic volume of an airport. The results and methodology of environmental cost calculation could input for to the proposed European wide harmonized noise charges as well as the social cost benefit analysis of airports.

  2. 19 CFR 122.153 - Limitations on airport of entry or departure.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Airport. Baltimore, Maryland Baltimore/Washington International Thurgood Marshall Airport. Chicago... International Airport. Houston, Texas George Bush Intercontinental Airport. Jamaica, New York John F....

  3. 19 CFR 122.153 - Limitations on airport of entry or departure.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Airport. Baltimore, Maryland Baltimore/Washington International Thurgood Marshall Airport. Chicago... International Airport. Houston, Texas George Bush Intercontinental Airport. Jamaica, New York John F....

  4. 75 FR 29567 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-26

    ... OMB Review: Aviation Security Customer Satisfaction Performance Measurement Passenger Survey AGENCY... satisfaction of aviation security in an effort to more efficiently manage airport performance. DATES: Send your...; Aviation Security Customer Satisfaction Performance Measurement Passenger Survey. TSA, with OMB's...

  5. Nuclear techniques for finding chemical explosives in airport luggage

    NASA Astrophysics Data System (ADS)

    Grodzins, Lee

    1991-05-01

    Chemical explosives are composed of concentrated densities of nitrogen and oxygen. High values of the nitrogen alert the presence of a bomb; high values of both nitrogen and oxygen densities certify the bomb's presence uniquely. More than a dozen nuclear-based techniques have been proposed for rapidly scanning airport luggage to find hidden explosives by measuring these elemental distributions. In almost every scheme, the technological challenge is the accelerator, which must be small, well-shielded, cost-effective, and be operable in busy airports by nominally-trained personnel, with minimum unscheduled downtime for repairs or service. This paper will summarize, within the limits imposed by security, four of the imaging schemes.

  6. Tailored fog climatology for Amsterdam Airport Schiphol

    NASA Astrophysics Data System (ADS)

    Leander, R.

    2010-07-01

    Like many airports, Amsterdam Airport Schiphol is vulnerable to climate change. The airport is situated in a complex and fragile urban area where fundamental changes take place in design and use of the region. To maintain its competitive position, the airport is beginning to respond to changes in weather and climate by formulating adaptation strategies, based on tailored climate information. The Royal Netherlands Meteorological Institute (KNMI), Amsterdam Airport Schiphol (AAS) and Air Trafic Control the Netherlands (LVNL) are working together to provide just that type of information. Due to safety regulations, reduced horizontal visibility on airports can have an immediate impact on the availability of runways and hence the airport capacity. Fog is therefore one of the most relevant meteorological phenomena to airport operations. A study has started in which the statistics of fog occurrence and visibility at Amsterdam Airport are assessed. The aim is describing the current climate (from 1970 onward) as well as making projections into the future (up to 2040). For the latter, the identification and attribution of trends is relevant. Another point of interrest is the spatial pattern of fog potential over the airport, in particular the related questions whether some runways are more prone to fog occurrence than others and whether these runways require a separate forecast. To answer these questions it is crucial to distinguish between large-scale and local influences. The preliminary results of this study are presented here.

  7. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    DOEpatents

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  8. LH2 airport requirements study

    NASA Technical Reports Server (NTRS)

    Brewer, G. D. (Editor)

    1976-01-01

    A preliminary assessment of the facilities and equipment which will be required at a representative airport is provided so liquid hydrogen LH2 can be used as fuel in long range transport aircraft in 1995-2000. A complete facility was conceptually designed, sized to meet the projected air traffic requirement. The facility includes the liquefaction plant, LH2, storage capability, and LH2 fuel handling system. The requirements for ground support and maintenance for the LH2 fueled aircraft were analyzed. An estimate was made of capital and operating costs which might be expected for the facility. Recommendations were made for design modifications to the reference aircraft, reflecting results of the analysis of airport fuel handling requirements, and for a program of additional technology development for air terminal related items.

  9. 14 CFR 152.109 - Project eligibility: Airport planning.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Project eligibility: Airport planning. 152....109 Project eligibility: Airport planning. (a) Airport master planning. A proposed project for airport master planning is not approved unless— (1) The location of the existing or proposed airport is...

  10. Teaching at Logan International Airport

    ERIC Educational Resources Information Center

    Schmidt, Steffen

    2005-01-01

    Although Terminal C at Logan airport does not look like a classroom, for about fifty minutes on this author's way back from Boston it was for him. Like many public spaces, Logan now has a very robust Wi-Fi wireless network and this enabled him to take advantage of a departure delay to "teach" his class. In 1970 when the author started teaching,…

  11. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations...

  12. Assessing coastal flood risk and sea level rise impacts at New York City area airports

    NASA Astrophysics Data System (ADS)

    Ohman, K. A.; Kimball, N.; Osler, M.; Eberbach, S.

    2014-12-01

    's understanding of the effects of sea level rise on coastal flooding at the airports and guiding decision-making in the selection of effective adaptation actions. Given the importance of these airports to transportation, this project is advancing security and continuity of national and international commerce well into the 21st century.

  13. Integrating repositories with fuel cycles: The airport authority model

    SciTech Connect

    Forsberg, C.

    2012-07-01

    The organization of the fuel cycle is a legacy of World War II and the cold war. Fuel cycle facilities were developed and deployed without consideration of the waste management implications. This led to the fuel cycle model of a geological repository site with a single owner, a single function (disposal), and no other facilities on site. Recent studies indicate large economic, safety, repository performance, nonproliferation, and institutional incentives to collocate and integrate all back-end facilities. Site functions could include geological disposal of spent nuclear fuel (SNF) with the option for future retrievability, disposal of other wastes, reprocessing with fuel fabrication, radioisotope production, other facilities that generate significant radioactive wastes, SNF inspection (navy and commercial), and related services such as SNF safeguards equipment testing and training. This implies a site with multiple facilities with different owners sharing some facilities and using common facilities - the repository and SNF receiving. This requires a different repository site institutional structure. We propose development of repository site authorities modeled after airport authorities. Airport authorities manage airports with government-owned runways, collocated or shared public and private airline terminals, commercial and federal military facilities, aircraft maintenance bases, and related operations - all enabled and benefiting the high-value runway asset and access to it via taxi ways. With a repository site authority the high value asset is the repository. The SNF and HLW receiving and storage facilities (equivalent to the airport terminal) serve the repository, any future reprocessing plants, and others with needs for access to SNF and other wastes. Non-public special-built roadways and on-site rail lines (equivalent to taxi ways) connect facilities. Airport authorities are typically chartered by state governments and managed by commissions with members

  14. Airport noise complaint patterns and interviews of frequent complainers at two major air carrier airports

    NASA Astrophysics Data System (ADS)

    Jaggers, Nicholas; Eiff, Gary

    2005-09-01

    The complex and highly sensitive topic of aircraft noise and population annoyance continues to be a major inhibitor to airport development plans. The projected growth of air travel necessitates expanded capacity at many existing airports and the development and construction of new airports in order to accommodate burgeoning traveler needs. Concerns by citizens near major airports about their economic, health, and social welfare continue to generate community and individual declarations of annoyance and concern which threaten timely solutions to airport expansion plans. A deeper understanding of the nature of these concerns is important to more effectively cope with airport expansion concerns among adjacent communities and surrounding neighbors. This study analyzed existing noise complaints registered at Denver International Airport (DEN) and Fort Lauderdale/Hollywood International Airport (FLL) in an attempt to gain greater understanding of noise complaint drivers and public annoyance. Interviews of frequent complainers were utilized in order to gain richer data concerning individual annoyance issues.

  15. 78 FR 22024 - Request To Release Airport Property at the Oakley Municipal Airport (OEL), Oakley, Kansas

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ...), Oakley, Kansas, under the provisions of 49 U.S.C. 47107(h)(2). DATES: Comments must be received on or... 2.5 acres of airport property at the Oakley Municipal Airport (OEL) under the provisions of 49...

  16. 76 FR 31823 - Technical Amendment to List of User Fee Airports: Addition of Dallas Love Field Municipal Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-02

    ... Airports: Addition of Dallas Love Field Municipal Airport, Dallas, TX AGENCY: U.S. Customs and Border... revising the list of user fee airports to reflect the recent user fee airport designation for Dallas Love... of user fee status for Dallas Love Field Municipal Airport. This document updates the list of...

  17. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security Directives and Information Circulars. 1542.303 Section 1542.303 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.303...

  18. Airport electrotechnology resource guide. Final report

    SciTech Connect

    Geba, V.; Nesbit, M.

    1998-06-01

    Electrotechnologies offer utilities a cutting edge marketing tool to work with airport customers to increase passenger comfort, and achieve environmental and economic goals. At the same time, utility objectives such as customer retention, and revenue and sales goals can be enhanced. This guide provides electric utility marketing staff with the necessary information to market electrotechnologies in airport applications. The airport industry is profiled and an overview of airport building, infrastructure technologies and electric vehicles is provided. In addition, the guide offers market strategies for customer targeting, market research, market plan development and development of trade ally partnerships.

  19. FAA Airport Design Competition for Universities

    NASA Technical Reports Server (NTRS)

    Sandy, Mary

    2008-01-01

    Raise awareness of the importance of airports to the National Airspace System infrastructure. Increase the involvement of the academic community in addressing airport operations and infrastructure issues and needs. Engage U.S. students in the conceptualization of applications, systems and equipment capable of addressing related challenges in a robust, reliable and comprehensive manner. Encourage U.S. undergraduate and graduate students to contribute innovative ideas and solutions to airport and runway safety issues. Provide the framework and incentives for quality educational experiences for university students. d Develop an awareness of and an interest in airports as a vital and interesting area for engineering and technology careers.

  20. 76 FR 54287 - Notice of Intent To Release Federally-Obligated Airport Properties, Tampa International Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-31

    ..., and the FAA Airports District Office, 5950 Hazeltine National Drive, Suite 400, Orlando, FL 32822... Manager, Orlando Airports District Office, 5950 Hazeltine National Drive, Suite 400, Orlando, FL 32822-5024. FOR FURTHER INFORMATION CONTACT: Rebecca R. Henry, Program Manager, Orlando Airports...

  1. Emergency Preparedness for Catastrophic Events at Small and Medium Sized Airports: Lacking or Not?

    NASA Technical Reports Server (NTRS)

    Sweet, Kathleen M.

    2007-01-01

    The implementation of security methods and processes in general has had a decisive impact on the aviation industry. However, efforts to effectively coordinate varied aspects of security protocols between agencies and general aviation components have not been adequately addressed. Whether or not overall security issues, especially with regard to planning for catastrophic terrorist events, have been neglected at the nation's smaller airports is the main topic of this paper. For perspective, the term general aviation is generally accepted to include all flying except for military and scheduled airline operations. Genera aviation makes up more than 1 percent of the U.S. Gross Domestic Product and supports almost 1.3 mission high-skilled jobs in professional services and manufacturing and hence is an important component of the aviation industry (AOPA, n.d.). In both conceptual and practical terms, this paper argues for the proactive management of security planning and repeated security awareness training from both an individual and an organizational perspective within the general aviation venue. The results of a research project incorporating survey data from general aviation and small commercial airport managers as well as Transportation Security Administration (TSA) employees are reported. Survey findings suggest that miscommunication does take place on different organizational levels and that between TSA employees and airport management interaction can be contentious and cooperation diminished. The importance of organizational training for decreasing conflict and increasing security and preparedness is discussed as a primary implication.

