Security evaluation and assurance of electronic health records.
Weber-Jahnke, Jens H
2009-01-01
Electronic Health Records (EHRs) maintain information of sensitive nature. Security requirements in this context are typically multilateral, encompassing the viewpoints of multiple stakeholders. Two main research questions arise from a security assurance point of view, namely how to demonstrate the internal correctness of EHRs and how to demonstrate their conformance in relation to multilateral security regulations. The above notions of correctness and conformance directly relate to the general concept of system verification, which asks the question "are we building the system right?" This should not be confused with the concept of system validation, which asks the question "are we building the right system?" Much of the research in the medical informatics community has been concerned with the latter aspect (validation). However, trustworthy security requires assurances that standards are followed and specifications are met. The objective of this paper is to contribute to filling this gap. We give an introduction to fundamentals of security assurance, summarize current assurance standards, and report on experiences with using security assurance methodology applied to the EHR domain, specifically focusing on case studies in the Canadian context.
Multilateral Disarmament: Conspiracy for Common Sense. Occasional Paper 31.
ERIC Educational Resources Information Center
Stanley, C. Maxwell
This paper outlines the danger of continuing the conventional and nuclear arms races and offers alternatives to ensure both peace and security. There are five major sections to the paper. In the first section, "Mulitlateral Approach," global multilateral accomplishments, regional multilateral activities, and bilateral negotiations are discussed.…
Multilateral, regional and bilateral energy trade governance
DOE Office of Scientific and Technical Information (OSTI.GOV)
Leal-Arcas, Rafael; Grasso, Costantino; Rios, Juan Alemany
The current international energy trade governance system is fragmented and multi-layered. Streamlining it for greater legal cohesiveness and international political and economic cooperation would promote global energy security. The current article explores three levels of energy trade governance: multilateral, regional and bilateral. Most energy-rich countries are part of the multilateral trading system, which is institutionalized by the World Trade Organization (WTO). The article analyzes the multilateral energy trade governance system by focusing on the WTO and energy transportation issues. Regionally, the article focuses on five major regional agreements and their energy-related aspects and examines the various causes that explain themore » proliferation of regional trade agreements, their compatibility with WTO law, and then provides several examples of regional energy trade governance throughout the world. When it comes to bilateral energy trade governance, this article only addresses the European Union’s (EU) bilateral energy trade relations. The article explores ways in which gaps could be filled and overlaps eliminated whilst remaining true to the high-level normative framework, concentrating on those measures that would enhance EU energy security.« less
DOT National Transportation Integrated Search
2000-05-01
The member countries of the Organization of American States (OAS) have recognized that a coordinated multilateral approach to improving port security in the Western Hemisphere is needed and has established a Technical Advisory Group on Port Security ...
The Collapse of the Democratic People’s Republic of Korea: A Multilateral Approach to Northeast Asia
2009-04-01
Chiang Mai Initiative.12 A slow move toward regional economic integration has continued since; however, there have been very few broad multilateral...treaty was signed at the Presidio, and was shortly followed by the U.S.-Japan Mutual Security Treaty. 11 Ibid, 24. 12 Ibid, 32-34. The Chiang Mai agreement
Migrants, refugees and insecurity. Current threats to peace?
Lohrmann, R
2000-01-01
Since the early 1980s, international migration has moved beyond humanitarian, economic development, labor market and societal integration concerns, raising complex interactive security implications for governments of migrant sending, receiving and transit countries, as well as for multilateral bodies. This article examines the effects of international migration on varied understandings and perceptions of international security. It discusses why international migration has come to be perceived as a security issue, both in industrialized and developing countries. Questions are raised on the migration-security nexus and the way in which the concepts "security" and "migration" are used. The real and perceived impacts of international migration upon national and regional security, both in industrialized and developing countries, are analyzed. The policies developed by governments and multilateral agencies since the mid-1980s to mitigate the destabilizing effects of certain kinds of international population movement and human displacement are examined. The conclusions stress the need for the establishment of a comprehensive framework of international cooperation among origin and receiving countries and international organizations to address the destabilizing implications of international migration.
Cooperation from Strength: The United States, China and the South China Sea
2012-01-01
the top of its diplomatic and security agenda. Freedom of navigation is a universal concern, and mari- time cooperation and mechanisms for...calls for new multilateral mechanisms for advancing stability and commerce. However, the South China Sea has also become the epicenter of what...multilateral mechanisms for resolving differing claims in the South China Sea.8 In the decades ahead, the challenge for the United States will be
The United States and the Asia-Pacific Region: Security Strategy for the Obama Administration
2009-02-01
increasing interest in multilateral cooperation. Once a laggard, the region now hosts a veritable “ noodle bowl” of multilateral political, economic, and...global exports. Asian manufacturers have captured a large share of global production chains. Asian governments and government- controlled institutions...from U.S. Census Bureau data Seven of the top 15 U.S. manufactured export destinations are in Asia • China • Japan • South Korea • Taiwan Eight
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-29
...On December 9, 2010, the Bureau of Industry and Security (BIS) published an advance notice of proposed rulemaking entitled Commerce Control List: Revising Descriptions of Items and Foreign Availability as part of the President's Export Control Reform (ECR) Initiative. The December 9, 2010 notice sought, among other things, public comments on how descriptions of items controlled on the Commerce Control List (CCL) could be made clearer. This proposed rule would implement changes identified by BIS and the public that would make the CCL clearer. This rule would only implement changes that can be made to the CCL without requiring changes to multilateral export control regime guidelines or lists. However, BIS has identified changes that would require a decision of a multilateral regime to implement. For those changes, the U.S. Government is developing regime change proposals for consideration by members of those multilateral export control regimes. BIS will implement those changes in separate rulemakings, if approved by the respective multilateral export control regimes.
Russia, America, and Security in the Asia-Pacific
2007-01-01
the Chinese and Indian markets. Russia has grown increasingly interested in multilateral mechanisms for security and economic integration in the Asia... negotiating process. The project’s participants proposed some recommendations for policy makers The transnational, economic , and ecological security...historical backgrounds, their cultures , and the levels of their economic development. The countries of the region tend to demonstrate tolerance toward
2016-05-13
developing closer ties with" ASEAN.54 China’s "string of pearls," a series of forward maritime operating bases in Pakistan, Myanmar , and Sri Lanka...571. 19 8. The thirteen original member states include Brunei, Cambodia, Indonesia, Laos, Malaysia, Myanmar , Philippines, Singapore, Thailand, and
Higgs, Elizabeth S; Hayden, Frederick G; Chotpitayasunondh, Tawee; Whitworth, Jimmy; Farrar, Jeremy
2008-04-01
The Southeast Asia Influenza Clinical Research Network (SEA ICRN) (www.seaclinicalresearch.org) is a recently developed multilateral, collaborative partnership that aims to advance scientific knowledge and management of human influenza through integrated clinical investigation. The partnership of hospitals and institutions in Indonesia, Thailand, United Kingdom, United States, and Viet Nam was established in late 2005 after agreement on the general principles and mission of the initiative and after securing initial financial support. The establishment of the SEA ICRN was both a response to the re-emergence of the highly pathogenic avian influenza A(H5N1) virus in Southeast Asia in late 2003 and an acknowledgment that clinical trials on emerging infectious diseases require prepared and coordinated research capacity. The objectives of the Network also include building sustainable research capacity in the region, compliance with international standards, and prompt dissemination of information and sharing of samples. The scope of research includes diagnosis, pathogenesis, treatment and prevention of human influenza due to seasonal or novel viruses. The Network has overcome numerous logistical and scientific challenges but has now successfully initiated several clinical trials. The establishment of a clinical research network is a vital part of preparedness and an important element during an initial response phase to a pandemic.
2011-08-26
peoples, such as the Inuit , have been accorded greater control of their own lives, while multilateral organizations have been crafted to provide a forum...stakeholders in the Inuit community, and not all of the agreements made between aboriginal groups and national governments have been honored. As a...North America and the Arctic Council”; and, (3) Udloriak Hanson from the Inuit Tapiriit Kanatami, “Sovereignty, Resource Development and Security
US Foreign Policy toward North Korea: A Way Ahead
2008-01-01
property rights, suffer from poverty, encourage black markets , and involve themselves in other illicit activities, including money counter feiting...formal national security strategy is not yet published. As a longtime US ally whose democratic institutions, capitalist market system, and national...regards the improvement and strength ening of multilayer frameworks for bilateral and multilateral dialogue while securing the presence and engagement
National Security Strategy of Charles De Gaulle
1994-01-01
nineteenth century education that was steeped in classical traditions and the collective French psychology of France as a strong, glorious and powerful...NATO in 1963 and French officers from the NATO command headquarters in 1964; and the scuttling of the United States multilateral nuclear force project ... France and about French security without her participation. The successful testing of the atomic bomb in France in 1960 ensured that France could not be
77 FR 46683 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-06
...: Bureau of Industry and Security. Title: Chemical Weapons Convention Provisions of the Export... Respondents: 10. Average Hours per Response: 30 minutes. Needs and Uses: The Chemical Weapons Convention (CWC) is a multilateral arms control treaty that seeks to achieve an international ban on chemical weapons...
Transmission dispatch and congestion management in open market systems
NASA Astrophysics Data System (ADS)
Fang, Risheng
This thesis is located in the domain of electricity supply industry restructuring. It deals with emerging issues, whose understanding is essential to advancing knowledge of open access transmission theory and proceeds to develop approaches for solving the transmission dispatch and congestion management problem. An overview of current trends and experiences in utility restructuring and the main models for restructuring, as well as the classifications of system operators, is first presented. A fully unbundled competitive electricity market model, called the bilateral/multilateral trades model, is then developed. A survey of current research in transmission dispatch and congestion management is included with discussion of transmission capacity and ancillary services. A methodology for the power dispatch problem in a structure dominated by bilateral and multilateral transmission contracts is presented. Group structures are mathematically formulated and explored and three basic types of curtailment strategies proposed for use by market participants. A more complex model is then developed, which takes into account the co-existence of bilateral and multilateral contracts with pool type dynamic supplies and demands based on bids and market clearing prices. An integrated dispatch strategy to reconcile all three types of transactions (bilateral, multilateral and pool) is then developed. Prioritization of electricity transactions and related curtailment strategies are explored and a mechanism for coordination between market participants to achieve additional economic advantages is described. A theory of security based rescheduling is presented in order to investigate the security-related aspects of operation in an unbundled and deregulated system. The impact of post-contingency corrective capability on optimal rescheduling results has been identified and the advantage of incorporating post-contingency corrective rescheduling into the objective function demonstrated. Finally, integrated congestion management procedures in real-time system operation and in forward energy markets are developed. Market price response and coordination of dispatch by the ISO are incorporated to achieve an overall strategy.