  2. 78 FR 20168 - Notice of Intent To Rule on Request To Release Airport Property at the Boulder Municipal Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-03

    ... Boulder Municipal Airport, Boulder, CO AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice... real property for airport purposes pursuant to Section 16 of the Federal Airport Act (60 Stat. 179)...

  3. Compilation of Disruptions to Airports by Volcanic Activity (Version 1.0, 1944-2006)

    USGS Publications Warehouse

    Guffanti, Marianne; Mayberry, Gari C.; Casadevall, Thomas J.; Wunderman, Richard

    2008-01-01

    Volcanic activity has caused significant hazards to numerous airports worldwide, with local to far-ranging effects on travelers and commerce. To more fully characterize the nature and scope of volcanic hazards to airports, we collected data on incidents of airports throughout the world that have been affected by volcanic activity, beginning in 1944 with the first documented instance of damage to modern aircraft and facilities in Naples, Italy, and extending through 2006. Information was gleaned from various sources, including news outlets, volcanological reports (particularly the Smithsonian Institution's Bulletin of the Global Volcanism Network), and previous publications on the topic. This report presents the full compilation of the data collected. For each incident, information about the affected airport and the volcanic source has been compiled as a record in a Microsoft Access database. The database is incomplete in so far as incidents may not have not been reported or documented, but it does present a good sample from diverse parts of the world. Not included are en-route diversions to avoid airborne ash clouds at cruise altitudes. The database has been converted to a Microsoft Excel spreadsheet. To make the PDF version of table 1 in this open-file report resemble the spreadsheet, order the PDF pages as 12, 17, 22; 13, 18, 23; 14, 19, 24; 15, 20, 25; and 16, 21, 26. Analysis of the database reveals that, at a minimum, 101 airports in 28 countries were impacted on 171 occasions from 1944 through 2006 by eruptions at 46 volcanoes. The number of affected airports (101) probably is better constrained than the number of incidents (171) because recurring disruptions at a given airport may have been lumped together or not reported by news agencies, whereas the initial disruption likely is noticed and reported and thus the airport correctly counted.

  4. 75 FR 39091 - Airport Privatization Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-07

    ... Program (62 FR 48693). A request for participation in the Pilot Program must be initiated by the filing of... Mu oz Mar n International Airport (SJU), San Juan, Puerto Rico. SUMMARY: The Federal Aviation... December 1, 2009. The Puerto Rico Ports Authority, the airport sponsor, may select a private...

  5. 40 CFR 258.10 - Airport safety.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false Airport safety. 258.10 Section 258.10 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES CRITERIA FOR MUNICIPAL SOLID WASTE LANDFILLS Location Restrictions § 258.10 Airport safety. (a) Owners or operators of new MSWLF units, existing MSWLF units,...

  6. 40 CFR 258.10 - Airport safety.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Airport safety. 258.10 Section 258.10 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES CRITERIA FOR MUNICIPAL SOLID WASTE LANDFILLS Location Restrictions § 258.10 Airport safety. (a) Owners or operators of...

  7. 40 CFR 258.10 - Airport safety.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false Airport safety. 258.10 Section 258.10 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES CRITERIA FOR MUNICIPAL SOLID WASTE LANDFILLS Location Restrictions § 258.10 Airport safety. (a) Owners or operators of new MSWLF units, existing MSWLF units,...

  8. 14 CFR 141.38 - Airports.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Airports. 141.38 Section 141.38 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) SCHOOLS AND OTHER CERTIFICATED AGENCIES PILOT SCHOOLS Personnel, Aircraft, and Facilities Requirements § 141.38 Airports. (a) An applicant for a pilot...

  9. 14 CFR 141.38 - Airports.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Airports. 141.38 Section 141.38 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) SCHOOLS AND OTHER CERTIFICATED AGENCIES PILOT SCHOOLS Personnel, Aircraft, and Facilities Requirements § 141.38 Airports. (a) An applicant for a pilot...

  10. 14 CFR 141.38 - Airports.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Airports. 141.38 Section 141.38 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) SCHOOLS AND OTHER CERTIFICATED AGENCIES PILOT SCHOOLS Personnel, Aircraft, and Facilities Requirements § 141.38 Airports. (a) An applicant for a pilot...

  11. 40 CFR 258.10 - Airport safety.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false Airport safety. 258.10 Section 258.10 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES CRITERIA FOR MUNICIPAL SOLID WASTE LANDFILLS Location Restrictions § 258.10 Airport safety. (a) Owners or operators of...

  12. 40 CFR 258.10 - Airport safety.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 26 2012-07-01 2011-07-01 true Airport safety. 258.10 Section 258.10 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES CRITERIA FOR MUNICIPAL SOLID WASTE LANDFILLS Location Restrictions § 258.10 Airport safety. (a) Owners or operators of...

  13. Airport Economics: Management Control Financial Reporting Systems

    NASA Technical Reports Server (NTRS)

    Buchbinder, A.

    1972-01-01

    The development of management control financial reporting systems for airport operation is discussed. The operation of the system to provide the reports required for determining the specific revenue producing facilities of airports is described. The organization of the cost reporting centers to show the types of information provided by the system is analyzed.

  14. 14 CFR 141.38 - Airports.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Airports. 141.38 Section 141.38 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) SCHOOLS AND OTHER CERTIFICATED AGENCIES PILOT SCHOOLS Personnel, Aircraft, and Facilities Requirements § 141.38 Airports. (a) An applicant for a pilot...

  15. 14 CFR 135.229 - Airport requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Airport requirements. 135.229 Section 135.229 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED... Operating Limitations and Weather Requirements § 135.229 Airport requirements. (a) No certificate holder...

  16. 14 CFR 135.229 - Airport requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Airport requirements. 135.229 Section 135.229 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED... Operating Limitations and Weather Requirements § 135.229 Airport requirements. (a) No certificate holder...

  17. 14 CFR 135.229 - Airport requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Airport requirements. 135.229 Section 135.229 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED... Operating Limitations and Weather Requirements § 135.229 Airport requirements. (a) No certificate holder...

  18. 14 CFR 135.229 - Airport requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Airport requirements. 135.229 Section 135.229 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED... Operating Limitations and Weather Requirements § 135.229 Airport requirements. (a) No certificate holder...

  19. 14 CFR 135.229 - Airport requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Airport requirements. 135.229 Section 135.229 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED... Operating Limitations and Weather Requirements § 135.229 Airport requirements. (a) No certificate holder...

  20. Career Unit. Careers at an Airport.

    ERIC Educational Resources Information Center

    Booker, Billie

    This career exploration instructional unit on airport careers is one of several resulting from the rural southwestern Colorado CEPAC Project (Career Education Process of Attitude Change). This unit is designed to help students become aware of the different types of jobs connected with running an airport (e.g., ticket agent, pilot, skycap, traffic…

  1. World-wide precision airports for SVS

    NASA Astrophysics Data System (ADS)

    Schiefele, Jens; Lugsch, Bill; Launer, Marc; Baca, Diana

    2004-08-01

    Future cockpit and aviation applications require high quality airport databases. Accuracy, resolution, integrity, completeness, traceability, and timeliness [1] are key requirements. For most aviation applications, attributed vector databases are needed. The geometry is based on points, lines, and closed polygons. To document the needs for aviation industry RTCA and EUROCAE developed in a joint committee, the DO-272/ED-99 document. It states industry needs for data features, attributes, coding, and capture rules for Airport Mapping Databases (AMDB). This paper describes the technical approach Jeppesen has taken to generate a world-wide set of three-hundred AMDB airports. All AMDB airports are DO-200A/ED-76 [1] and DO-272/ED-99 [2] compliant. Jeppesen airports have a 5m (CE90) accuracy and an 10-3 integrity. World-wide all AMDB data is delivered in WGS84 coordinates. Jeppesen continually updates the databases.

  2. Siting Solar Photovoltaics at Airports: Preprint

    SciTech Connect

    Kandt, A.; Romero, R.

    2014-06-01

    Airports present a significant opportunity for hosting solar technologies due to their open land; based on a 2010 Federal Aviation Administration study, the US Department of Agriculture, and the US Fish and Wildlife Service, there's potential for 116,704 MW of solar photovoltaics (PV) on idle lands at US airports. PV has a low profile and likely low to no impact on flight operations. This paper outlines guidance for implementing solar technologies at airports and airfields, focusing largely on the Federal Aviation Administration's policies. The paper also details best practices for siting solar at airports, provides information on the Solar Glare Hazard Analysis Tool, and highlights a case study example where solar has been installed at an airport.

  3. Airport noise impact reduction through operations

    NASA Technical Reports Server (NTRS)

    Deloach, R.

    1981-01-01

    The airport-noise levels and annoyance model (ALAMO) developed at NASA Langley Research Center is comprised of a system of computer programs which is capable of quantifying airport community noise impact in terms of noise level, population distribution, and human subjective response to noise. The ALAMO can be used to compare the noise impact of an airport's current operating scenario with the noise impact which would result from some proposed change in airport operations. The relative effectiveness of number of noise-impact reduction alternatives is assessed for a major midwest airport. Significant reductions in noise impact are predicted for certain noise abatement strategies while others are shown to result in relatively little noise relief.

  4. Airport cleanup rises above problems

    SciTech Connect

    Pressly, N.; Lucas, B.; Frumer, B.; Roth, R.

    1996-07-01

    Engineers used a treatment combination to improve the in-situ bioremediation system`s efficiency in removing underground fuel leaks at JFK Airport. John F. Kennedy International Airport, in New York City, on Jamaica Bay, has an above-ground storage capacity of about 32 million gallons of jet fuel, which flow through about 50 miles of high-pressure underground pipe to the central terminal area. EAch terminal`s fuel hydrant system was the major source os subsurface contamination at the site. The site is covered by 1 to 1.5 feet of reinforced concrete pavement. Liquid phase jet fuel (free product) was measured on the water table with true thickness ranging from less than 1 inch to 1 foot. After analysis of core samples, contamination was found adsorbed to the soil with maximum levels at the water table. This article describes the clean up, covering the following topics: microbial conditions during system operation; above-ground treatment challenges: free product emulsification, presence of biomass; evaluation of enhancements: dissolved air floatation, coagulation and flocculation, retention time adjustments; conclusions.

  5. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  6. 75 FR 76928 - Safety Management System for Certificated Airports; Extension of Comment Period

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-10

    ... Statement can be found in the Federal Register published on April 11, 2000 (65 FR 19477-19478), as well as... ``Safety Management System for Certificated Airports'' (75 FR 62008). Comments to that document were to be..._policies or 3. Accessing the Government Printing Office's Web page at...