Missile Defense and Poland’s Transatlantic Relationship: Stormy Water Ahead
2007-01-01
rather, on their preference for achieving security through multilateral institutions and a Kantian vision of a ―perpetual peace‖ achieved through...discussion raises a second question: at what level of generality can we even assume a unified European ethic ? Indeed, not all European states have
Maritime Piracy: Examining the U.S. Response to a Global Threat
2010-03-01
Security Council in December 2008, as the Countering Piracy off the Horn of Africa Partnership & Action Plan ( CPAP ). In accordance with U.S. policy to...international efforts,‖43 the plan places significant importance on multilateral action to solve the problem of Somali piracy. CPAP seeks to involve a siege...an interest in maritime security.‖44 CPAP directs the U.S., in concert with a ―global partnership,‖ to address three lines of operation: 1
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-11
... technology controlled under multilateral control lists (Missile Technology Control Regime, Australia Group... or ballistic missile sytems. The latter category includes (a) items of the same kind as those on... potential of making a material contribution to WMD or cruise or ballistic missile systems, (b) items on U.S...
Open Government Partnership as a Platform for Advancing Open Education Policy
ERIC Educational Resources Information Center
Gondol, Jan; Allen, Nicole
2015-01-01
An exciting new avenue for establishing and expanding national commitments to open education has emerged through the Open Government Partnership (OGP), a multilateral initiative that aims to secure commitments from governments to make their governance more open, accountable and responsive to citizens. In the past, there has not been a strong link…
U.S. Haiti Policy: An Evolving Comprehensive, Multilateral Approach
2011-03-24
disaster; a cholera -stricken capital region; and an unresolved NOV 10 national election. Haiti can start anew, building on the current ravages. Former...have sustained limited military engagements to respond to threats emanating in Venezuela, Mexico , and throughout the Americas as drug cartels and
Aid to Libraries: Policies and Trends.
ERIC Educational Resources Information Center
Clow, David V.
1986-01-01
Reviews the scope and nature of aid for information and library development and analyzes contributions of bilateral and multilateral aid agencies and nongovernmental agencies. Forms of library aid are discussed, including consultancy, book and periodical donations, gifts of furniture, equipment and buildings, and provision of education and…
Entering the New Millennium: Dilemmas in Arms Control
DOE Office of Scientific and Technical Information (OSTI.GOV)
BROWN,JAMES
The end of the Cold War finds the international community no longer divided into two opposing blocks. The concerns that the community now faces are becoming more fluid, less focused, and, in many ways, much less predictable. Issues of religion, ethnicity, and nationalism; the possible proliferation of Weapons of Mass Destruction; and the diffusion of technology and information processing throughout the world community have greatly changed the international security landscape in the last decade. Although our challenges appear formidable, the United Nations, State Parties, nongovernmental organizations, and the arms control community are moving to address and lessen these concerns throughmore » both formal and informal efforts. Many of the multilateral agreements (e.g., NPT, BWC, CWC, CTBT, MTCR), as well as the bilateral efforts that are taking place between Washington and Moscow employ confidence-building and transparency measures. These measures along with on-site inspection and other verification procedures lessen suspicion and distrust and reduce uncertainty, thus enhancing stability, confidence, and cooperation.« less
ERIC Educational Resources Information Center
Dooly, Melinda
2015-01-01
This article provides an argument for closer multilateral alliances between the emergent and loosely-bound international community of educational researchers who are working in areas related to Digitally Supported Communicative Language Teaching and learning (herein DSCLT). By taking advantage of the communications revolution that is currently…
NASA Technical Reports Server (NTRS)
Charles, John B.; Haven, C.; Johnson-Throop, K.; Van Baalen, M.; McFather, J.
2014-01-01
The One Year Mission (1YM) by two astronauts on the International Space Station (ISS), starting in March 2015, offers a unique opportunity to expand multilateral collaboration by sharing data and resources among the partner agencies in preparation for planned space exploration missions beyond low Earth orbit. Agreements and protocols will be established for the collection, distribution, analysis and reporting of both research and clinical data. Data will be shared between the agencies sponsoring the investigators, and between the research and clinical medicine communities where common interests are identified. The assignment of only two astronauts, one Russian and the other American, to the 1YM necessitated creativity in bilateral efforts to maximize the biomedical return from the opportunity. Addition of Canadian, European and Japanese investigations make the effort even more integrative. There will be three types of investigations: joint, cross-participation and data-exchange. The joint investigations have US and Russian coprincipal investigators, and the data acquired will be their common responsibility. The other two types must develop data sharing agreements and processes specific to their needs. A multilateral panel of ISS partner space agencies will develop policies for international exchange of scientific information to meet their science objectives and priorities. They will promote archiving of space flight data and will inform each other and the scientific community at large about the results obtained from space life sciences studies. Integration tasks for the 1YM are based on current experience from the ISS and previous efforts on the Russian space station Mir. Closer coordination between international partners requires more common approaches to remove barriers to multilateral resource utilization on the ISS. Greater integration in implementation should increase utilization efficiency to benefit all participants in spaceflight human research. This presentation will describe the overarching principles for multilateral data collection, analysis and sharing and for data security for medical and research data shared between ISS partners prior to release in public forums.
Information Control: Preserving the Advantage
2015-06-01
sanitary laboratory for US forces to exploit technical solutions with minimal resistance, inevitably leading to potent and promising results on the...parity, eventually forcing decision makers to pursue bilateral and multilateral agreements in space law. See McDougall, 272. 21 James Clay Moltz, The...the discussions of human nature, control, and strategy outlined in Chapter 1. 12 James Clay Moltz, The Politics of Space Security: Strategic Restraint
Krahmann, Elke
2017-12-01
Discussions about the legitimacy of private security companies (PSCs) in multilateral military interventions abound. This article looks at how the United States has sought to legitimize the outsourcing of security services to PSCs through performance-based contracting and performance assessments. Both mechanisms aim to demonstrate the effective provision of publicly desirable outcomes. However, the immaterial and socially constructed nature of security presents major problems for performance assessments in terms of observable and measurable outcomes. Performance has therefore given way to performativity - that is, the repetitive enactment of particular forms of behaviour and capabilities that are simply equated with security as an outcome. The implications of this development for the ways in which security has been conceptualized, implemented and experienced within US interventions have been profound. Ironically, the concern with performance has not encouraged PSCs to pay increased attention to their impacts on security environments and civilian populations, but has fostered a preoccupation with activities and measurable capabilities that can be easily assessed by government auditors.
Krahmann, Elke
2017-01-01
Discussions about the legitimacy of private security companies (PSCs) in multilateral military interventions abound. This article looks at how the United States has sought to legitimize the outsourcing of security services to PSCs through performance-based contracting and performance assessments. Both mechanisms aim to demonstrate the effective provision of publicly desirable outcomes. However, the immaterial and socially constructed nature of security presents major problems for performance assessments in terms of observable and measurable outcomes. Performance has therefore given way to performativity – that is, the repetitive enactment of particular forms of behaviour and capabilities that are simply equated with security as an outcome. The implications of this development for the ways in which security has been conceptualized, implemented and experienced within US interventions have been profound. Ironically, the concern with performance has not encouraged PSCs to pay increased attention to their impacts on security environments and civilian populations, but has fostered a preoccupation with activities and measurable capabilities that can be easily assessed by government auditors. PMID:29276346
NASA Astrophysics Data System (ADS)
Hamid, Nasri A.; Mujaini, Madihah; Mohamed, Abdul Aziz
2017-01-01
The Center for Nuclear Energy (CNE), College of Engineering, Universiti Tenaga Nasional (UNITEN) has a great responsibility to undertake educational activities that promote developing human capital in the area of nuclear engineering and technology. Developing human capital in nuclear through education programs is necessary to support the implementation of nuclear power projects in Malaysia in the near future. In addition, the educational program must also meet the nuclear power industry needs and requirements. In developing a certain curriculum, the contents must comply with the university's Outcomes Based Education (OBE) philosophy. One of the important courses in the nuclear curriculum is in the area of nuclear security. Basically the nuclear security course covers the current issues of law, politics, military strategy, and technology with regard to weapons of mass destruction and related topics in international security, and review legal regulations and political relationship that determine the state of nuclear security at the moment. In addition, the course looks into all aspects of the nuclear safeguards, builds basic knowledge and understanding of nuclear non-proliferation, nuclear forensics and nuclear safeguards in general. The course also discusses tools used to combat nuclear proliferation such as treaties, institutions, multilateral arrangements and technology controls. In this paper, we elaborate the development of undergraduate nuclear security course at the College of Engineering, Universiti Tenaga Nasional. Since the course is categorized as mechanical engineering subject, it must be developed in tandem with the program educational objectives (PEO) of the Bachelor of Mechanical Engineering program. The course outcomes (CO) and transferrable skills are also identified. Furthermore, in aligning the CO with program outcomes (PO), the PO elements need to be emphasized through the CO-PO mapping. As such, all assessments and distribution of Bloom Taxonomy levels are assigned in accordance with the CO-PO mapping. Finally, the course has to fulfill the International Engineering Alliance (IEA) Graduate Attributes of the Washington Accord.
The United Kingdom: Issues for the United States
2007-07-16
of its EU partners than to the United States. For example, like other EU member states, Britain places great emphasis on multilateral... the prospects for the future of the U.S.-UK partnership, especially in the unfolding Brown era. It also describes UK views on political, security...delivery systems for its nuclear warheads since 1963. During the Cold War, the UK served as a vital base for U.S.
Regional Security Arrangements in the East Asia Region.
2000-03-16
ASEAN) and the ASEAN Regional Forum (ARF). Both are critical to effective multilateralism in the region but must overcome the dual handicaps of...encouragement and guidance of my research adviser, Dr John Garofano of the Strategic Studies Institute. I enjoyed his tutelage and learned much. I also...such as the Association of South East Asian Nations6 (ASEAN) and the Asia-Pacific Economic Cooperation (APEC) forum to address regional issues
Keeping up With The Neighbors: Nonproliferation and Implementation of UNSCR 1540
2016-02-15
of Acts of Nuclear Terrorism (ICSANT) 25 3.2. Voluntary Commitments 3.2.1. International Atomic Energy Agency ( IAEA ) membership 3.2.2... IAEA Nuclear Security Fund contributions 3.2.7. Bilateral or multilateral assistance 3.2.8. Centers of Excellence 3.3. International Assurances...CPPNM implementation authority 4.2.2. National legal framework for CPPNM 4.3. Safeguards Adherence and Compliance 4.3.1. IAEA safeguards agreement
The Potential Uses of Commercial Satellite Imagery in the Middle East
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vannoni, M.G.