  7. Security during the Construction of New Nuclear Power Plants: Technical Basis for Access Authorization and Fitness-For-Duty Requirements

    SciTech Connect

    Branch, Kristi M.; Baker, Kathryn A.

    2009-09-01

    A technical letter report to the NRC summarizing the findings of a benchmarking study, literature review, and workshop with experts on current industry standards and expert judgments about needs for security during the construction phase of critical infrastructure facilities in the post-September 11 U.S. context, with a special focus on the construction phase of nuclear power plants and personnel security measures.

  8. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security of the air operations area (AOA). 1542.203 Section 1542.203 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the...

  9. 78 FR 65417 - Notice of Request To Release Airport Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-31

    ... Regional Airport (EAR), Kearney, Nebraska. SUMMARY: The FAA proposes to rule and invites public comment on... request to release approximately 67.72 acres of airport property at the Kearney Regional Airport (EAR... property at the Kearney Regional Airport (EAR) submitted by the Sponsor meets the procedural...

  10. 43 CFR 2651.6 - Airport and air navigation facilities.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 43 Public Lands: Interior 2 2012-10-01 2012-10-01 false Airport and air navigation facilities... Village Selections § 2651.6 Airport and air navigation facilities. (a) Every airport and air navigation.... (b) The surface of all other lands of existing airport sites, airway beacons, or other...

  11. 43 CFR 2651.6 - Airport and air navigation facilities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 43 Public Lands: Interior 2 2013-10-01 2013-10-01 false Airport and air navigation facilities... Village Selections § 2651.6 Airport and air navigation facilities. (a) Every airport and air navigation.... (b) The surface of all other lands of existing airport sites, airway beacons, or other...

  12. 43 CFR 2651.6 - Airport and air navigation facilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 43 Public Lands: Interior 2 2014-10-01 2014-10-01 false Airport and air navigation facilities... Village Selections § 2651.6 Airport and air navigation facilities. (a) Every airport and air navigation.... (b) The surface of all other lands of existing airport sites, airway beacons, or other...

  13. 43 CFR 2651.6 - Airport and air navigation facilities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 2 2011-10-01 2011-10-01 false Airport and air navigation facilities... Village Selections § 2651.6 Airport and air navigation facilities. (a) Every airport and air navigation.... (b) The surface of all other lands of existing airport sites, airway beacons, or other...

  14. 14 CFR 139.325 - Airport emergency plan.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... water or marsh lands adjacent to the airport that are crossed by the approach and departure flight paths... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Airport emergency plan. 139.325 Section 139... AIRPORTS Operations § 139.325 Airport emergency plan. (a) In a manner authorized by the Administrator,...

  15. 14 CFR 139.325 - Airport emergency plan.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... water or marsh lands adjacent to the airport that are crossed by the approach and departure flight paths... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Airport emergency plan. 139.325 Section 139... AIRPORTS Operations § 139.325 Airport emergency plan. (a) In a manner authorized by the Administrator,...

  16. 14 CFR 139.325 - Airport emergency plan.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... water or marsh lands adjacent to the airport that are crossed by the approach and departure flight paths... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Airport emergency plan. 139.325 Section 139... AIRPORTS Operations § 139.325 Airport emergency plan. (a) In a manner authorized by the Administrator,...

  17. 14 CFR 152.107 - Project eligibility: Airport development.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Project eligibility: Airport development....107 Project eligibility: Airport development. (a) Except in the case of approved stage development, each project for airport development must provide for— (1) Development of an airport or unit of...

  18. 14 CFR 152.107 - Project eligibility: Airport development.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Project eligibility: Airport development....107 Project eligibility: Airport development. (a) Except in the case of approved stage development, each project for airport development must provide for— (1) Development of an airport or unit of...

  19. 19 CFR 122.13 - List of international airports.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false List of international airports. 122.13 Section 122... THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.13 List of international airports. The following is a list of international airports of entry designated by the Secretary of the Treasury....

  20. 19 CFR 122.11 - Designation as international airport.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Designation as international airport. 122.11...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.11 Designation as international airport. (a) Procedure. International airports, as defined in § 122.1(e), will be designated after...

  1. 19 CFR 122.11 - Designation as international airport.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Designation as international airport. 122.11...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.11 Designation as international airport. (a) Procedure. International airports, as defined in § 122.1(e), will be designated after...

  2. 19 CFR 122.11 - Designation as international airport.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Designation as international airport. 122.11...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.11 Designation as international airport. (a) Procedure. International airports, as defined in § 122.1(e), will be designated after...

  3. 19 CFR 122.13 - List of international airports.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false List of international airports. 122.13 Section 122... THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.13 List of international airports. The following is a list of international airports of entry designated by the Secretary of the Treasury....

  4. 19 CFR 122.11 - Designation as international airport.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Designation as international airport. 122.11...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.11 Designation as international airport. (a) Procedure. International airports, as defined in § 122.1(e), will be designated after...

  5. 19 CFR 122.11 - Designation as international airport.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Designation as international airport. 122.11...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.11 Designation as international airport. (a) Procedure. International airports, as defined in § 122.1(e), will be designated after...

  6. 19 CFR 122.13 - List of international airports.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false List of international airports. 122.13 Section 122... THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.13 List of international airports. The following is a list of international airports of entry designated by the Secretary of the Treasury....

  7. 19 CFR 122.13 - List of international airports.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false List of international airports. 122.13 Section 122... THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.13 List of international airports. The following is a list of international airports of entry designated by the Secretary of the Treasury....

  8. 19 CFR 122.13 - List of international airports.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false List of international airports. 122.13 Section 122... THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.13 List of international airports. The following is a list of international airports of entry designated by the Secretary of the Treasury....

  9. 14 CFR 121.625 - Alternate Airport weather minima.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Alternate Airport weather minima. 121.625... Alternate Airport weather minima. Except as provided in § 121.624 for ETOPS Alternate Airports, no person may list an airport as an alternate in the dispatch or flight release unless the appropriate...

  10. 14 CFR 121.625 - Alternate Airport weather minima.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Alternate Airport weather minima. 121.625... Alternate Airport weather minima. Except as provided in § 121.624 for ETOPS Alternate Airports, no person may list an airport as an alternate in the dispatch or flight release unless the appropriate...

  11. 14 CFR 121.625 - Alternate Airport weather minima.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Alternate Airport weather minima. 121.625... Alternate Airport weather minima. Except as provided in § 121.624 for ETOPS Alternate Airports, no person may list an airport as an alternate in the dispatch or flight release unless the appropriate...

  12. 14 CFR 125.369 - Alternate airport weather minimums.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Alternate airport weather minimums. 125.369... § 125.369 Alternate airport weather minimums. No person may list an airport as an alternate airport in the flight release unless the appropriate weather reports or forecasts, or any combination...

  13. 14 CFR 125.369 - Alternate airport weather minimums.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Alternate airport weather minimums. 125.369... § 125.369 Alternate airport weather minimums. No person may list an airport as an alternate airport in the flight release unless the appropriate weather reports or forecasts, or any combination...

  14. 14 CFR 125.369 - Alternate airport weather minimums.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Alternate airport weather minimums. 125.369... § 125.369 Alternate airport weather minimums. No person may list an airport as an alternate airport in the flight release unless the appropriate weather reports or forecasts, or any combination...

  15. 78 FR 9770 - Notice of Request to Release Airport Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-11

    ... at the Colonel James Jabara Airport (AAO), Wichita, KS. SUMMARY: The FAA proposes to rule and invites public comment on the release of land at the Colonel James Jabara Airport (AAO), Wichita, Kansas, under... D. Martin, Airports Compliance Specialist, Federal Aviation Administration, Airports Division,...

  16. 14 CFR 93.123 - High density traffic airports.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 2 2011-01-01 2011-01-01 false High density traffic airports. 93.123... (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES High Density Traffic Airports § 93.123 High density traffic airports. (a) Each of the following airports is designated as a...

  17. 14 CFR 93.123 - High density traffic airports.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 2 2013-01-01 2013-01-01 false High density traffic airports. 93.123... (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES High Density Traffic Airports § 93.123 High density traffic airports. (a) Each of the following airports is designated as a...

  18. 14 CFR 93.123 - High density traffic airports.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 2 2014-01-01 2014-01-01 false High density traffic airports. 93.123... (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES High Density Traffic Airports § 93.123 High density traffic airports. (a) Each of the following airports is designated as a...

  19. 14 CFR 93.123 - High density traffic airports.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 2 2012-01-01 2012-01-01 false High density traffic airports. 93.123... (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES High Density Traffic Airports § 93.123 High density traffic airports. (a) Each of the following airports is designated as a...

  20. 14 CFR 93.123 - High density traffic airports.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false High density traffic airports. 93.123... (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES High Density Traffic Airports § 93.123 High density traffic airports. (a) Each of the following airports is designated as a...

  1. 14 CFR 125.369 - Alternate airport weather minimums.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Alternate airport weather minimums. 125.369... § 125.369 Alternate airport weather minimums. No person may list an airport as an alternate airport in the flight release unless the appropriate weather reports or forecasts, or any combination...

  2. 14 CFR 121.625 - Alternate Airport weather minima.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Alternate Airport weather minima. 121.625... Alternate Airport weather minima. Except as provided in § 121.624 for ETOPS Alternate Airports, no person may list an airport as an alternate in the dispatch or flight release unless the appropriate...

  3. 14 CFR 121.625 - Alternate Airport weather minima.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Alternate Airport weather minima. 121.625... Alternate Airport weather minima. Except as provided in § 121.624 for ETOPS Alternate Airports, no person may list an airport as an alternate in the dispatch or flight release unless the appropriate...

  4. 14 CFR 125.369 - Alternate airport weather minimums.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Alternate airport weather minimums. 125.369... § 125.369 Alternate airport weather minimums. No person may list an airport as an alternate airport in the flight release unless the appropriate weather reports or forecasts, or any combination...

  5. 14 CFR 152.325 - Financial status report: Airport planning.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Accounting and Reporting Requirements § 152.325 Financial... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Financial status report: Airport planning... agency conducting a project for airport system planning shall submit a financial status report on a...

  6. 14 CFR 152.107 - Project eligibility: Airport development.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Project eligibility: Airport development....107 Project eligibility: Airport development. (a) Except in the case of approved stage development, each project for airport development must provide for— (1) Development of an airport or unit of...

  7. 14 CFR 152.107 - Project eligibility: Airport development.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Project eligibility: Airport development....107 Project eligibility: Airport development. (a) Except in the case of approved stage development, each project for airport development must provide for— (1) Development of an airport or unit of...

  8. 14 CFR 152.107 - Project eligibility: Airport development.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Project eligibility: Airport development....107 Project eligibility: Airport development. (a) Except in the case of approved stage development, each project for airport development must provide for— (1) Development of an airport or unit of...

  9. 14 CFR 139.325 - Airport emergency plan.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Airport emergency plan. 139.325 Section 139... AIRPORTS Operations § 139.325 Airport emergency plan. (a) In a manner authorized by the Administrator, each certificate holder must develop and maintain an airport emergency plan designed to minimize the...

  10. Creating a Clinical Video-Conferencing Facility in a Security-Constrained Environment Using Open-Source AccessGrid Software and Consumer Hardware

    PubMed Central

    Terrazas, Enrique; Hamill, Timothy R.; Wang, Ye; Channing Rodgers, R. P.

    2007-01-01

    The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components. PMID:18693930

  11. Collision Avoidance for Airport Traffic Simulation Evaluation

    NASA Technical Reports Server (NTRS)

    Jones, Denise R.; Prinzel, Lawrence J., III; Shelton, Kevin J.; Bailey, Randall E.; Otero, Sharon D.; Barker, Glover D.

    2010-01-01

    A Collision Avoidance for Airport Traffic (CAAT) concept for the airport Terminal Maneuvering Area (TMA) was evaluated in a simulation study at the National Aeronautics and Space Administration (NASA) Langley Research Center. CAAT is being designed to enhance surface situation awareness and provide cockpit alerts of potential conflicts during runway, taxi, and low altitude air-to-air operations. The purpose of the study was to evaluate pilot reaction to conflict events in the TMA near the airport, different alert timings for various scenarios, alerting display concepts, and directive alerting concepts. This paper gives an overview of the conflict detection and resolution (CD&R) concept, simulation study, and test results

  12. Surface Operations Systems Improve Airport Efficiency

    NASA Technical Reports Server (NTRS)

    2009-01-01

    With Small Business Innovation Research (SBIR) contracts from Ames Research Center, Mosaic ATM of Leesburg, Virginia created software to analyze surface operations at airports. Surface surveillance systems, which report locations every second for thousands of air and ground vehicles, generate massive amounts of data, making gathering and analyzing this information difficult. Mosaic?s Surface Operations Data Analysis and Adaptation (SODAA) tool is an off-line support tool that can analyze how well the airport surface operation is working and can help redesign procedures to improve operations. SODAA helps researchers pinpoint trends and correlations in vast amounts of recorded airport operations data.

  13. School Security.

    ERIC Educational Resources Information Center

    Bete, Tim, Ed.

    1998-01-01

    Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…

  14. 75 FR 9017 - Orders Limiting Scheduled Operations at John F. Kennedy International Airport, LaGuardia Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-26

    ... CFR Sec. 93.227 (DCA); 74 FR 51648 (Oct. 7, 2009) (EWR); 74 FR 51650 (Oct. 7, 2009) (JFK); 74 FR 51653... Airport, LaGuardia Airport and Newark Liberty International Airport; High Density Rule at Reagan National... Density Rule and orders limiting scheduled operations at the airports, slots must be used at least...

  15. Security for grids

    SciTech Connect

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  16. 14 CFR 125.49 - Airport requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) No pilot of an airplane carrying passengers at night may take off from, or land on, an airport unless...: AIRPLANES HAVING A SEATING CAPACITY OF 20 OR MORE PASSENGERS OR A MAXIMUM PAYLOAD CAPACITY OF 6,000...

  17. 14 CFR 125.49 - Airport requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) No pilot of an airplane carrying passengers at night may take off from, or land on, an airport unless...: AIRPLANES HAVING A SEATING CAPACITY OF 20 OR MORE PASSENGERS OR A MAXIMUM PAYLOAD CAPACITY OF 6,000...

  18. 75 FR 68018 - Airport Privatization Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-04

    ... procedures to be used in applications for exemption under Airport Privatization Pilot Program (62 FR 48693... public review at http://www.regulations.gov . The docket number is FAA Docket Number 2010-1052....

  19. Aircraft and airport noise control prospective outlook

    SciTech Connect

    Shapiro, N.

    1982-01-01

    In a perspective look at aircraft and airport noise control over the past ten years or more - or more is added here because the Federal Aviation Regulation Part 36 of 1969 is a more significant milestone for the air transportation system than is the Noise Control Act of 1972 - we see an appreciable reduction in the noise emitted by newly designed and newly produced airplanes, particularly those powered by the new high bypass engines, but only, at best, a moderate alleviation of airport noise. The change in airport noise exposure was the consequence of the introduction of some new, quieter airplanes into the airlines fleets and some operational modifications or restrictions at the airports.

  20. Pilot preference and procedures at uncontrolled airports

    NASA Technical Reports Server (NTRS)

    Parker, L. C.

    1975-01-01

    The report presents the results of a pilot questionnaire utilized at the 1974 Reading, Pennsylvania Air Show to obtain data on pilot procedures and preference in the terminal airspace of uncontrolled airports.

  1. False security or greater social inclusion? Exploring perceptions of CCTV use in public and private spaces accessed by the homeless.

    PubMed

    Huey, Laura

    2010-03-01

    It has been well documented that owing to the vulnerability inherent in their situation and status, the homeless experience high rates of harassment and criminal victimization. And yet, the question of whether CCTV surveillance of public and private spaces - so frequently viewed by the middle classes as a positive source of potential security - might also be viewed by the homeless in similar ways. Within the present paper, I address this issue by considering the possibility that CCTV might be seen by some homeless men and women as offering: a) a measure of enhanced security for those living in the streets and in shelters, and; b) to the extent that security is conceived of as a social good, the receipt of which marks one as a citizen of the state, a means by which they can be reconstituted as something more than 'lesser citizens'. To test these ideas, I rely on data from interviews conducted with homeless service users, service providers for the homeless, and police personnel in three cities. What is revealed is a mixed set of beliefs as to the relative security and meaning of CCTV. PMID:20377597

  2. 76 FR 21420 - Policy and Procedures Concerning the Use of Airport Revenue; Policy Regarding Airport Rates and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-15

    ...This notice requests comments on a petition to accept an air service incentive program at McCarran International Airport (Airport) as consistent with Federal law and policies on the use of airport revenue and on airport rates and charges. The petitioner Clark County Department of Aviation is the owner and operator of the Airport. The petitioner is the recipient of Federal grants under the......

  3. Airport Noise Tech Challenge Overview

    NASA Technical Reports Server (NTRS)

    Bridges, James

    2011-01-01

    The Supersonics Project, operating under NASA Aeronautics Mission Directorate#s Fundamental Aero Program, has been organized around the Technical Challenges that have historically precluded commercial supersonic flight. One of these Challenges is making aircraft that are capable of such high aerodynamic performance quiet enough around airports that they will not be objectionable. It is recognized that a successful civilian supersonic aircraft will be a system where many new technologies will come together, and for this to happen not only will new low noise propulsion concepts be required, but new engineering tools that predict the noise of the aircraft as these technologies are combined and compromised with the rest of the aircraft design. These are the two main objectives of the Airport Noise Tech Challenge. " ! As a Project in the Fundamental Aero Program, we work at a relatively low level of technology readiness. However, we have high level milestones which force us to integrate our efforts to impact systems-level activities. To keep the low-level work tied to delivering engineering tools and low-noise concepts, we have structured our milestones around development of the concepts and organized our activities around developing and applying our engineering tools to these concepts. The final deliverables in these milestones are noise prediction modules validated against the best embodiment of each concept. These will then be used in cross-disciplinary exercises to demonstrate the viability of aircraft designs to meet all the Technical Challenges. Some of the concepts being developed are shown: Fan Flow Diverters, Multi-jet Shielding, High-Aspect Ratio Embedded Nozzles, Plasma Actuated Instability Manipulation, Highly Variable Cycle Mixer- Ejectors, and Inverted Velocity Profiles. These concepts are being developed for reduced jet noise along with the design tools which describe how they perform when used in various aircraft configurations. Several key upcoming

  4. Prediction of Weather Impacted Airport Capacity using Ensemble Learning

    NASA Technical Reports Server (NTRS)

    Wang, Yao Xun

    2011-01-01

    Ensemble learning with the Bagging Decision Tree (BDT) model was used to assess the impact of weather on airport capacities at selected high-demand airports in the United States. The ensemble bagging decision tree models were developed and validated using the Federal Aviation Administration (FAA) Aviation System Performance Metrics (ASPM) data and weather forecast at these airports. The study examines the performance of BDT, along with traditional single Support Vector Machines (SVM), for airport runway configuration selection and airport arrival rates (AAR) prediction during weather impacts. Testing of these models was accomplished using observed weather, weather forecast, and airport operation information at the chosen airports. The experimental results show that ensemble methods are more accurate than a single SVM classifier. The airport capacity ensemble method presented here can be used as a decision support model that supports air traffic flow management to meet the weather impacted airport capacity in order to reduce costs and increase safety.

  5. 77 FR 44515 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ... limits application of the FAA's previously published interim policy (76 FR 15028; March 18, 2011) to... Statement in the Federal Register published on April 11, 2000 (65 FR 19477-78). Availability of Documents... for public comment in September 2010 (75 FR 54946; September 9, 2010). In March 2011, the...

  6. 75 FR 57829 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-22

    ... Register on September 9, 2010 (75 FR 54946). DATES: Effective September 22, 2010. FOR FURTHER INFORMATION... Administration published a Notice of Proposed Policy in the Federal Register at 75 FR 54946 proposing to amend.... Correction In the Notice published on September 9, 2010 (75 FR 54946) FR Doc. 2010-22095, on page 54947...

  7. Prehospital care at a major international airport.

    PubMed

    Cwinn, A A; Dinerman, N; Pons, P T; Marlin, R

    1988-10-01

    Medical emergencies at a major metropolitan airport have a significant impact on prehospital care capabilities for the rest of the community in which the airport is located. Stapleton International Airport in Denver, Colorado, is a facility that in 1985 had 14.4 million passengers and a static employee population of 12,000 to 15,000. In 1981, there were 1,182 ambulance trips to the airport, 40.4% of which did not result in the transport of a patient. The expense of sending an ambulance and fire engine out on such calls was great, and paramedics were out of service for approximately 300 hours on these nontransport cases. In order to improve prehospital services to the airport and the city, a paramedic has been stationed in the concourse at the airport 16 hours a day since 1982. The records for airport paramedic services for the 12 months ending September 1985 were reviewed. Paramedic services were requested for 1,952 patients. Of these, 696 (35.7%) were transported to hospital by ambulance; 115 (5.9%) went by private car; 284 (14.6%) refused any paramedic care or transport; and 857 (43.9%) were released, after base station contact, with instructions to seek definitive care at the final destination. Presenting complaints were classified into 55 categories and the frequencies and dispositions are described. The most common presentations resulting in transport were chest pain, 110 (5.6%); syncope, 60 (3.1%); psychiatric, 57 (2.9%); abdominal pain, 49 (2.5%); seizure, 36 (1.8%); fracture, 31 (1.6%); and cardiac arrest, 29 (1.5%).(ABSTRACT TRUNCATED AT 250 WORDS) PMID:3177992

  8. Investigation of the 1987 Indianapolis Airport Ramada Inn incident.

    PubMed

    Clark, M A; Hawley, D A; McClain, J L; Pless, J E; Marlin, D C; Standish, S M

    1994-05-01

    On October 20, 1987, a military reserve aircraft lost power during a transcontinental flight and attempted an emergency landing at The Indianapolis International Airport. The pilot ejected and the disabled and pilotless aircraft struck a bank building. It then skidded across the street and entered the lobby of The Airport Ramada Inn where it exploded. This incident was unusual in that the fatal injuries occurred in individuals on the ground and not in the occupant of the aircraft. Seven people were killed in the lobby area and two were trapped in a laundry where they died of smoke inhalation. A tenth person died of burns ten days later. Minor injuries were reported among four hotel guests, two firefighters and the Air Force pilot. A multiagency mass disaster-plan had been formulated and rehearsed in preparation for the Panamerican Games, which had been held in Indianapolis in August 1987. A number of volunteers arrived before a security perimeter was established. They began an undocumented removal of the bodies from the scene and were about to remove valuables for "safekeeping" when stopped by coroners' office personnel. Fatalities resulted from smoke inhalation, burns or a combination. Bodies were identified by a combination of dental records, personal effects and visual means within 24 hours. The problems encountered in managing this disaster scene will also be compared with previously reported incidents. PMID:8006612

  9. 14 CFR Appendix D to Part 91 - Airports/Locations: Special Operating Restrictions

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... (Baltimore Washington International Airport) Boston, MA (General Edward Lawrence Logan International Airport) Chantilly, VA (Washington Dulles International Airport) Charlotte, NC (Charlotte/Douglas International...) Honolulu, HI (Honolulu International Airport) Houston, TX (George Bush Intercontinental...