1999-06-08
It became clear during the workshop that the applicability of commercial satellite imagery to the verification of future regional arms control agreements is limited at this time. Non-traditional security topics such as environmental protection, natural resource management, and the development of infrastructure offer the more promising applications for commercial satellite imagery in the short-term. Many problems and opportunities in these topics are regional, or at least multilateral, in nature. A further advantage is that, unlike arms control and nonproliferation applications, cooperative use of imagery in these topics can be done independently of the formal Middle East Peace Process. The valuemore » of commercial satellite imagery to regional arms control and nonproliferation, however, will increase during the next three years as new, more capable satellite systems are launched. Aerial imagery, such as that used in the Open Skies Treaty, can also make significant contributions to both traditional and non-traditional security applications but has the disadvantage of requiring access to national airspace and potentially higher cost. There was general consensus that commercial satellite imagery is under-utilized in the Middle East and resources for remote sensing, both human and institutional, are limited. This relative scarcity, however, provides a natural motivation for collaboration in non-traditional security topics. Collaborations between scientists, businesses, universities, and non-governmental organizations can work at the grass-roots level and yield contributions to confidence building as well as scientific and economic results. Joint analysis projects would benefit the region as well as establish precedents for cooperation.« less
Multi-Sensor Fusion with Interacting Multiple Model Filter for Improved Aircraft Position Accuracy
Cho, Taehwan; Lee, Changho; Choi, Sangbang
2013-01-01
The International Civil Aviation Organization (ICAO) has decided to adopt Communications, Navigation, and Surveillance/Air Traffic Management (CNS/ATM) as the 21st century standard for navigation. Accordingly, ICAO members have provided an impetus to develop related technology and build sufficient infrastructure. For aviation surveillance with CNS/ATM, Ground-Based Augmentation System (GBAS), Automatic Dependent Surveillance-Broadcast (ADS-B), multilateration (MLAT) and wide-area multilateration (WAM) systems are being established. These sensors can track aircraft positions more accurately than existing radar and can compensate for the blind spots in aircraft surveillance. In this paper, we applied a novel sensor fusion method with Interacting Multiple Model (IMM) filter to GBAS, ADS-B, MLAT, and WAM data in order to improve the reliability of the aircraft position. Results of performance analysis show that the position accuracy is improved by the proposed sensor fusion method with the IMM filter. PMID:23535715
Multi-sensor fusion with interacting multiple model filter for improved aircraft position accuracy.
Cho, Taehwan; Lee, Changho; Choi, Sangbang
2013-03-27
The International Civil Aviation Organization (ICAO) has decided to adopt Communications, Navigation, and Surveillance/Air Traffic Management (CNS/ATM) as the 21st century standard for navigation. Accordingly, ICAO members have provided an impetus to develop related technology and build sufficient infrastructure. For aviation surveillance with CNS/ATM, Ground-Based Augmentation System (GBAS), Automatic Dependent Surveillance-Broadcast (ADS-B), multilateration (MLAT) and wide-area multilateration (WAM) systems are being established. These sensors can track aircraft positions more accurately than existing radar and can compensate for the blind spots in aircraft surveillance. In this paper, we applied a novel sensor fusion method with Interacting Multiple Model (IMM) filter to GBAS, ADS-B, MLAT, and WAM data in order to improve the reliability of the aircraft position. Results of performance analysis show that the position accuracy is improved by the proposed sensor fusion method with the IMM filter.
1991-04-01
strategic, much less economic, mixed and conflicting strategies pursued by the advantages. Moreover, the socioeconomic gap principal regional and...By the early of Africa (Ethiopia) in favor of Moscow-backed 1980s, the market -oriented states of the West and forces. Japan, associated in the...incorporation of these economies into the capitalist nuclear war. Since each held the other hostage, only global market system. The gross inefficiencies
1995-06-01
Economic Foundations of the Next Security System, Berkeley Roundtable on the International Economy (BRIE), (Oxford: Oxford University Press , 1992), pp...former Eastern bloc." 9Michael Mastanduno, Economic Containment: COCOM and the Politics of East-West Trade. (Ithaca: Cornell University Press , 1992...Environment (Washington, DC: National Academy Press , 1991), pp. 61-105. ŕOTA, 1994, p. 49. 6 The United States participates in several multilateral regimes
Sino-American Military Relations: Determinants of Policy and Corresponding Military Responsiveness
2007-03-01
military medicine, administration, and a host of non -combat related areas10 Similar priorities and methods can be seen in official documents such as the...with the national foreign policy, the PLA conducts military cooperation that is non -aligned, non -confrontational and not directed against any third...benefit. It takes part in bilateral or multilateral joint military exercises in non -traditional security fields so as to enhance the joint
2012-09-01
reflect the official policy or position of the Department of Defense or the U.S. Government. IRB Protocol number ______N/A______. 12a. DISTRIBUTION...Warfare DHS Department of Homeland Security DoD Department of Defense DTMF Dual-Tone Multi-Frequency EOD Explosive Ordnance Disposal EU European...Organization JMTC Joint Multinational Training Command JTF Joint Task Force MANPADS Man Portable Air Defense Systems MERC Multilateral Export Control
Dilemmas of Brazilian Grand Strategy
2010-08-01
a regional leader, and may in any case be stymied by Russian or Chinese opposition. It could also en - tail de -prioritizing one tenuous multilateral...strategic implications for the Army, the Department of De - fense, and the larger national security community. In addition to its studies, SSI...worked as a de - fense analyst in Washington, DC. Dr. Brands is the author of From Berlin to Baghdad: America’s Search for Purpose in the Post-Cold War
The nature of international health security.
Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N
2009-01-01
Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.
ERIC Educational Resources Information Center
de Siqueira, Angela C.
Since the 1960s, the World Bank has been involved in educational policy around the world. Applying a human capital theory/manpower forecasting approach, the World Bank has focused on the infrastructure, that is, buildings and equipment, in vocational and higher education. At the same time, the power and influence of UNICEF and UNESCO, the main…
NASA Astrophysics Data System (ADS)
Elfert, Maren
2013-07-01
Created in 1945 as a specialised agency of the United Nations (UN), the United Nations Educational, Scientific and Cultural Organization (UNESCO) was given, among other mandates, the task of reconstructing education systems devastated during the Second World War. UNESCO, in turn, and after some debate about an engagement in Germany, founded the UNESCO Institute for Education (UIE) in Hamburg in 1952. This paper traces the development of an institute which was founded to contribute to social renewal in war-torn Germany and Europe, functioned as a mediator between Western and Eastern countries during the Cold War and later shifted its geographical focus to developing countries. The institute was instrumental in conceptualising lifelong learning as a global educational paradigm, as well as in shaping the shift from education to learning and the concept of literacy as a "continuum". The author is particularly interested in the nature of the institute's niche which secured its survival in the uncertain domain of educational multilateralism in the past six decades.
22 CFR 216.9 - Bilateral and multilateral studies and concise reviews of environmental issues.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Bilateral and multilateral studies and concise... DEVELOPMENT ENVIRONMENTAL PROCEDURES § 216.9 Bilateral and multilateral studies and concise reviews of... or multilateral environmental studies, relevant or related to the proposed action, prepared by the...
22 CFR 216.9 - Bilateral and multilateral studies and concise reviews of environmental issues.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Bilateral and multilateral studies and concise... DEVELOPMENT ENVIRONMENTAL PROCEDURES § 216.9 Bilateral and multilateral studies and concise reviews of... or multilateral environmental studies, relevant or related to the proposed action, prepared by the...
Language and Area Expertise in Support of the Combined/Joint Commander
1994-02-10
must incorporate a multilateral approach that does not always place America at the hub of the global wheel. As all the elements of national power are...and its allies over the next decade, therefore, will be the creation and transfiguration of international security arrangements that will favor...observers point out, it is certainly unlikely to be self- contained and sufficient. "It is the American ability to cooperate in common or convergent forces
1989-06-01
ORGANZA - 0% If applicable) 8( ADDRESS (C t Stare a-d ZIP CooI 10 SOUPCE O FKNDNG NMBERS PROGRAM PROAECT TASK . ORK )NIT ELEMENT NO NO NO .<ESSiON NO...investigations which ended up in a total restructuring of their export process. Both Norway and Japan started a heavy lobbying process as well, in an effort...respective controls. Norway permanently suspended all sales to the Soviet Union and initiated a total restructuring of their export process. Japan
2015-12-01
tsunamis. Indonesia is also the founding member of a multilateral security architecture, which includes the Philippines, Thailand, Malaysia and...and transportation; the provision of food , clothing, medicine, beds and bedding; temporary shelter and housing; the furnishing of medical material and...mortuary affairs, and the provision of food , water, clothes, shelter, medical care, and counseling (Fritz Institute, 2005a, 2005c). Table 1 is an
Climate change and food security in East Asia.
Su, Yi-Yuan; Weng, Yi-Hao; Chiu, Ya-Wen
2009-01-01
Climate change causes serious food security risk for East Asian countries. The United Nations Framework Convention on Climate Change (UNFCCC) has recognized that the climate change will impact agriculture and all nations should prepare adaptations to the impacts on food security. This article reviews the context of adaptation rules and current policy development in East Asian region. The UNFCCC and Kyoto Protocol have established specific rules for countries to develop national or regional adaptation policies and measurements. The current development of the ASEAN Strategic Plan on food security is inspiring, but the commitments to implementation by its members remain an issue of concern. We suggest that the UNFCCC enhances co-operation with the Food and Agriculture Organization (FAO) and other international organizations to further develop methodologies and technologies for all parties. Our findings suggest that agriculture is one of the most vulnerable sectors in terms of risks associated with climate change and distinct programmatic initiatives are necessary. It's imperative to promote co-operation among multilateral organizations, including the UNFCCC, FAO, World Health Organization, and others.
Accuracy limitations of range-range (spherical) multilateration systems.
DOT National Transportation Integrated Search
1973-10-11
This report presents a novel procedure for determining the accuracy of range-range (or spherical) multilateration systems. The procedure is a generalization of one previously described for hyperbolic multilateration systems. A central result is a dem...
Testing Multilateral Comparisons in Africa.
ERIC Educational Resources Information Center
Bender, M. Lionel
In this paper, the multilateral comparison method of classifying languages is described and analyzed. It is suggested that while it is espoused as a simple and reasonable approach to language classification, the method has serious flaws. "Multilateral" or "mass" comparison (MC) is not a method of genetic language…
Advanced multilateration theory, software development, and data processing: The MICRODOT system
NASA Technical Reports Server (NTRS)
Escobal, P. R.; Gallagher, J. F.; Vonroos, O. H.
1976-01-01
The process of geometric parameter estimation to accuracies of one centimeter, i.e., multilateration, is defined and applications are listed. A brief functional explanation of the theory is presented. Next, various multilateration systems are described in order of increasing system complexity. Expected systems accuracy is discussed from a general point of view and a summary of the errors is listed. An outline of the design of a software processing system for multilateration, called MICRODOT, is presented next. The links of this software, which can be used for multilateration data simulations or operational data reduction, are examined on an individual basis. Functional flow diagrams are presented to aid in understanding the software capability. MICRODOT capability is described with respect to vehicle configurations, interstation coordinate reduction, geophysical parameter estimation, and orbit determination. Numerical results obtained from MICRODOT via data simulations are displayed both for hypothetical and real world vehicle/station configurations such as used in the GEOS-3 Project. These simulations show the inherent power of the multilateration procedure.
2017-06-09
Chicago Tribune on September 29, 1936, in a story entitled “Rebel Airmen Bomb Madrid; Begin New Push” reported that “bombardment of Madrid from the air...1,000 prisoners of war (Republicans) or ordering the aerial bombing of civilian sectors of the city, with up to 2,000 more killed (Nationalists). Eden...turned out to have little if any military value. While Guernica captured the world’s attention, at least four other such bombings took place the
Nuclear Security for Floating Nuclear Power Plants
DOE Office of Scientific and Technical Information (OSTI.GOV)
Skiba, James M.; Scherer, Carolynn P.
2015-10-13
Recently there has been a lot of interest in small modular reactors. A specific type of these small modular reactors (SMR,) are marine based power plants called floating nuclear power plants (FNPP). These FNPPs are typically built by countries with extensive knowledge of nuclear energy, such as Russia, France, China and the US. These FNPPs are built in one country and then sent to countries in need of power and/or seawater desalination. Fifteen countries have expressed interest in acquiring such power stations. Some designs for such power stations are briefly summarized. Several different avenues for cooperation in FNPP technology aremore » proposed, including IAEA nuclear security (i.e. safeguards), multilateral or bilateral agreements, and working with Russian design that incorporates nuclear safeguards for IAEA inspections in non-nuclear weapons states« less
International Multilateral Educational Aid Received by China: History, Characteristics, and Effects
ERIC Educational Resources Information Center
Yuchi, Zhao
2012-01-01
Thirty years have passed since China began its reform and opening up, to formally accept multilateral educational aid from international organizations, and multilateral educational assistance has made contributions that cannot be overlooked to the reform and development of China's education. This article reviews the history of China's acceptance…
Learner Interpretations of Shared Space in Multilateral English Blogging
ERIC Educational Resources Information Center
Yang, Yu-Feng
2011-01-01
This qualitative study aims to understand how English learners interpret shared space in an online multilateral English blogging context and how their interpretations of shared space contribute to their multilateral exchange experience. Twenty-four Asian learners of English from two different universities--one in Japan and one in…
Factors affecting food security and contribution of modern technologies in food sustainability.
Premanandh, Jagadeesan
2011-12-01
The concept of food insecurity is complex and goes beyond the simplistic idea of a country's inability to feed its population. The global food situation is redefined by many driving forces such as population growth, availability of arable lands, water resources, climate change and food availability, accessibility and loss. The combined effect of these factors has undeniably impacted global food production and security. This article reviews the key factors influencing global food insecurity and emphasises the need to adapt science-based technological innovations to address the issue. Although anticipated benefits of modern technologies suggest a level of food production that will sustain the global population, both political will and sufficient investments in modern agriculture are needed to alleviate the food crisis in developing countries. In this globalised era of the 21st century, many determinants of food security are trans-boundary and require multilateral agreements and actions for an effective solution. Food security and hunger alleviation on a global scale are within reach provided that technological innovations are accepted and implemented at all levels. Copyright © 2011 Society of Chemical Industry.
State-of-the-art in biosafety and biosecurity in European countries.
Bielecka, Anna; Mohammadi, Ali Akbar
2014-06-01
The terms biosafety and biosecurity are widely used in different concepts and refer not only to protection of human beings and their surrounding environment against hazardous biological agent, but also to global disarmament of weapons of mass destruction. As a result, the biosafety and biosecurity issues should be considered interdisciplinary based on multilateral agreements against proliferation of biological weapons, public health and environmental protection. This publication presents information on both, international and national biosafety and biosecurity legislation. Status of national implementation of the Biological and Toxin Weapons Convention, penalization issues and measures to account for and secure production, use, storage of particularly dangerous pathogens or activities involving humans, plants and animals where infection may pose a risk have been analyzed. Safety and security measures in laboratories have been studied. Moreover, dual-use technology and measures of secure transport of biohazard materials have been also taken into account. In addition, genetic engineering regulations, biosecurity activities in laboratories and code of conducts have been investigated, as well.
Bugs and gas: Agreements banning chemical and biological weapons
NASA Astrophysics Data System (ADS)
Mikulak, Robert P.
2017-11-01
The use of chemical or biological weapons, whether by a State or terrorists, continues to be a serious security concern. Both types of weapons are prohibited by multilateral treaties that have very broad membership, but both the Biological Weapons Convention and the Chemical Weapons Convention are facing major challenges. In particular, the continued use of chemical weapons in the Syrian civil war by government forces risks eroding the norm against the use of such weapons. This paper briefly explore the recent history of efforts to constrain chemical and biological weapons and outlines challenges for the future.
US conventional arms transfer policy. Strategy research project
DOE Office of Scientific and Technical Information (OSTI.GOV)
Langhorst, R.H.
1996-04-15
Millions of people around the world have been killed by conventional arms since the end of World War II. If increasing access to conventional arms is partly responsible for political and military aggression in post-Cold War Europe, what should be the United States` response. This study explores the new US Conventional Arms Transfer Policy of February 1995 in terms of ends1 ways and means and its linkages to US National Security and National Military Strategies. Analysis focuses mainly on post- Cold War Europe, providing examples of multilateral arms control successes and recommendations for US policy implementation.
Credit BG. Northeast and northwest facades of Building 4496 (Security ...
Credit BG. Northeast and northwest facades of Building 4496 (Security Facility) as seen when looking south (178°) from entrance to secured area. The Control Tower (Building 4500) appears in background. The Security Facility is part of the secured Building 4505 complex - Edwards Air Force Base, North Base, Security Facility, Northeast of A Street, Boron, Kern County, CA
Nuclear Explosion Monitoring History and Research and Development
NASA Astrophysics Data System (ADS)
Hawkins, W. L.; Zucca, J. J.
2008-12-01
Within a year after the nuclear detonations over Hiroshima and Nagasaki the Baruch Plan was presented to the newly formed United Nations Atomic Energy Commission (June 14, 1946) to establish nuclear disarmament and international control over all nuclear activities. These controls would allow only the peaceful use of atomic energy. The plan was rejected through a Security Council veto primarily because of the resistance to unlimited inspections. Since that time there have been many multilateral, and bilateral agreements, and unilateral declarations to limit or eliminate nuclear detonations. Almost all of theses agreements (i.e. treaties) call for some type of monitoring. We will review a timeline showing the history of nuclear testing and the more important treaties. We will also describe testing operations, containment, phenomenology, and observations. The Comprehensive Nuclear Test Ban Treaty (CTBT) which has been signed by 179 countries (ratified by 144) established the International Monitoring System global verification regime which employs seismic, infrasound, hydroacoustic and radionuclide monitoring techniques. The CTBT also includes on-site inspection to clarify whether a nuclear explosion has been carried out in violation of the Treaty. The US Department of Energy (DOE) through its National Nuclear Security Agency's Ground-Based Nuclear Explosion Monitoring R&D Program supports research by US National Laboratories, and universities and industry internationally to detect, locate, and identify nuclear detonations. This research program builds on the broad base of monitoring expertise developed over several decades. Annually the DOE and the US Department of Defense jointly solicit monitoring research proposals. Areas of research include: seismic regional characterization and wave propagation, seismic event detection and location, seismic identification and source characterization, hydroacoustic monitoring, radionuclide monitoring, infrasound monitoring, and data processing and analysis. Reports from the selected research projects are published in the proceedings of the annual Monitoring Research Review conference.
Dodo, Mahamat K
2014-01-01
Climate Change like many global problems nowadays is recognized as a threat to the international security and cooperation. In theoretical terms, it is being securitized and included in the traditional security studies. Climate change and its accompanying environmental degradation are perceived to be a threat that can have incalculable consequences on the international community. The consequences are said to have more effects in small island developing nations and Africa where many States are fragile and overwhelmed with mounting challenges. In recent years, the security implications of the climate change are being addressed from national, regional and multilateral level. Against this backdrop, this paper intends to contribute to the debate on climate change and international security and present a broader perspective on the discussion. The paper will draw from the EU-Africa partnership on climate change and is structured as follows: the first part introduces the background of the international climate change policy and its securitization, the second part covers the EU-Africa relations and EU-Africa partnership on climate change, and the third part discusses the Congo Basin Forest Partnership as a concrete example of EU-Africa Partnership on Climate Change. Lastly, the paper concludes by drawing some conclusions and offers some policy perspectives and recommendations. Q54; 055; 052; 01;
DOE Office of Scientific and Technical Information (OSTI.GOV)
Butler, Nicholas; McCaw, Erica E.; Wright, Kyle A.
The Global Threat Reduction Initiative (GTRI) reduces and protects vulnerable nuclear and radiological material located at civilian sites worldwide from sabotage, theft or diversion. The GTRI has worked successfully with foreign countries to remove and protect nuclear and radioactive materials including high-activity sources used in medical, commercial, and research applications. There are many barriers to successful bilateral cooperation that must be overcome including language, preconceived perceptions, long distances, and different views on the threat and protection requirements. Successful cooperation is often based on relationships and building trusting relationships takes time. In the case of Dominican Republic, the GTRI first receivedmore » contact in 2008 from the Government of Dominican Republic. They requested cooperation that was similar to the tri-partite cooperation between Colombia, Mexico and the United States. Throughout the region it was widely known that the GTRI’s cooperation with the Government of Colombia was a resounding success resulting in the securing of forty sites; the consolidation of numerous disused/orphan sources at a secure national storage facility; and, the development of a comprehensive approach to security including, inter alia, training and sustainability. The Government of Colombia also showcased this comprehensive approach to thirteen Central American and Caribbean countries at a GTRI regional security conference held in Panama in October 2004. In 2007, Colombia was an integral component of GTRI multi-lateral cooperation initiation in Mexico. As a result, twenty two of Mexico’s largest radioactive sites have been upgraded in the past eighteen months. These two endeavors served as catalysts for cooperation opportunities in the Dominican Republic. Representatives from the Colombian government were aware of GTRI’s interest in initiating cooperation with the Government of Dominican Republic and to facilitate this cooperation, they traveled to the Dominican Republic and provided briefings and presentations which demonstrated its successful cooperation with the GTRI. Shortly after that visit, the Government of Dominican Republic agreed to move forward and requested that the cooperative efforts in Dominican Republic be performed in a tripartite manner, leveraging the skills, experience, and resources of the Colombians, and the financial and technical support of the United States. As a result, two of Dominican Republic’s largest radioactive sites had security upgrades in place within 90 days of the cooperation visit in December 2008.« less
2014-01-01
Background This article proposes an approach to comparing and assessing the adaptive capacity of multilateral health agencies in meeting country and individual healthcare needs. Most studies comparing multilateral health agencies have failed to clearly propose a method for conducting agency comparisons. Methods This study conducted a qualitative case study methodological approach, such that secondary and primary case study literature was used to conduct case study comparisons of multilateral health agencies. Results Through the proposed Sequential Comparative Analysis (SCA), the author found a more effective way to justify the selection of cases, compare and assess organizational transformative capacity, and to learn from agency success in policy sustainability processes. Conclusions To more affectively understand and explain why some multilateral health agencies are more capable of adapting to country and individual healthcare needs, SCA provides a methodological approach that may help to better understand why these agencies are so different and what we can learn from successful reform processes. As funding challenges continue to hamper these agencies' adaptive capacity, learning from each other will become increasingly important. PMID:24886283
Gómez, Eduardo J
2014-05-20
This article proposes an approach to comparing and assessing the adaptive capacity of multilateral health agencies in meeting country and individual healthcare needs. Most studies comparing multilateral health agencies have failed to clearly propose a method for conducting agency comparisons. This study conducted a qualitative case study methodological approach, such that secondary and primary case study literature was used to conduct case study comparisons of multilateral health agencies. Through the proposed Sequential Comparative Analysis (SCA), the author found a more effective way to justify the selection of cases, compare and assess organizational transformative capacity, and to learn from agency success in policy sustainability processes. To more affectively understand and explain why some multilateral health agencies are more capable of adapting to country and individual healthcare needs, SCA provides a methodological approach that may help to better understand why these agencies are so different and what we can learn from successful reform processes. As funding challenges continue to hamper these agencies' adaptive capacity, learning from each other will become increasingly important.