  10. 14 CFR Appendix D to Part 91 - Airports/Locations: Special Operating Restrictions

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... (Baltimore Washington International Airport) Boston, MA (General Edward Lawrence Logan International Airport) Chantilly, VA (Washington Dulles International Airport) Charlotte, NC (Charlotte/Douglas International...) Honolulu, HI (Honolulu International Airport) Houston, TX (George Bush Intercontinental...

  11. 75 FR 78262 - Intent To Request Approval From OMB of One New Public Collection of Information: Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-15

    ...The Transportation Security Administration (TSA) invites public comment on a new Information Collection Request (ICR) (abstracted below) that we will submit to the Office of Management and Budget (OMB) for approval in compliance with the Paperwork Reduction Act (PRA). The ICR describes the nature of the information collection and its expected burden. The collection involves the airport......

  12. 33 CFR 162.20 - Flushing Bay near La Guardia Airport, Flushing, N.Y.; restricted area.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Flushing Bay near La Guardia Airport, Flushing, N.Y.; restricted area. 162.20 Section 162.20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY INLAND WATERWAYS NAVIGATION REGULATIONS § 162.20 Flushing Bay near...

  13. Northern New Mexico regional airport market feasibility

    SciTech Connect

    Drake, R.H.; Williams, D.S.

    1998-06-01

    This report is about the market for airline travel in northern New Mexico. Interest in developing a northern New Mexico regional airport has periodically surfaced for a number of years. The New Mexico State Legislature passed a memorial during the 1998 Second Session calling for the conduct of a study to determine the feasibility of building a new regional airport in NNM. This report is a study of the passenger market feasibility of such an airport. In addition to commercial passenger market feasibility, there are other feasibility issues dealing with siting, environmental impact, noise, economic impact, intermodal transportation integration, region-wide transportation services, airport engineering requirements, and others. These other feasibility issues are not analyzed in any depth in this report although none were discovered to be show-stoppers as a by-product of the authors doing research on the passenger market itself. Preceding the need for a detailed study of these other issues is the determination of the basic market need for an airport with regular commercial airline service in the first place. This report is restricted to an in-depth look at the market for commercial passenger air service in NNM. 20 figs., 8 tabs.

  14. ICAO's anti-SARS airport activities.

    PubMed

    Finkelstein, Silvio; Curdt-Christiansen, Claus M

    2003-11-01

    To prevent SARS from spreading through air travel and in order to rebuild the confidence of the traveling public in the safety of air travel, ICAO has set up an "Anti-SARS Airport Evaluation Project." The first phase of this project was to develop a set of protective measures for international airports in affected areas to adopt and implement and then to send out, on the request of Contracting States, a team of inspectors to evaluate and assess airports and issue a "statement of evaluation" that the airport inspected complies with the ICAO anti-SARS protective measures. In cooperation with the World Health Organization (WHO), the first part of phase 1 was completed in early June this year, and the second part of phase 1 followed soon after. By mid-July, five international airports in Southeast Asia had been inspected and found to be in full compliance with the ICAO anti-SARS protective measures. The success of this ICAO project is believed to have contributed significantly to the recovery of international air travel and related industries now taking place. Phase 2 of the project is now being developed. It is aimed at preventing a resurgence of SARS, but it also contains elements to make the methodology developed applicable to future outbreaks of any other communicable disease in which the mode of transmission could involve aviation and/or the need to prevent the spread of the disease by air travel. PMID:14620481

  15. Yeager Airport Hydrogen Vehicle Test Project

    SciTech Connect

    Davis, Williams

    2015-10-01

    The scope of this project was changed during the course of the project. Phase I of the project was designed to have the National Alternative Fuels Training Consortium (NAFTC), together with its partners, manage the Hydrogen Vehicle Test Project at the Yeager Airport in conjunction with the Central West Virginia Regional Airport Authority (CWVRAA) in coordination with the United States Department of Energy National Energy Technology Laboratory (U.S. DOE NETL). This program would allow testing and evaluation of the use of hydrogen vehicles in the state of West Virginia utilizing the hydrogen fueling station at Yeager Airport. The NAFTC and CWVRAA to raise awareness and foster a greater understanding of hydrogen fuel and hydrogen-powered vehicles through a targeted utilization and outreach and education effort. After initial implementation of the project, the project added, determine the source(s) of supply for hydrogen powered vehicles that could be used for the testing. After completion of this, testing was begun at Yeager Airport. During the course of the project, the station at Yeager Airport was closed and moved to Morgantown and the West Virginia University Research Corporation. The vehicles were then moved to Morgantown and a vehicle owned by the CWVRAA was purchased to complete the project at the new location. Because of a number of issues detailed in the report for DE-FE0002994 and in this report, this project did not get to evaluate the effectiveness of the vehicles as planned.

  16. Occupational Exposure to Ultrafine Particles among Airport Employees - Combining Personal Monitoring and Global Positioning System

    PubMed Central

    Møller, Karina Lauenborg; Thygesen, Lau Caspar; Schipperijn, Jasper; Loft, Steffen; Bonde, Jens Peter; Mikkelsen, Sigurd; Brauer, Charlotte

    2014-01-01

    Background Exposure to ultrafine particles (UFP) has been linked to cardiovascular and lung diseases. Combustion of jet fuel and diesel powered handling equipment emit UFP resulting in potentially high exposure levels among employees working at airports. High levels of UFP have been reported at several airports, especially on the apron, but knowledge on individual exposure profiles among different occupational groups working at an airport is lacking. Purpose The aim of this study was to compare personal exposure to UFP among five different occupational groups working at Copenhagen Airport (CPH). Method 30 employees from five different occupational groups (baggage handlers, catering drivers, cleaning staff and airside and landside security) at CPH were instructed to wear a personal monitor of particle number concentration in real time and a GPS device. The measurements were carried out on 8 days distributed over two weeks in October 2012. The overall differences between the groups were assessed using linear mixed model. Results Data showed significant differences in exposure levels among the groups when adjusted for variation within individuals and for effect of time and date (p<0.01). Baggage handlers were exposed to 7 times higher average concentrations (geometric mean, GM: 37×103 UFP/cm3, 95% CI: 25–55×103 UFP/cm3) than employees mainly working indoors (GM: 5×103 UFP/cm3, 95% CI: 2–11×103 UFP/cm3). Furthermore, catering drivers, cleaning staff and airside security were exposed to intermediate concentrations (GM: 12 to 20×103 UFP/cm3). Conclusion The study demonstrates a strong gradient of exposure to UFP in ambient air across occupational groups of airport employees. PMID:25203510

  17. Aerial overview of the Denver International Airport site, looking southwest ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Aerial overview of the Denver International Airport site, looking southwest - Denver International Airport Site, Between Fifty-sixth & 128th Avenues, Buckley Road & Box Elder Creek, Denver, Denver County, CO

  18. 77 FR 28667 - Land Release for Plattsburgh International Airport

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-15

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Federal Aviation Administration Land Release for Plattsburgh International Airport AGENCY: Federal... Secretary may waive a Sponsor's Federal obligation to use certain airport land for aeronautical use....

  19. The Aviation System Analysis Capability Airport Capacity and Delay Models

    NASA Technical Reports Server (NTRS)

    Lee, David A.; Nelson, Caroline; Shapiro, Gerald

    1998-01-01

    The ASAC Airport Capacity Model and the ASAC Airport Delay Model support analyses of technologies addressing airport capacity. NASA's Aviation System Analysis Capability (ASAC) Airport Capacity Model estimates the capacity of an airport as a function of weather, Federal Aviation Administration (FAA) procedures, traffic characteristics, and the level of technology available. Airport capacity is presented as a Pareto frontier of arrivals per hour versus departures per hour. The ASAC Airport Delay Model allows the user to estimate the minutes of arrival delay for an airport, given its (weather dependent) capacity. Historical weather observations and demand patterns are provided by ASAC as inputs to the delay model. The ASAC economic models can translate a reduction in delay minutes into benefit dollars.

  20. 19 CFR 122.15 - User fee airports.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Register citations affecting § 122.15, see the List of CFR Sections Affected, which appears in the Finding... Airport. Orlando, Florida Orlando Executive Airport. Palm Springs, California Palm Springs...

  1. 19 CFR 122.15 - User fee airports.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Register citations affecting § 122.15, see the List of CFR Sections Affected, which appears in the Finding... Airport. Orlando, Florida Orlando Executive Airport. Palm Springs, California Palm Springs...

  2. 19 CFR 122.15 - User fee airports.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Federal Register citations affecting § 122.15, see the List of CFR Sections Affected, which appears in the... Municipal Airport. Orlando, Florida Orlando Executive Airport. Palm Springs, California Palm...

  3. TRIZ Tool for Optimization of Airport Runway

    NASA Astrophysics Data System (ADS)

    Rao, K. Venkata; Selladurai, V.; Saravanan, R.

    TRIZ tool is used for conceptual design and layout of the novel ascending and descending runway model for the effective utilization of short length airports. Handling bigger aircrafts at smaller airports become the necessity for economic consideration and for the benefit of vast airliners and the aspiring air travelers of the region. The authors’ proposal of ascending and descending runway would enable the operational need of wide body aircrafts such as Boeing 747 and Airbus A380-800. Negotiating take-off and landing of bigger aircrafts at less than 10000 feet runway is an optimization solution. This conceptual model and the theoretical design with its layout is dealt in this paper as Part - I. The computer-aided design and analysis using MATLAB with Simulink tool box to confirm the adequacy of the runway length for the bigger aircrafts at smaller airports is however dealt in subsequent papers.

  4. Structural evolution of the Brazilian airport network

    NASA Astrophysics Data System (ADS)

    da Rocha, Luis E. C.