Labonté, Ronald; Runnels, Vivien; Gagnon, Michelle
2014-01-01
Canada has been regarded as a model global citizen with firm commitments to multilateralism. It has also played important roles in several international health treaties and conventions in recent years. There are now concerns that its interests in health as a foreign policy goal may be diminishing. This article reports on a thematic analysis of key Canadian foreign policy statements issued over the past decade, and interviews with key informants knowledgeable of, or experienced in the interstices of Canadian health and foreign policy. It finds that health is primarily and increasingly framed in relation to national security and economic interests. Little attention has been given to human rights obligations relevant to health as a foreign policy issue, and global health is not seen as a priority of the present government. Global health is nonetheless regarded as something with which Canadian foreign policy must engage, if only because of Canada’s membership in many United Nations and other multilateral fora. Development of a single global health strategy or framework is seen as important to improve intersectoral cooperation on health issues, and foreign policy coherence. There remains a cautious optimism that health could become the base from which Canada reasserts its internationalist status. PMID:24977037
Labonté, Ronald; Runnels, Vivien; Gagnon, Michelle
2012-06-01
Canada has been regarded as a model global citizen with firm commitments to multilateralism. It has also played important roles in several international health treaties and conventions in recent years. There are now concerns that its interests in health as a foreign policy goal may be diminishing. This article reports on a thematic analysis of key Canadian foreign policy statements issued over the past decade, and interviews with key informants knowledgeable of, or experienced in the interstices of Canadian health and foreign policy. It finds that health is primarily and increasingly framed in relation to national security and economic interests. Little attention has been given to human rights obligations relevant to health as a foreign policy issue, and global health is not seen as a priority of the present government. Global health is nonetheless regarded as something with which Canadian foreign policy must engage, if only because of Canada's membership in many United Nations and other multilateral fora. Development of a single global health strategy or framework is seen as important to improve intersectoral cooperation on health issues, and foreign policy coherence. There remains a cautious optimism that health could become the base from which Canada reasserts its internationalist status.
NASA Technical Reports Server (NTRS)
Charles, John B.; Bogomolov, Valery V.
2015-01-01
Effective use of the unique capabilities of the International Space Station (ISS) for risk reduction on future deep space missions involves preliminary work in analog environments to identify and evaluate the most promising techniques, interventions and treatments. This entails a consolidated multinational approach to biomedical research both on ISS and in ground analogs. The Multilateral Human Research Panel for Exploration (MHRPE) was chartered by the five ISS partners to recommend the best combination of partner investigations on ISS for risk reduction in the relatively short time available for ISS utilization. MHRPE will also make recommendations to funding agencies for appropriate preparatory analog work. In 2011, NASA's Human Research Program (HRP) and the Institute of Biomedical Problems (IBMP) of the Russian Academy of Science, acting for MHRPE, developed a joint US-Russian biomedical program for the 2015 one-year ISS mission (1YM) of American and Russian crewmembers. This was to evaluate the possibilities for multilateral research on ISS. An overlapping list of 16 HRP, 9 IBMP, 3 Japanese, 3 European and 1 Canadian investigations were selected to address risk-reduction goals in 7 categories: Functional Performance, Behavioral Health, Visual Impairment, Metabolism, Physical Capacity, Microbial and Human Factors. MHRPE intends to build on this bilateral foundation to recommend more fully-integrated multilateral investigations on future ISS missions commencing after the 1YM. MHRPE has also endorsed an on-going program of coordinated research on 6-month, one-year and 6-week missions ISS expeditions that is now under consideration by ISS managers. Preparatory work for these missions will require coordinated and collaborative campaigns especially in the psychological and psychosocial areas using analog isolation facilities in Houston, Köln and Moscow, and possibly elsewhere. The multilateral Human Analogs research working group (HANA) is the focal point of those planning discussions, with MHRPE coordinating between the national programs and then supporting implementation on ISS. Experience gained during preparations for the 1YM has identified improvements in both American and Russian processes to enable well-integrated investigations on all subsequent ISS expeditions. Among those is that the greatest efficiency is to be gained with investigations that are fully integrated from their conception, with co-principal investigators, a consolidated proposal and integrated plans for crewmember time and other flight-related resources. Analog investigations preceding future ISS expeditions will employ these lessons in efficiency to evaluate the techniques and tools to be validated aboard ISS. In this way, the resources and capabilities of ISS can be applied most efficiently to solving the problems facing astronauts of all nations in missions deep into the solar system.
VIEW LOOKING SOUTHWEST AT BUILDING 121, THE PLANT SECURITY BUILDING. ...
VIEW LOOKING SOUTHWEST AT BUILDING 121, THE PLANT SECURITY BUILDING. BUILDING 121 WAS ONE OF THE ORIGINAL STRUCTURES AT THE ROCKY FLATS PLANT. IT SHARES A COMMON WALL WITH BUILDING 122, THE EMERGENCY MEDICAL BUILDING. (7/29/52) - Rocky Flats Plant, Security & Armory, West of Third Street, south of Central Avenue, Golden, Jefferson County, CO
SECURITY GATE FOR WEAPONS STORAGE AREA. FROM LEFT TO RIGHT, ...
SECURITY GATE FOR WEAPONS STORAGE AREA. FROM LEFT TO RIGHT, STORAGE BUILDING (BUILDING 3584), CONVENTIONAL MUNITIONS SHOP (BUILDING 3580), AND SECURITY POLICE ENTRY CONTROL BUILDING (BUILDING 3582). VIEW TO SOUTHWEST - Plattsburgh Air Force Base, U.S. Route 9, Plattsburgh, Clinton County, NY
Comments for A Conference on Verification in the 21st Century
DOE Office of Scientific and Technical Information (OSTI.GOV)
Doyle, James E.
2012-06-12
The author offers 5 points for the discussion of Verification and Technology: (1) Experience with the implementation of arms limitation and arms reduction agreements confirms that technology alone has never been relied upon to provide effective verification. (2) The historical practice of verification of arms control treaties between Cold War rivals may constrain the cooperative and innovative use of technology for transparency, veification and confidence building in the future. (3) An area that has been identified by many, including the US State Department and NNSA as being rich for exploration for potential uses of technology for transparency and verification ismore » information and communications technology (ICT). This includes social media, crowd-sourcing, the internet of things, and the concept of societal verification, but there are issues. (4) On the issue of the extent to which verification technologies are keeping pace with the demands of future protocols and agrements I think the more direct question is ''are they effective in supporting the objectives of the treaty or agreement?'' In this regard it is important to acknowledge that there is a verification grand challenge at our doorstep. That is ''how does one verify limitations on nuclear warheads in national stockpiles?'' (5) Finally, while recognizing the daunting political and security challenges of such an approach, multilateral engagement and cooperation at the conceptual and technical levels provides benefits for addressing future verification challenges.« less
4. VIEW OF SECURITY GATE LOOKING SOUTHWEST FROM ROOF OF ...
4. VIEW OF SECURITY GATE LOOKING SOUTHWEST FROM ROOF OF BUILDING 8970 (CREW READINESS BUILDING) SHOWING BUILDING 8965 (SECURITY POLICE ENTRY CONTROL BUILDING) IN RIGHT MIDDLE GROUND AND BUILDING 8966 (ELECTRIC POWER STATION BUILDING) IN RIGHT FOREGROUND. - Loring Air Force Base, Alert Area, Southeastern portion of base, east of southern end of runway, Limestone, Aroostook County, ME
Knowledge sharing in the health scenario
2014-01-01
The understanding of certain data often requires the collection of similar data from different places to be analysed and interpreted. Interoperability standards and ontologies, are facilitating data interchange around the world. However, beyond the existing networks and advances for data transfer, data sharing protocols to support multilateral agreements are useful to exploit the knowledge of distributed Data Warehouses. The access to a certain data set in a federated Data Warehouse may be constrained by the requirement to deliver another specific data set. When bilateral agreements between two nodes of a network are not enough to solve the constraints for accessing to a certain data set, multilateral agreements for data exchange are needed. We present the implementation of a Multi-Agent System for multilateral exchange agreements of clinical data, and evaluate how those multilateral agreements increase the percentage of data collected by a single node from the total amount of data available in the network. Different strategies to reduce the number of messages needed to achieve an agreement are also considered. The results show that with this collaborative sharing scenario the percentage of data collected dramaticaly improve from bilateral agreements to multilateral ones, up to reach almost all data available in the network. PMID:25471452
Sexual Aspects of Multilateral Relations
ERIC Educational Resources Information Center
Constantine, Joan M.; Constantine, Larry L.
1971-01-01
This study involved a variety of data gathering techniques focusing on almost every aspect of multilateral marriages. Specific topics covered included sex as motivation, group sex, sleeping arrangements, cohesion, sexual problems, jealousy, roles and sex differences. (Author/CG)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dreimanis, A.
This report considers the problem of multilevel consensus building for siting and construction of shared multinational/regional repositories for radioactive waste (RW) deep disposal. In the siting of a multinational repository there appears an essential innovative component of stakeholder consensus building, namely: to reach consent - political, social, economic, ecological - among international partners, in addition to solving the whole set of intra-national consensus building items. An entire partnering country is considered as a higher-level stakeholder - the national stakeholder, represented by the national government, being faced to simultaneous seeking an upward (international) and a downward (intra-national) consensus in a psychologicallymore » stressed environment, possibly being characterized by diverse political, economic and social interests. The following theses as a possible interdisciplinary approach towards building of shared understanding and stakeholder consensus on the international scale of RW disposal are forwarded and developed: a) building of international stakeholder consensus would be promoted by activating and diversifying on the international scale multilateral interactions between intra- and international stakeholders, including web-based networks of the RW disposal site investigations and decision-making, as well as networks for international cooperation among government authorities in nuclear safety, b) gradual progress in intergovernmental consensus and reaching multilateral agreements on shared deep repositories will be the result of democratic dialogue, via observing the whole set of various interests and common resolving of emerged controversies by using advanced synergetic approaches of conflict resolution, c) cross-cultural thinking and world perception, mental flexibility, creativity and knowledge are considered as basic prerogatives for gaining a higher level of mutual understanding and consensus for seeking further consensus, for advancing the preparedness to act together, and ultimately - for achieving desired shared goals. It is proposed that self-organized social learning will make it possible to promote adequate perception of risk and prevent, by diminishing uncertainties and unknown factors, social amplification of an imagined risk, as well as to increase the trust level and facilitate more adequate equity perception. The proposed approach to the multilevel stakeholder consensus building on international scale is extrapolated to the present-day activities of siting of such near-surface RW disposal facilities which supposedly could have non-negligible trans-boundary impact. A multilevel stakeholder interaction process is considered for the case of resolving of emerged problems in site selection for the planned near-surface RW repository in vicinity of the Lithuanian-Latvian border foreseen for disposal of short lived low- and intermediate level waste arising from the decommissioning of the Ignalina Nuclear Power Plant. (authors)« less
OVERALL view OF CONTROL BUILDING AND SECURITY GATE. view TO ...
OVERALL view OF CONTROL BUILDING AND SECURITY GATE. view TO EAST. - Plattsburgh Air Force Base, Security Police Entry Control Building, Off Perimeter Road in Weapons Storage Area, Plattsburgh, Clinton County, NY
OVERALL VIEW OF CONTROL BUILDING AND SECURITY GATE. VIEW TO ...
OVERALL VIEW OF CONTROL BUILDING AND SECURITY GATE. VIEW TO NORTH. - Plattsburgh Air Force Base, Security Police Entry Control Building, Off Perimeter Road in SAC Alert Area, Plattsburgh, Clinton County, NY
NASA Technical Reports Server (NTRS)
Hudiburg, John J.
2004-01-01
NASA's international programs are both numerous and successful, with over two thousand international agreements forming a foundation of U.S. government cooperation that involved over half the United Nation's membership. Previous research, by the author, into these agreements has identified five variables underlying NASA's international cooperation efforts and these variables form a framework for explaining international cooperation behavior on a macro-level. This paper builds upon that research to effectively explain lower-level patterns of cooperation in NASA's experience. Two approaches for analyzing the space agency's history are used: aggregation of all agreements and a cluster (disaggregated) analysis of four key segments. While researchers of NASA's international cooperation often considered individual cases first, and then generalize to macro-level explanations. This study, in contrast, begins by considering all agreements together in order to explain as much as possible at the macro level before proceeding to lower tier explanations. These lower tier assessments are important to understanding regional and political influences on bilateral and multilateral cooperation. In order to accomplish this lower-tier analysis, the 2000 agreements are disaggregated into logical groupings enabling an analysis of important questions and clearer focus on key patterns concerning developing states, such as the role of international institutions or privatization on international cooperation in space technology.
Assessing Wide Area Multilateration and ADS-B as alternative surveillance technology
DOT National Transportation Integrated Search
2005-09-26
The Helicopter In-Flight Tracking System (HITS) program evaluated both Wide Area Multilateration (WAM) and Automatic Dependent Surveillance Broadcast (ADS-B) as alternative surveillance technologies for both the terminal and en route domains in t...
Accuracy limitations of hyperbolic multilateration systems
DOT National Transportation Integrated Search
1973-03-22
The report is an analysis of the accuracy limitations of hyperbolic multilateration systems. A central result is a demonstration that the inverse of the covariance matrix for positional errors corresponds to the moment of inertia matrix of a simple m...
Building Security and Personal Safety. SPEC Kit 150.
ERIC Educational Resources Information Center
Bingham, Karen Havill
This report on a survey of Association of Research Libraries (ARL) member libraries on building security and personal safety policies examines three areas in detail: (1) general building security (access to the building, key distribution, patrols or monitors, intrusion prevention, lighting, work environment after dark); (2) problem behavior…
Gómez, Eduardo J; Atun, Rifat
2013-05-10
The role of multilateral donor agencies in global health is a new area of research, with limited research on how these agencies differ in terms of their governance arrangements, especially in relation to transparency, inclusiveness, accountability, and responsiveness to civil society. We argue that historical analysis of the origins of these agencies and their coalition formation processes can help to explain these differences. We propose an analytical approach that links the theoretical literature discussing institutional origins to path dependency and institutional theory relating to proto institutions in order to illustrate the differences in coalition formation processes that shape governance within four multilateral agencies involved in global health. We find that two new multilateral donor agencies that were created by a diverse coalition of state and non-state actors, such as the Global Fund to Fight AIDS, Tuberculosis and Malaria and GAVI, what we call proto-institutions, were more adaptive in strengthening their governance processes. This contrasts with two well-established multilateral donor agencies, such as the World Bank and the Asian Development Bank, what we call Bretton Woods (BW) institutions, which were created by nation states alone; and hence, have different origins and consequently different path dependent processes.
2013-01-01
The role of multilateral donor agencies in global health is a new area of research, with limited research on how these agencies differ in terms of their governance arrangements, especially in relation to transparency, inclusiveness, accountability, and responsiveness to civil society. We argue that historical analysis of the origins of these agencies and their coalition formation processes can help to explain these differences. We propose an analytical approach that links the theoretical literature discussing institutional origins to path dependency and institutional theory relating to proto institutions in order to illustrate the differences in coalition formation processes that shape governance within four multilateral agencies involved in global health. We find that two new multilateral donor agencies that were created by a diverse coalition of state and non-state actors, such as the Global Fund to Fight AIDS, Tuberculosis and Malaria and GAVI, what we call proto-institutions, were more adaptive in strengthening their governance processes. This contrasts with two well-established multilateral donor agencies, such as the World Bank and the Asian Development Bank, what we call Bretton Woods (BW) institutions, which were created by nation states alone; and hence, have different origins and consequently different path dependent processes. PMID:23663485
History of U.S. Nuclear Weapons Doctrine and a Path Forward
NASA Astrophysics Data System (ADS)
Chyba, Christopher
2007-04-01
During the Cold War, the United States considered a number of approaches for living in a world with nuclear weapons, including disarmament, preventive war, the incorporation of nuclear weapons into military strategy, passive and active defense, and deterrence. With the failure of early approaches to disarmament, and the rejection of preventive war against the Soviet Union (and later, China), deterrence became central to key nuclear relationships, though arms control continued to play an important role. The nuclear nonproliferation treaty made preventing the further spread of nuclear weapons another central component of U.S. policy. The Bush Administration has tried to devise a new policy for the post-Cold War period. Their approach has three salient pillars. First, it is characterized by an overall skepticism toward multilateral agreements, on the grounds that bad actors will not obey them, that agreements can lead to a false sense of security, and that such agreements are too often a way for the Lilliputians of the world to tie down Gulliver. The March 2005 U.S. National Defense Strategy declared that U.S. strength ``will continue to be challenged by those who employ a strategy of the weak, using international fora, judicial processes and terrorism.'' Second, the Bush Administration declared its intention to maintain a military dominance so great that other states simply would not try to catch up. The 2002 National Security Strategy states that ``Our forces will be strong enough to dissuade potential adversaries from pursuing a military build-up in hopes of surpassing, or equaling, the power of the United States.'' Third, the 2002 National Security Strategy (reaffirmed by the 2006 National Security Strategy) moved preventive war (which the strategies called ``preemptive war'') to a central position, rather than deterrence and nonproliferation. In part this was because of the claim that certain ``rogue'' states, and terrorist groups, were not deterrable. This talk will sketch this history, discuss the approach of the Bush Administration in more detail and assess its successes and failures, and suggest the lines of a new approach to U.S. nuclear weapons policy for the coming decades. This approach will follow that outlined in George Bunn and Christopher Chyba (eds.), ``U.S. Nuclear Weapons Policy: Confronting Today's Threats'' (Brookings, 2006, 340 pp.).
Confidence-Building Measures in Philippine Security.
1998-05-01
service or government agency. STRATEGY RESEARCH PROJECT i CONFIDENCE-BUILDING MEASURES IN PHILIPPINE SECURITY BY LIEUTENANT COLONEL RAMON G...WAR COLLEGE, CARLISLE BARRACKS, PA 17013-5050 rimo*’^»®*raBl USAWC STRATEGY RESEARCH PROJECT CONFIDENCE-BUILDING MEASURES IN PHILIPPINE...Colonel Ramon Santos, Philippine Army TITLE: Confidence-Building Measures in Philippine Security FORMAT: Strategy Research Project DATE: 1
Development and validation of a multilateration test bench for particle accelerator pre-alignment
NASA Astrophysics Data System (ADS)
Kamugasa, Solomon William; Rothacher, Markus; Gayde, Jean-Christophe; Mainaud Durand, Helene
2018-03-01
The development and validation of a portable coordinate measurement solution for fiducialization of compact linear collider (CLIC) components is presented. This new solution addresses two limitations of high-accuracy state-of-the-art coordinate measuring machines, i.e. lack of portability and limited measurement volume. The solution is based on frequency scanning interferometry (FSI) distances and the multilateration coordinate measurement technique. The developments include a reference sphere for localizing the FSI optical fiber tip and a kinematic mount for repositioning the reference sphere with sub-micrometric repeatability. This design enables absolute distance measurements in different directions from the same point, which is essential for multilateration. A multilateration test bench built using these prototypes has been used to fiducialize a CLIC cavity beam position monitor and 420 mm-long main beam quadrupole magnet. The combined fiducialization uncertainty achieved is 3.5 μm (k = 1), which is better than the CLIC 5 μm (k = 1) uncertainty specification.
Building a Secure Library System.
ERIC Educational Resources Information Center
Benson, Allen C.
1998-01-01
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
22 CFR 140.7 - Multilateral institutions and international organizations.
Code of Federal Regulations, 2011 CFR
2011-04-01
... involved in drug trafficking, the provisions of § 140.6 shall apply. (b) Where the government agency... ensure that the assistance is not diverted in support of drug trafficking. Example: The State Department... TO DRUG TRAFFICKERS Enforcement § 140.7 Multilateral institutions and international organizations...
Fund Education, Shape the Future: Case for Investment. Replenishment 2020
ERIC Educational Resources Information Center
Global Partnership for Education, 2017
2017-01-01
The Global Partnership for Education (GPE) is the only multilateral partnership and fund dedicated exclusively to education in the world's poorest countries. The partnership includes developing country partners, donor countries, multilateral agencies, civil society, teachers, philanthropic foundations and the private sector. GPE brings together…
22 CFR 140.7 - Multilateral institutions and international organizations.
Code of Federal Regulations, 2010 CFR
2010-04-01
... involved in drug trafficking, the provisions of § 140.6 shall apply. (b) Where the government agency... ensure that the assistance is not diverted in support of drug trafficking. Example: The State Department... TO DRUG TRAFFICKERS Enforcement § 140.7 Multilateral institutions and international organizations...