    2009-04-01

    The aviation sector is profitable, but sensitive to economic fluctuations, geopolitical constraints and governmental regulations. As for other means of transportation, the relation between origin and destination results in a complex map of routes, which can be complemented with information associated with the routes themselves, for instance, frequency, traffic load and distance. The theory of networks provides a natural framework for investigating the dynamics on the resulting structure. Here, we investigate the structure and evolution of the Brazilian airport network (BAN) as regards several quantities: routes, connections, passengers and cargo. Some structural features are in accordance with previous results for other airport networks. The analysis of the evolution of the BAN shows that its structure is dynamic, with changes in the relative relevance of some airports and routes. The results indicate that the connections converge to specific routes. The network shrinks at the route level but grows in number of passengers and amount of cargo, which more than doubled during the period studied.

  5. The noise impact of proposed runway alternatives at Craig Airport

    NASA Technical Reports Server (NTRS)

    Deloach, R.

    1982-01-01

    Four proposed runway expansion alternatives at Craig Airport in Jacksonville, Florida have been assessed with respect to their forecasted noise impact in the year 2005. The assessment accounts for population distributions around the airport and human subjective response to noise, as well as the distribution of noise levels in the surrounding community (footprints). The impact analysis was performed using the Airport-noise Levels and Annoyance Model (ALAMO), an airport community response model recently developd at Langley Research Center.

  6. Secure Large-Scale Airport Simulations Using Distributed Computational Resources

    NASA Technical Reports Server (NTRS)

    McDermott, William J.; Maluf, David A.; Gawdiak, Yuri; Tran, Peter; Clancy, Dan (Technical Monitor)

    2001-01-01

    To fully conduct research that will support the far-term concepts, technologies and methods required to improve the safety of Air Transportation a simulation environment of the requisite degree of fidelity must first be in place. The Virtual National Airspace Simulation (VNAS) will provide the underlying infrastructure necessary for such a simulation system. Aerospace-specific knowledge management services such as intelligent data-integration middleware will support the management of information associated with this complex and critically important operational environment. This simulation environment, in conjunction with a distributed network of supercomputers, and high-speed network connections to aircraft, and to Federal Aviation Administration (FAA), airline and other data-sources will provide the capability to continuously monitor and measure operational performance against expected performance. The VNAS will also provide the tools to use this performance baseline to obtain a perspective of what is happening today and of the potential impact of proposed changes before they are introduced into the system.

  7. Secure portal.

    SciTech Connect

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal

  8. Un Viaje al Aeropuerto (A Trip to the Airport).

    ERIC Educational Resources Information Center

    Federal Aviation Administration (DOT), Washington, DC.

    This illustrated, bilingual Spanish-English intermediate reader describes a class trip to an airport, in which the class tours the airport, and learns about airport activities, the parts of an airplane, and other related topics. Each page of the text is illustrated with a drawing. The narrative is followed by a list of 24 suggested learning…

  9. 14 CFR 151.3 - National Airport Plan.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false National Airport Plan. 151.3 Section 151.3 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS... provide a system of public airports adequate to anticipate and meet the needs of civil aeronautics. (b)...

  10. 14 CFR 151.3 - National Airport Plan.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false National Airport Plan. 151.3 Section 151.3 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS... provide a system of public airports adequate to anticipate and meet the needs of civil aeronautics. (b)...

  11. 14 CFR 151.3 - National Airport Plan.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false National Airport Plan. 151.3 Section 151.3 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS... provide a system of public airports adequate to anticipate and meet the needs of civil aeronautics. (b)...

  12. 14 CFR 151.3 - National Airport Plan.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false National Airport Plan. 151.3 Section 151.3 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS... provide a system of public airports adequate to anticipate and meet the needs of civil aeronautics. (b)...

  13. 14 CFR 151.3 - National Airport Plan.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false National Airport Plan. 151.3 Section 151.3 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS... provide a system of public airports adequate to anticipate and meet the needs of civil aeronautics. (b)...

  14. 76 FR 78967 - Notice of Request To Release Airport Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-20

    ... Administration (FAA), DOT. ACTION: Notice of Intent To Rule on Request to Release Airport Property at the Liberal Mid-America Regional Airport & Airport Industrial Park Liberal, KS. SUMMARY: The FAA proposes to rule and invites public comment on the release of land at the Liberal Mid-America Regional...

  15. 49 CFR 37.33 - Airport transportation systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... systems operated by public airport operators, which provide designated public transportation and connect.... Public airports which operate fixed route transportation systems are subject to the requirements of this... part. (b) Fixed-route transportation systems operated by public airport operators between the...

  16. 14 CFR 137.45 - Nonobservance of airport traffic pattern.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Nonobservance of airport traffic pattern... AGRICULTURAL AIRCRAFT OPERATIONS Operating Rules § 137.45 Nonobservance of airport traffic pattern. Notwithstanding part 91 of this chapter, the pilot in command of an aircraft may deviate from an airport...

  17. 14 CFR 137.45 - Nonobservance of airport traffic pattern.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Nonobservance of airport traffic pattern... AGRICULTURAL AIRCRAFT OPERATIONS Operating Rules § 137.45 Nonobservance of airport traffic pattern. Notwithstanding part 91 of this chapter, the pilot in command of an aircraft may deviate from an airport...

  18. 14 CFR 137.45 - Nonobservance of airport traffic pattern.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Nonobservance of airport traffic pattern... AGRICULTURAL AIRCRAFT OPERATIONS Operating Rules § 137.45 Nonobservance of airport traffic pattern. Notwithstanding part 91 of this chapter, the pilot in command of an aircraft may deviate from an airport...

  19. 14 CFR 137.45 - Nonobservance of airport traffic pattern.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Nonobservance of airport traffic pattern... AGRICULTURAL AIRCRAFT OPERATIONS Operating Rules § 137.45 Nonobservance of airport traffic pattern. Notwithstanding part 91 of this chapter, the pilot in command of an aircraft may deviate from an airport...

  20. 14 CFR 137.45 - Nonobservance of airport traffic pattern.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Nonobservance of airport traffic pattern... AGRICULTURAL AIRCRAFT OPERATIONS Operating Rules § 137.45 Nonobservance of airport traffic pattern. Notwithstanding part 91 of this chapter, the pilot in command of an aircraft may deviate from an airport...

  1. Airports, Hotel, and Ground Transportation Information | Division of Cancer Prevention

    Cancer.gov

    Airports in and near Washington, DC Reagan National Approximate 30 minute drive from Rockville* Has its own Metro stop on the blue and yellow lines in Virginia NOTE: This airport may be the closest and easiest option if not renting a car or do not want to pay for an airport cab/shuttle.   Dulles International Approximate 1 hour drive from Rockville* |

  2. 14 CFR 152.103 - Sponsors: Airport development.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Sponsors: Airport development. 152.103 Section 152.103 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION... Sponsors: Airport development. (a) To be eligible to apply for a project for airport development...

  3. 14 CFR 152.103 - Sponsors: Airport development.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Sponsors: Airport development. 152.103 Section 152.103 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION... Sponsors: Airport development. (a) To be eligible to apply for a project for airport development...

  4. 14 CFR 152.323 - Budget revision: Airport development.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Budget revision: Airport development. 152... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Accounting and Reporting Requirements § 152.323 Budget... change in the budget estimates, the sponsor shall submit a request for budget revision on a...

  5. 14 CFR 152.323 - Budget revision: Airport development.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Budget revision: Airport development. 152... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Accounting and Reporting Requirements § 152.323 Budget... change in the budget estimates, the sponsor shall submit a request for budget revision on a...

  6. 14 CFR 152.323 - Budget revision: Airport development.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Budget revision: Airport development. 152... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Accounting and Reporting Requirements § 152.323 Budget... change in the budget estimates, the sponsor shall submit a request for budget revision on a...

  7. 14 CFR 135.221 - IFR: Alternate airport weather minimums.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false IFR: Alternate airport weather minimums... VFR/IFR Operating Limitations and Weather Requirements § 135.221 IFR: Alternate airport weather minimums. No person may designate an alternate airport unless the weather reports or forecasts, or...

  8. 14 CFR 135.221 - IFR: Alternate airport weather minimums.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false IFR: Alternate airport weather minimums... VFR/IFR Operating Limitations and Weather Requirements § 135.221 IFR: Alternate airport weather minimums. No person may designate an alternate airport unless the weather reports or forecasts, or...

  9. 14 CFR 135.221 - IFR: Alternate airport weather minimums.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false IFR: Alternate airport weather minimums... VFR/IFR Operating Limitations and Weather Requirements § 135.221 IFR: Alternate airport weather minimums. No person may designate an alternate airport unless the weather reports or forecasts, or...

  10. 77 FR 55895 - Permanent Closure of Cincinnati Blue Ash Airport

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Federal Aviation Administration Permanent Closure of Cincinnati Blue Ash Airport AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of permanent closure of Cincinnati Blue Ash Airport (ISZ). SUMMARY: The... Cincinnati advising that on August 29, 2012, it was permanently closing Cincinnati Blue Ash Airport...

  11. 14 CFR 135.221 - IFR: Alternate airport weather minimums.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false IFR: Alternate airport weather minimums... VFR/IFR Operating Limitations and Weather Requirements § 135.221 IFR: Alternate airport weather minimums. No person may designate an alternate airport unless the weather reports or forecasts, or...

  12. 14 CFR 135.221 - IFR: Alternate airport weather minimums.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false IFR: Alternate airport weather minimums... VFR/IFR Operating Limitations and Weather Requirements § 135.221 IFR: Alternate airport weather minimums. No person may designate an alternate airport unless the weather reports or forecasts, or...

  13. 14 CFR 152.103 - Sponsors: Airport development.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Sponsors: Airport development. 152.103 Section 152.103 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION... Sponsors: Airport development. (a) To be eligible to apply for a project for airport development...

  14. 14 CFR 152.103 - Sponsors: Airport development.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Sponsors: Airport development. 152.103 Section 152.103 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION... Sponsors: Airport development. (a) To be eligible to apply for a project for airport development...

  15. 14 CFR 152.103 - Sponsors: Airport development.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Sponsors: Airport development. 152.103 Section 152.103 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION... Sponsors: Airport development. (a) To be eligible to apply for a project for airport development...

  16. 19 CFR 122.14 - Landing rights airport.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... landing. Permission to land is not required for an emergency or forced landing (covered under § 122.35... 19 Customs Duties 1 2011-04-01 2011-04-01 false Landing rights airport. 122.14 Section 122.14... TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.14 Landing rights airport. (a) Permission...

  17. 14 CFR 135.223 - IFR: Alternate airport requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) to— (1) Complete the flight to the first airport of intended landing; (2) Fly from that airport to... not apply if part 97 of this chapter prescribes a standard instrument approach procedure for the first... airport is forecast to be at least three miles, or two miles more than the lowest applicable...

  18. 14 CFR 135.223 - IFR: Alternate airport requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) to— (1) Complete the flight to the first airport of intended landing; (2) Fly from that airport to... not apply if part 97 of this chapter prescribes a standard instrument approach procedure for the first... airport is forecast to be at least three miles, or two miles more than the lowest applicable...