OSRP Source Repatriations-Case Studies: Brazil, Ecuador, Uruguay
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greenberg, Ray Jr.; Abeyta, Cristy; Matzke, Jim
2012-07-01
The Global Threat Reduction Initiative's (GTRI) Offsite Source Recovery Project (OSRP) began recovering excess and unwanted radioactive sealed sources (sources) in 1999. As of February 2012, the project had recovered over 30,000 sources totaling over 820,000 Ci. OSRP grew out of early efforts at Los Alamos National Laboratory (LANL) to recover disused excess Plutonium- 239 (Pu-239) sources that were distributed in the 1960's and 1970's under the Atoms for Peace Program. Source recovery was initially considered a waste management activity. However, after the 9/11 terrorist attacks, the interagency community began to recognize that excess and unwanted radioactive sealed sources posemore » a national security threat, particularly those that lack a disposition path. After OSRP's transfer to the U.S. National Nuclear Security Administration (NNSA) to be part of GTRI, its mission was expanded to include all disused sealed sources that might require national security consideration. Recognizing the transnational threat posed by porous borders and the ubiquitous nature of sources, GTRI/OSRP repatriates U.S. origin sources based on threat reduction prioritization criteria. For example, several recent challenging source repatriation missions have been conducted by GTRI/OSRP in South America. These include the repatriation of a significant amount of Cs-137 and other isotopes from Brazil; re-packaging of conditioned Ra-226 sources in Ecuador for future repatriation; and, multilateral cooperation in the consolidation and export of Canadian, US, and Indian Co-60/Cs-137 sources from Uruguay. In addition, cooperation with regulators and private source owners in other countries presents opportunities for GTRI/OSRP to exchange best practices for managing disused sources. These positive experiences often result in long-term cooperation and information sharing with key foreign counterparts. International source recovery operations are essential to the preservation of U.S. national security interests. They are also mutually beneficial for fostering positive relationships with other governments and private industry, and demonstrate that responsible end-of-life options are given to legacy U.S.-origin sources in other countries. GTRI/OSRP does not take back sources that have a viable path for commercial disposal. Most US origin sources were sold commercially and were not provided by the US government. Below is a synopsis of cooperative efforts with Brazil, Ecuador, and Uruguay. Bilateral and multilateral efforts have been successful in removing hundreds of U.S.origin sealed radioactive sources from Latin American countries to the U.S. As many disused sources remain in the region, and since repatriation is not always an option, GTRI will continue to work with those countries to ensure that these sources are stored securely for the long-term. Successful Latin America operations should serve as a model for other regional cooperation in the repatriation of sealed sources, encouraging other source exporting countries to implement similar programs. Securing and removing sources, both domestically and internationally, is crucial to strengthening the life-cycle management of radioactive sources worldwide. Such efforts not only prevent these materials from being used maliciously, but also address public health and safety concerns, and under-gird the IAEA Code of Conduct on the Safety and Security of Radioactive Sources. (authors)« less
19. SITE BUILDING 002 SCANNER BUILDING AIR POLICE ...
19. SITE BUILDING 002 - SCANNER BUILDING - AIR POLICE SITE SECURITY OFFICE WITH "SITE PERIMETER STATUS PANEL" AND REAL TIME VIDEO DISPLAY OUTPUT FROM VIDEO CAMERA SYSTEM AT SECURITY FENCE LOCATIONS. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
15. Front security entrance to the perimeter acquisition radar building, ...
15. Front security entrance to the perimeter acquisition radar building, showing rotogates 1 and 2 and entrance door to security operations control center (SOCC), room #108 - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
A Game Simulation of Multilateral Trade for Classroom Use.
ERIC Educational Resources Information Center
Thompson, Gary L.; Carter, Ronald L.
An alternative to existing methods for teaching elementary economic geography courses was developed in a game format to teach the basic process of trade through role playing. Simplifying the complexities of multilateral trade to a few basic decisions and acts, the cognitive objectives are to develop in the student: 1) an understanding of regional…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-10
... Transportation (OST), Pricing & Multilateral Affairs Division, DOT. ACTION: Notice and request for comments. SUMMARY: The Department of Transportation (DOT), OST, Pricing & Multilateral Affairs Division invites... CONTACT: John Kiser, 202-366-2435 or Bernice C. Gray, 202-366-2418, Office of the Secretary, Pricing and...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maricic, N.; Mohaghegh, S.D.; Artun, E.
2008-12-15
Recent years have witnessed a renewed interest in development of coalbed methane (CBM) reservoirs. Optimizing CBM production is of interest to many operators. Drilling horizontal and multilateral wells is gaining Popularity in many different coalbed reservoirs, with varying results. This study concentrates on variations of horizontal and multilateral-well configurations and their potential benefits. In this study, horizontal and several multilateral drilling patterns for CBM reservoirs are studied. The reservoir parameters that have been studied include gas content, permeability, and desorption characteristics. Net present value (NPV) has been used as the yard stick for comparing different drilling configurations. Configurations that havemore » been investigated are single-, dual-, tri-, and quad-lateral wells along with fishbone (also known as pinnate) wells. In these configurations, the total length of horizontal wells and the spacing between laterals (SBL) have been studied. It was determined that in the cases that have been studied in this paper (all other circumstances being equal), quadlateral wells are the optimum well configuration.« less
Chawla, Kashmira S; Rutkow, Lainie; Garber, Kent; Kushner, Adam L; Stewart, Barclay T
2017-05-01
Access to quality and timely emergency and essential surgical care and anesthesia (EESCA) is an integral component of the right to health as reinforced by the ratification of the World Health Assembly Resolution 68.15. However, this resolution is merely a guideline and has not been able to bolster the necessary political will to promote EESCA. Our objective was to evaluate international treaties, which carry legal obligations, for EESCA-related text, and develop a human rights-based framework to support EESCA advancement and advocacy. We conducted a comprehensive review of all the UN Treaty Collection-Certified True Copies (CTCs) of multilateral treaties database from December 2015 to April 2016. The relevant text was manually searched to abstract and analyze to identify major themes supporting a human rights-based approach to EESCA. Multiple treaties in the UN database addressed EESCA in the areas of human rights, refugees and stateless persons, health, penal matters, and disarmament. A total of 13 treaties containing 23 articles had language that endorsed aspects of EESCA. The three major themes, supported by the phraseology in the treaties, included: (1) equal access to EESCA (eight articles); (2) timely care of injured and those with emergency surgical conditions (eight articles); and (3) protection, rehabilitation, psychosocial support, and social security (seven articles). A number of United Nations multilateral treaties support available and equitable EESCA. These findings can be used to galvanize support and encourage signatory Member States to promote and implement EESCA development initiatives.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... base stations that utilize multilateration technology to provide multilateration location service to....: 3060-0221. Title: Section 90.155, Time in Which Station Must Be Placed in Operation. Form No.: FCC Form... government entities to place their stations in operation on a case-by-case basis upon a showing of need. This...
ERIC Educational Resources Information Center
Nieto, Diego
2018-01-01
Understanding multilateral institutions' role in the construction of desirable goals for educational reform is a key element to grasp the weight globalisation has on local practices of education. Comparative studies of civics and moral education point to the idea of 'citizenship' as a site revealing not only the political economy but also the…
47 CFR 90.155 - Time in which station must be placed in operation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Applications and Authorizations § 90.155 Time in... associated mobile station is also placed in operation. See also §§ 90.633(d) and 90.631(f). (d... multilateration technology, to one or more mobile units. Specifically, LMS multilateration stations will only be...
Multilateral Agencies in the Construction of the Global Agenda on Education
ERIC Educational Resources Information Center
King, Kenneth
2007-01-01
This article traces the construction of the educational dimension of the global development agenda over the period 1990 to 2006. It argues that the multilateral agencies, and notably the World Bank, UNICEF, UNESCO and UNDP, played vital roles in designing the architecture of this world agenda, supported at a key stage by the Development Assistance…
5. SOUTH ELEVATION OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL ...
5. SOUTH ELEVATION OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL BUILDING). - Loring Air Force Base, Alert Area, Southeastern portion of base, east of southern end of runway, Limestone, Aroostook County, ME
6. SOUTHWEST CORNER OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL ...
6. SOUTHWEST CORNER OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL BUILDING). - Loring Air Force Base, Alert Area, Southeastern portion of base, east of southern end of runway, Limestone, Aroostook County, ME
7. SOUTHEAST CORNER OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL ...
7. SOUTHEAST CORNER OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL BUILDING). - Loring Air Force Base, Alert Area, Southeastern portion of base, east of southern end of runway, Limestone, Aroostook County, ME
NASA Astrophysics Data System (ADS)
Alajlouni, Sa'ed; Albakri, Mohammad; Tarazaga, Pablo
2018-05-01
An algorithm is introduced to solve the general multilateration (source localization) problem in a dispersive waveguide. The algorithm is designed with the intention of localizing impact forces in a dispersive floor, and can potentially be used to localize and track occupants in a building using vibration sensors connected to the lower surface of the walking floor. The lower the wave frequencies generated by the impact force, the more accurate the localization is expected to be. An impact force acting on a floor, generates a seismic wave that gets distorted as it travels away from the source. This distortion is noticeable even over relatively short traveled distances, and is mainly caused by the dispersion phenomenon among other reasons, therefore using conventional localization/multilateration methods will produce localization error values that are highly variable and occasionally large. The proposed localization approach is based on the fact that the wave's energy, calculated over some time window, decays exponentially as the wave travels away from the source. Although localization methods that assume exponential decay exist in the literature (in the field of wireless communications), these methods have only been considered for wave propagation in non-dispersive media, in addition to the limiting assumption required by these methods that the source must not coincide with a sensor location. As a result, these methods cannot be applied to the indoor localization problem in their current form. We show how our proposed method is different from the other methods, and that it overcomes the source-sensor location coincidence limitation. Theoretical analysis and experimental data will be used to motivate and justify the pursuit of the proposed approach for localization in a dispersive medium. Additionally, hammer impacts on an instrumented floor section inside an operational building, as well as finite element model simulations, are used to evaluate the performance of the algorithm. It is shown that the algorithm produces promising results providing a foundation for further future development and optimization.
Food Security-A Commentary: What Is It and Why Is It So Complicated?
Gibson, Mark
2012-12-03
Every year over 10 million people die of hunger and hunger related diseases. Nearly six million of these are children under the age of five; that is one child's death approximately every six seconds. Understanding how this still occurs amid the ever increasing social enlightenment of the 21st century-and under the auspices of a vigilant global developmental community-is one of the key challenges of our time. The science of food security aims to address such concerns. By understanding the multiplicity of the phenomenon, practitioners of global multilateral hegemony seek to shape appropriate policy to address these issues. The difficulty however is that the phenomenon is increasingly wrapped up inside an ever growing bundle of societal aspirations including inter-alia under-nutrition, poverty, sustainability, free trade, national self sufficiency, reducing female subjugation and so on. Any solutions therefore, involve fully understanding just what is indeed included, implied, understood or excluded within the food security catchall. Indeed, until such time as consensus can be found that adequately binds the phenomenon within a fixed delineated concept, current efforts to address the multitude of often divergent threads only serves to dilute efforts and confound attempts to once-and-for-all bring these unacceptable figures under control.