  19. 14 CFR 135.223 - IFR: Alternate airport requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) to— (1) Complete the flight to the first airport of intended landing; (2) Fly from that airport to... not apply if part 97 of this chapter prescribes a standard instrument approach procedure for the first... airport is forecast to be at least three miles, or two miles more than the lowest applicable...

  20. 14 CFR 135.223 - IFR: Alternate airport requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) to— (1) Complete the flight to the first airport of intended landing; (2) Fly from that airport to... not apply if part 97 of this chapter prescribes a standard instrument approach procedure for the first... airport is forecast to be at least three miles, or two miles more than the lowest applicable...

  1. 14 CFR 135.223 - IFR: Alternate airport requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) to— (1) Complete the flight to the first airport of intended landing; (2) Fly from that airport to... not apply if part 97 of this chapter prescribes a standard instrument approach procedure for the first... airport is forecast to be at least three miles, or two miles more than the lowest applicable...

  2. 77 FR 16891 - Notice of Intent To Rule on Request To Release Airport Property at Tulsa International Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-22

    ... Federal Aviation Administration Notice of Intent To Rule on Request To Release Airport Property at Tulsa International Airport, Tulsa, OK AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of Request... release of land at the Tulsa International Airport under the provision of Section 817 of the...

  3. 75 FR 23841 - Notice of Intent To Rule on Request To Release Airport Property at the Reading Regional Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-04

    ... Reading Regional Airport, Reading, PA AGENCY: Federal Aviation Administration (FAA) DOT. ACTION: Notice of... release of land at the Reading Regional Airport, Reading, Pennsylvania under the provisions of Section...: Terry P. Sroka, Manager, Reading Regional Airport Authority, 2501 Bernville Road, Reading, PA 19605,...

  4. 76 FR 19517 - Orders Limiting Scheduled Operations at John F. Kennedy International Airport, LaGuardia Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-07

    ....\\1\\ \\1\\ 75 FR 9017 (Feb. 26, 2010). ATA also stated the National Oceanic and Atmospheric...\\ 14 CFR 93.227 (DCA); 74 FR 51648 (Oct. 7, 2009) (EWR); 74 FR 51650 (Oct. 7, 2009) (JFK); 74 FR 51653... Airport, LaGuardia Airport, and Newark Liberty International Airport; High Density Rule at Reagan...

  5. 75 FR 41922 - Notice of Intent To Rule on Request To Release Airport Property at Fort Smith Regional Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-19

    ... Smith Regional Airport, Fort Smith, AR AGENCY: Federal Aviation Administration (FAA), DOT. ACTION... comment on the release of land at Fort Smith Regional Airport under the provisions of Title 49, U.S.C... comments submitted to the FM must be mailed or delivered to Mr. John Parker, Airport Director, Fort...

  6. 77 FR 23598 - Technical Amendment to Cuba Airport List: Addition of Recently Approved Airports

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-20

    ... FR 5058) that amended the CBP regulations to establish such procedures and airport eligibility..., 1594, 1623, 1624, 1644, 1644a, 2071 note. * * * * * ] 0 2. In Sec. 122.153, revise paragraph (c)...

  7. 75 FR 9014 - Notice of Availability of a Draft Environmental Assessment for a Proposed Airport Traffic Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-26

    ... of an ATCT access road and consequent relocation of a portion of the existing airport perimeter road... Assessment. FOR FURTHER INFORMATION CONTACT: Ms. Virginia Marcks, Manager, Infrastructure Engineering Center.... Virginia Marcks, Manager, Infrastructure Engineering Center, Chicago, AJW-C14D, Central Service...

  8. A review of smoking policies in airports around the world

    PubMed Central

    Stillman, Frances A; Soong, Andrea; Kleb, Cerise; Grant, Ashley; Navas-Acien, Ana

    2015-01-01

    Objective To review smoking policies of major international airports, to compare these policies with corresponding incountry tobacco control legislation and to identify areas of improvement for advancing smoke-free policy in airports. Methods We reviewed smoking policies of 34 major international airports in five world regions, and collected data on current national and subnational legislation on smoke-free indoor places in the corresponding airport locations. We then compared airport smoking policies with local legislation. Additionally, we collected anecdotal information concerning smoking rules and practices in specific airports from an online traveller website. Results We found that 52.9% of the airports reviewed had indoor smoking rooms or smoking areas; smoking policy was unknown or unstated for two airports. 55.9% of the airports were located in countries where national legislation allowed designated smoking rooms and areas, while 35.3% were in smoke-free countries. Subnational legislation restricted smoking in 60% of the airport locations, while 40% were smoke-free. 71.4% of the airport locations had subnational legislation that allowed smoke-free laws to be more stringent than at the national level, but only half of these places had enacted such laws. Conclusions Despite the increasing presence of smoke-free places and legal capacity to enact stricter legislation at the local level, airports represent a public and occupational space that is often overlooked in national or subnational smoke-free policies. Secondhand smoke exposure in airports can be reduced among travellers and workers by implementing and enforcing smoke-free policies in airports. Additionally, existing information on smoke-free legislation lacks consistent terminology and definitions, which are needed to inform future tobacco control policy within airports and in the law. PMID:24638966

  9. Aircraft noise in the region of the Bucharest-Otopeni Airport. [noise pollution in airport environment

    NASA Technical Reports Server (NTRS)

    Costescu, M.; Gherghel, C.; Curtoglu, A.

    1974-01-01

    Aircraft noise, especially in the region adjoining airports, constitutes a problem that will be aggravated in the near future because of increasing aircraft traffic and the appearance of new types of large tonnage aircraft with continuously increasing powers and speeds. Criteria for the evaluation of aircraft noise are reported and some results of studies carried out in the region of Bucharest-Otopeni Airport are detailed.

  10. 77 FR 58208 - Airport Privatization Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-19

    ... Federal Register 48693-48708 (September 16, 1997) (Notice) (as modified, 62 FR 63211, Nov. 26, 1997). A... application from the Puerto Rico Ports Authority and Puerto Rico Public-Private Partnerships Authority for the participation of Luis Mu oz Mar n International Airport, San Juan, Puerto Rico (SJU) in the...

  11. 32 CFR 644.428 - Airport property.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 4 2011-07-01 2011-07-01 false Airport property. 644.428 Section 644.428 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL PROPERTY REAL ESTATE HANDBOOK Disposal Disposal of Fee-Owned Real Property and Easement Interests § 644.428...

  12. Airport Surface Movement Technologies: Atlanta Demonstrations Overview

    NASA Technical Reports Server (NTRS)

    Jones, Denise R.; Young, Steven D.

    1997-01-01

    A flight demonstration was conducted in August 1997 at the Hartsfield Atlanta (ATL) International Airport as part of low visibility landing and surface operations (LVLASO) research activities. This research was aimed at investigating technology to improve the safety and efficiency of aircraft movements on the surface during the operational phases of roll-out, turnoff, and taxi in any weather condition down to a runway visual range of 300 feet. The system tested at ATL was composed of airborne and ground-based components that were integrated to provide both the flight crew and controllers with supplemental information to enable safe, expedient surface operations. Experimental displays were installed on a Boeing 757-200 research aircraft in both headup and head-down formats. On the ground, an integrated system maintained surveillance of the airport surface and a controller interface provided routing and control instructions. While at ATL, the research aircraft performed a series of flight and taxi operations to show the validity of the operational concept at a major airport facility, to validate simulation findings, and to assess each of the individual technologies performance in an airport environment. The concept was demonstrated to over 100 visitors from the Federal Aviation Administration (FAA) and the aviation community. This paper gives an overview of the LVLASO system and ATL test activities.

  13. 32 CFR 644.423 - Airport development.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... CFR part 21)—nondiscrimination in federally assisted programs of the Department of Transportation... 32 National Defense 4 2011-07-01 2011-07-01 false Airport development. 644.423 Section 644.423... development. (a) Authority. 49 U.S.C. 1723 provides that (a) . . . whenever the Secretary of...

  14. 32 CFR 644.423 - Airport development.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... CFR part 21)—nondiscrimination in federally assisted programs of the Department of Transportation... 32 National Defense 4 2010-07-01 2010-07-01 true Airport development. 644.423 Section 644.423... development. (a) Authority. 49 U.S.C. 1723 provides that (a) . . . whenever the Secretary of...

  15. Airport noise impact reduction through operations

    NASA Technical Reports Server (NTRS)

    Deloach, R.

    1981-01-01

    The effects of various aeronautical, operational, and land-use noise impact reduction alternatives are assessed for a major midwestern airport. Specifically, the relative effectiveness of adding sound absorbing material to aircraft engines, imposing curfews, and treating houses with acoustic insulation are examined.

  16. 32 CFR 644.423 - Airport development.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... CFR part 21)—nondiscrimination in federally assisted programs of the Department of Transportation... 32 National Defense 4 2012-07-01 2011-07-01 true Airport development. 644.423 Section 644.423... development. (a) Authority. 49 U.S.C. 1723 provides that (a) . . . whenever the Secretary of...

  17. 32 CFR 644.423 - Airport development.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... CFR part 21)—nondiscrimination in federally assisted programs of the Department of Transportation... 32 National Defense 4 2013-07-01 2013-07-01 false Airport development. 644.423 Section 644.423... development. (a) Authority. 49 U.S.C. 1723 provides that (a) . . . whenever the Secretary of...

  18. 32 CFR 644.423 - Airport development.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... CFR part 21)—nondiscrimination in federally assisted programs of the Department of Transportation... 32 National Defense 4 2014-07-01 2013-07-01 true Airport development. 644.423 Section 644.423... development. (a) Authority. 49 U.S.C. 1723 provides that (a) . . . whenever the Secretary of...

  19. Analysis and Modeling of Ground Operations at Hub Airports

    NASA Technical Reports Server (NTRS)

    Atkins, Stephen (Technical Monitor); Andersson, Kari; Carr, Francis; Feron, Eric; Hall, William D.

    2000-01-01

    Building simple and accurate models of hub airports can considerably help one understand airport dynamics, and may provide quantitative estimates of operational airport improvements. In this paper, three models are proposed to capture the dynamics of busy hub airport operations. Two simple queuing models are introduced to capture the taxi-out and taxi-in processes. An integer programming model aimed at representing airline decision-making attempts to capture the dynamics of the aircraft turnaround process. These models can be applied for predictive purposes. They may also be used to evaluate control strategies for improving overall airport efficiency.

  20. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security of the air operations area (AOA). 1542.203 Section 1542.203 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  1. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the air operations area (AOA). 1542.203 Section 1542.203 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  2. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security of the air operations area (AOA). 1542.203 Section 1542.203 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  3. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Security of the air operations area (AOA). 1542.203 Section 1542.203 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  4. 76 FR 18622 - Notice of Submission Deadline for Schedule Information for O'Hare International Airport, John F...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... International Airport, John F. Kennedy International Airport, and Newark Liberty International Airport for the... Airport (ORD), New York's John F. Kennedy International Airport (JFK), and Newark Liberty International... Management Rule for LaGuardia Airport, John F. Kennedy International Airport, and Newark...

  5. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement. PMID:27581899

  6. The airport gate assignment problem: a survey.

    PubMed

    Bouras, Abdelghani; Ghaleb, Mageed A; Suryahatmaja, Umar S; Salem, Ahmed M

    2014-01-01

    The airport gate assignment problem (AGAP) is one of the most important problems operations managers face daily. Many researches have been done to solve this problem and tackle its complexity. The objective of the task is assigning each flight (aircraft) to an available gate while maximizing both conveniences to passengers and the operational efficiency of airport. This objective requires a solution that provides the ability to change and update the gate assignment data on a real time basis. In this paper, we survey the state of the art of these problems and the various methods to obtain the solution. Our survey covers both theoretical and real AGAP with the description of mathematical formulations and resolution methods such as exact algorithms, heuristic algorithms, and metaheuristic algorithms. We also provide a research trend that can inspire researchers about new problems in this area. PMID:25506074

  7. The Airport Gate Assignment Problem: A Survey

    PubMed Central

    Ghaleb, Mageed A.; Salem, Ahmed M.

    2014-01-01

    The airport gate assignment problem (AGAP) is one of the most important problems operations managers face daily. Many researches have been done to solve this problem and tackle its complexity. The objective of the task is assigning each flight (aircraft) to an available gate while maximizing both conveniences to passengers and the operational efficiency of airport. This objective requires a solution that provides the ability to change and update the gate assignment data on a real time basis. In this paper, we survey the state of the art of these problems and the various methods to obtain the solution. Our survey covers both theoretical and real AGAP with the description of mathematical formulations and resolution methods such as exact algorithms, heuristic algorithms, and metaheuristic algorithms. We also provide a research trend that can inspire researchers about new problems in this area. PMID:25506074

  8. A decision framework for managing risk to airports from terrorist attack.

    PubMed

    Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R

    2015-02-01

    This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period. PMID:25109326

  9. 78 FR 19356 - Notice of Schedule Information Submission Deadline for O'Hare International Airport, San...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-29

    ... International Airport, 73 FR 3510 (Jan. 18, 2008) as amended 76 FR 18620 (Apr. 4, 2011); Operating Limitations at Newark Liberty International Airport, 73 FR 29550 (May 21, 2008) as amended 76 FR 18618 (Apr. 4... International Airport, San Francisco International Airport, John F. Kennedy International Airport, and...

  10. 77 FR 73310 - Technical Amendment to List of User Fee Airports: Addition of Bozeman Yellowstone International...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-10

    ... Airports: Addition of Bozeman Yellowstone International Airport, Belgrade, MT AGENCY: U.S. Customs and... user fee airports to reflect the recent user fee airport designation for Bozeman Yellowstone... approving the designation of user fee status for Bozeman Yellowstone International Airport was signed...

  11. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  12. The annoyance caused by noise around airports

    NASA Technical Reports Server (NTRS)

    JOSSE

    1980-01-01

    A comprehensive study of noise around selected airports in France was performed. By use of questionnaires, the degree of annoyance caused by aircraft noise was determined. Three approaches used in the study were: (1) analytical study on the influence of noise on sleep; (2) sociological study on the satisfaction of occupants of buildings which conform to laws which are supposed to guarantee sufficient comfort; and (3) statistical study of correlations between external noises and psychological and pathological disturbances in residences.

  13. Miami International Airport stormwater NPDES plan

    SciTech Connect

    Perez, A.I.; Goldman, J.Z.; Schmidt, M.F.; Clark, E.E.

    1994-12-31

    Miami International Airport (MIA) is endeavoring to essentially double its traffic volume by the turn of the century. This is a great challenge since the site is already highly developed. Space, safety and other constraints make it difficult to implement conventional detention/retention stormwater practices. Other practices were evaluated to control stormwater quantity/quality, since some of the downstream bodies of water are flood-prone or environmentally sensitive.

  14. Improved low visibility forecasts at Amsterdam Airport

    NASA Astrophysics Data System (ADS)

    Wijngaard, J.; Vogelezang, D.; Maat, N.; van Bruggen, H.

    2009-09-01

    Accurate, reliable and unambiguous information concerning the actual and expected (low) visibility conditions at Amsterdam Airport Schiphol is very important for the available operational flow capacity. Therefore visibility forecast errors can have a negative impact on safety and operational expenses. KNMI has performed an update of the visibility forecast system in close collaboration with the main users of the forecasts (Air Traffic Control, the airport authorities and KLM airlines). This automatic forecasting system consists of a Numerical Weather Prediction Model (Hirlam) with a statistical post processing module on top of it. Output of both components is supplied to a human forecaster who issues a special probabilistic forecast bulletin. This bulletin is tailored to the specific requirements of the airport community. The improvements made to the forecast system are twofold: 1) In addition to the Meteorological Optical Range (MOR) values, RVR (Runway Visual Range) is forecasted. Since RVR depends on both MOR and the local Background Luminance, a (deterministic) statistical forecast for the latter has been developed. 2) Another improvement was achieved by calculating joint probabilities for specific combinations of visibility and cloud base height for thresholds which have direct impact on the flow capacity at the airport. The development of this new visibility forecast will be presented briefly. Also a few verification results will be shown to demonstrate the improvements made. Finally, the importance of explaining the user the use of the forecast information, in relation to their decision making process, will be discussed. For that reason, a simple guideline model to make a cost-optimal choice will be introduced.

  15. Noise zoning around airports in the Netherlands

    NASA Astrophysics Data System (ADS)

    Evers, F. W. R.

    1980-01-01

    The situation in the Netherlands with respect to noise abatement is dominated by a steadily increasing activity both at the political and the administrative level. A new law with respect to the designation of noise zones around existing and future airports and military airfields was enacted on 1 October 1978. A comprehensive new noise nuisance act was signed by the Queen on 16 February 1979. Both laws were accepted by Parliament unanimously. This article describes the new regulations with respect to noise zoning around airports. To maintain the habitability of the environment around airports, a demarcation will be made between the interest of the people living there and those of aviation. A noise zone will be designated outside which the noise load from aircraft movements may not exceed a fixed maximum. Within this area, where a noise load above the fixed maximum is allowed, planning and building design measures will have to be taken. Although the exclusion of new housing within the noise zone is an essential element, the area will be used for other purposes by exchanging previously intended developments with those from areas outside the zone. The Minister in charge of physical planning will issue directives concerning the contents of local development plans and will indicate how such plans, once amended, should be put into effect. Termination of the use or habitation of existing buildings is possible as well as soundproofing of buildings. The costs of measures taken to prevent undesirable new developments and measures taken to improve the existing state of affairs are borne by the central government. But a charge has to be paid by the users of the airports to defray the costs.

  16. Airport environmental noise mapping and land use management as an environmental protection action policy tool. The case of the Larnaka International Airport (Cyprus).

    PubMed

    Vogiatzis, Konstantinos

    2012-05-01

    The evidence from epidemiological studies on the association between exposure to traffic and aircraft noise and hypertension and ischemic heart disease has increased during the recent years. Both road traffic and aircraft noise increase the risk of high blood pressure. Environmental noise mapping, as per the 2002/49/EC Directive, is an obligation of all European Union (EU) member states. In the framework of the present article a complete Strategic Noise Mapping research and Action Noise Plans assessment and evaluation are presented and aim to access land use management as an effective tool for protection from aircraft noise. The case of the Larnaka International Airport in Cyprus, a typical Mediterranean airport, (considered as a "large airport" according to the above EU Directive and the recent Cyprus Legislation Law No. 224(Ι)/2004), is presented. In this paper a review of both assessment and action implementation procedures focusing on the dominant--in the area--aircraft traffic noise is presented, with emphasis to (a) a full calculation of Strategic Noise Map (SNM) scenarios of actual and future airport operation using the ECAC.CEAC Doc 29 methodology for both EU common indicators L(den) and L(night) in scales of 5 dB, (b) a full evaluation of results with emphasis to the Larnaka greater area land uses and the exposure of inhabitants in residences in various levels of environmental noise, and (c) a full evaluation of Noise Action Plans (NAP) introducing especially a new land use management scheme for the future Larnaka Town Land Use Plan. PMID:22425171

  17. The Integrated Airport Competition Model, 1998

    NASA Technical Reports Server (NTRS)

    Veldhuis, J.; Essers, I.; Bakker, D.; Cohn, N.; Kroes, E.

    1999-01-01

    This paper addresses recent model development by the Directorate General of Civil Aviation (DGCA) and Hague Consulting Group (HCG) concerning long-distance travel, Long-distance travel demand is growing very quickly and raising a great deal of economic and policy issues. There is increasing competition among the main Western European airports, and smaller, regional airports are fighting for market share. New modes of transport, such as high speed rail, arc also coming into the picture and affect the mode split for medium distance transport within Europe. Developments such as these are demanding the attention of policy makers and a tool is required for their analysis. For DGCA, Hague Consulting Group has developed a model system to provide answers to the policy questions posed by these expected trends, and to identify areas where policy makers can influence the traveller choices. The development of this model system, the Integrated Airport Competition Model/Integral Luchthaven Competitive Model (ILCM), began in 1992. Since that time the sub-models, input data and user interface have been expanded, updated and improved. HCG and DGCA have transformed the ILCM from a prototype into an operational forecasting tool.

  18. The Integrated Airport Competition Model, 1998

    NASA Technical Reports Server (NTRS)

    Veldhuis, J.; Essers, I.; Bakker, D.; Cohn, N.; Kroes, E.

    1999-01-01

    This paper addresses recent model development by the Directorate General of Civil Aviation (DGCA) and Hague Consulting Group (HCG) concerning long-distance travel. Long-distance travel demand is growing very quickly and raising a great deal of economic and policy issues. There is increasing competition among the main Western European airports, and smaller, regional airports are fighting for market share. New modes of transport, such as high speed rail, are also coming into the picture and affect the mode split for medium distance transport within Europe. Developments such as these are demanding the attention of policy makers and a tool is required for their analysis. For DGCA, Hague Consulting Group has developed a model system to provide answers to the policy questions posed by these expected trends, and to identify areas where policy makers can influence the traveller choices. The development of this model system, the Integrated Airport Competition Model/integraal Luchthaven Competitie Model (ILCM), began in 1992. Since that time the sub-models, input data and user interface have been expanded, updated and improved. HCG and DGCA have transformed the ILCM from a prototype into an operational forecasting tool.

  19. 28 CFR 17.44 - Access eligibility.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Judicial Administration DEPARTMENT OF JUSTICE CLASSIFIED NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Access to Classified Information § 17.44 Access eligibility. (a) Determinations of eligibility for access to classified information are separate from suitability determinations with respect...

  20. 28 CFR 17.44 - Access eligibility.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Judicial Administration DEPARTMENT OF JUSTICE CLASSIFIED NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Access to Classified Information § 17.44 Access eligibility. (a) Determinations of eligibility for access to classified information are separate from suitability determinations with respect...