Till, Brian M; Peters, Alexander W; Afshar, Salim; Meara, John
2017-01-01
Blockchain technology and cryptocurrencies could remake global health financing and usher in an era global health equity and universal health coverage. We outline and provide examples for at least four important ways in which this potential disruption of traditional global health funding mechanisms could occur: universal access to financing through direct transactions without third parties; novel new multilateral financing mechanisms; increased security and reduced fraud and corruption; and the opportunity for open markets for healthcare data that drive discovery and innovation. We see these issues as a paramount to the delivery of healthcare worldwide and relevant for payers and providers of healthcare at state, national and global levels; for government and non-governmental organisations; and for global aid organisations, including the WHO, International Monetary Fund and World Bank Group.
A Model of Solid Waste Management Based Multilateral Co-Operation in Semi-Urban Community
ERIC Educational Resources Information Center
Kanchanabhandhu, Chanchai; Woraphong, Seree
2016-01-01
The purpose of this research was to construct a model of solid waste management based on multilateral cooperation in semi-urban community. Its specific objectives were to 1) study the solid waste situation and involvement of community in the solid waste management in Wangtaku Sub-district, Muang District, Nakhon Pathom Province; 2) construct a…
ERIC Educational Resources Information Center
Schaub, Maryellen; Henck, Adrienne; Baker, David P.
2017-01-01
Current global conceptions of childhood dictate that all children are entitled to a childhood that provides protection, preparation, and child development for the whole child. We analyze 65 years of policy documents from the influential multilateral agency UNICEF focusing on how cultural ideas have changed over time and how they have blended into…
ERIC Educational Resources Information Center
Sumida, Sugata
2017-01-01
A number of papers have focused on UN policy formulation processes, but little is known about how particular issues come to policy-makers' attention in the first place. This very early stage of policy formulation, called agenda setting, remains under-researched and more so in multilateral contexts. Applying Kingdon's multiple streams model to the…
Group Multilateral Relation Analysis Based on Large Data
NASA Astrophysics Data System (ADS)
LIU, Qiang; ZHOU, Guo-min; CHEN, Guang-xuan; XU, Yong
2017-09-01
Massive, multi-source, heterogeneous police data and social data brings challenges to the current police work. The existing massive data resources are studied as the research object to excavate the group of multilateral relations by using large data technology for data archiving. The results of the study could provide technical support to police enforcement departments for fighting crime and preventing crime.
Intellectual Property Rights and Access to Medicines: International Trade Issues
2009-05-28
for pharmaceutical companies to invest in R&D. • Type III diseases, such as dengue fever and African sleeping sickness, are those that have...As such, the United States has pursued strong IPR regimes through multilateral, regional , and bilateral free trade agreement (FTA) negotiations and...standards for IPR protection and enforcement. Countries have advanced IPR protection and enforcement efforts through multilateral, regional , and
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
The report discusses issues relating to multilateral disarmament in the context of the Special Session of the United Nations General Assembly to be convened in 1978. Intended as a forum for the exchange of ideas of government leaders from the United States and other nations about the international peace-keeping role of the United Nations, the…
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
This is a report of a conference held in Bermuda in 1981 to discuss a multilateral approach to disarmament. The conference was an informal, off-the-record exchange of ideas and opinions among 24 diplomats and scholars from 18 countries and two international agencies. Participants considered current disarmament concepts, assessed UN disarmament…
Rapid Building Assessment Project
2014-05-01
Efficiency Buildings Hub EISA Energy Independence Security Act EPRI The Electric Power and Research Institute ESTCP Environmental Security Technology...Ordinary Least Squares PG&E Pacific Gas & Electric R&D research and development RBA Remote Building Analytics REST representational state...utilities across North America and Europe. Requiring only hourly utility electric meter data, the building type, and address, FirstFuel can produce a
Dean, J; Forsberg, R C; Mendlovitz, S
2000-01-01
At the end of history's bloodiest century and the outset of a new millennium, we have an opportunity to fulfil one of humanity's oldest dreams: making the world largely free of war. Global changes make this goal achievable. Nuclear weapons have shown the folly of war. For the first time, there is no war and no immediate prospect of war among the main military powers. For the first time, many proven measures to prevent armed conflict, distilled in the crucible of this century's wars, are available. If systematically applied, these measures can sharply decrease the frequency and violence of war, genocide, and other forms of deadly conflict. To seize the opportunity, nations should adopt a comprehensive programme to reduce conventional armaments and armed conflict. This programme will complement and strengthen efforts to eliminate nuclear arms. To assure its ongoing worldwide implementation, the conventional reduction programme should be placed in a treaty framework. We propose a four-phased process, with three treaties, each lasting five to ten years, to lay the groundwork for the fourth treaty, which will establish a permanent international security system. The main objectives of the treaties are to achieve: 1. A verified commitment to provide full transparency on conventional armed forces and military spending, not to increase forces during negotiations on arms reductions, and to increase the resources allocated to multilateral conflict prevention and peacekeeping. 2. Substantial worldwide cuts in national armed forces and military spending and further strengthening of United Nations and regional peacekeeping and peace-enforcement capabilities. 3. A trial of a watershed commitment by participating nations, including the major powers, not to deploy their armed forces beyond national borders except in a multilateral action under UN or regional auspices. 4. A permanent transfer to the UN and regional security organizations of the authority and capability for armed intervention to prevent or end war, accompanied by further substantial cuts in national armed forces and increases in UN and regional forces. This programme offers many valuable features: a global framework for conventional forces that parallels the nuclear Non-Proliferation Treaty; a verified no-increase commitment for national armed forces based on full data exchange; a commitment to undertake prescribed confidence-building measures, including limits on force activities and deployments; a commitment to a specified plan for increased funding of UN and regional peacekeeping capabilities; a commitment to strengthen international legal institutions; and after a trial period, a lasting commitment by each participant not to unilaterally deploy its armed forces beyond its borders, but instead to give the responsibility for peacekeeping and peace enforcement to international institutions. This programme of phased steps to reduce armed forces and strengthen peacekeeping institutions will make war rare. It will foster the spread of zones of peace like those in North America and Western Europe where, after centuries of violence, international and civil war have given way to the peaceful settlement of disputes.
Directory of financing sources for foreign energy projects
DOE Office of Scientific and Technical Information (OSTI.GOV)
La Ferla, L.
1995-09-01
The Office of National Security Policy has produced this Directory of Financing Sources for Foreign Energy Projects. The Directory reviews programs that offer financing from US government agencies, multilateral organizations, public, private, and quasi-private investment funds, and local commercial and state development banks. The main US government agencies covered are the US Agency for International Development (USAID), the Export-Import Bank of the US (EXIM Bank), Overseas Private Investment Corporation (OPIC), US Department of Energy, US Department of Defense, and the US Trade and Development Agency (TDA). Other US Government Sources includes market funds that have been in part capitalized usingmore » US government agency funds. Multilateral organizations include the World Bank, International Finance Corporation (IFC), Asian Development Bank (ADB), European Bank for Reconstruction and Development (EBRD), and various organizations of the United Nations. The Directory lists available public, private, and quasi-private sources of financing in key emerging markets in the Newly Independent States and other developing countries of strategic interest to the US Department of Energy. The sources of financing listed in this directory should be considered indicative rather than inclusive of all potential sources of financing. Initial focus is on the Russian Federation, Ukraine, india, China, and Pakistan. Separate self-contained sections have been developed for each of the countries to enable the user to readily access market-specific information and to support country-specific Departmental initiatives. For each country, the directory is organized to follow the project life cycle--from prefeasibility, feasibility, project finance, cofinancing, and trade finance, through to technical assistance and training. Programs on investment and export insurance are excluded.« less
VIEW ALONG FLIGHT LINE FROM SECURITY GUARD TOWER (BUILDING 30631, ...
VIEW ALONG FLIGHT LINE FROM SECURITY GUARD TOWER (BUILDING 30631, LOOKING TOWARD FB-1 11A AIRCRAFT SHELTERS (BUILDINGS 3066, 3067,3068,3069,3071,3072,3073,3074,3076). VIEW TO SOUTHEAST - Plattsburgh Air Force Base, U.S. Route 9, Plattsburgh, Clinton County, NY
The 2015 Transition of Wartime Operational Control: A Threat or Opportunity for the ROK /US Alliance
2014-06-13
effects in regional stability. In other words, as Matthew J. Jordan pointed out, multilateral efforts will complement and not supplant established...operations. 46Matthew J. Jordan , “Multilateralism in North East Asia” (Master’s Naval War College...dismantling DPRK’s nuclear program. The impetus for these talks emerged in 2003 when the DPRK revealed its uranium enrichment program. This enrichment
2009-04-01
weeks later when another Cessna packed with the same explosive payload plowed into a football stadium hosting the Super Bowl. The two attacks took the...In 2018 , these confrontations reached a pinnacle when Beijing substantiated a decade of rhetoric and military posturing by staging a surprise...leadership in international affairs focused on bolstering multilateral institutions capable of reforming global governance and managing key
Building Security. Honeywell Planning Guide.
ERIC Educational Resources Information Center
Honeywell, Inc., Minneapolis, Minn.
A general discussion of building detection and alarm systems to provide security against burglary and vandalism is provided by a manufacturer of automated monitoring and control systems. Security systems are identified as--(1) local alarm system, (2) central station alarm system, (3) proprietary alarm system, and (4) direct connect alarm system..…
Till, Brian M; Peters, Alexander W; Afshar, Salim; Meara, John G
2017-01-01
Blockchain technology and cryptocurrencies could remake global health financing and usher in an era global health equity and universal health coverage. We outline and provide examples for at least four important ways in which this potential disruption of traditional global health funding mechanisms could occur: universal access to financing through direct transactions without third parties; novel new multilateral financing mechanisms; increased security and reduced fraud and corruption; and the opportunity for open markets for healthcare data that drive discovery and innovation. We see these issues as a paramount to the delivery of healthcare worldwide and relevant for payers and providers of healthcare at state, national and global levels; for government and non-governmental organisations; and for global aid organisations, including the WHO, International Monetary Fund and World Bank Group. PMID:29177101
Measures to facilitate the reintegration of returning migrant workers: international experiences.
Lohrmann, R
1988-06-01
Bilateral and multilateral measures implemented to assist migrants who return to their country of origin have been designed to respond to a number of different but specific situations. 2 bilateral agreements are briefly described: 1) an agreement between the Federal Republic of Germany and the Republic of Turkey signed in the early 1970s, and 2) an agreement between France and Algeria signed in 1980. 3 different types of multilateral activities are described: 1) the operation of the so-called Return of Talent program by the Intergovernmental Committee for Migration, 2) the Transfer of KNow-how Through Expatriate Nationals program of the UN Development Programme, and 3) the elaboration of a model machinery on return migration by the Organization for Economic Cooperation and Development. While the 1st 2 activities are operational programs, by which annually between 1000-2000 professionals are assisted in their permanent return to or temporary sojourn in their developing countries of origin, with the financial support of both the developed and the developing countries concerned, the 3rd initiative is a conceptual effort aimed at assisting governments to implement policy measures designed to make return migration commensurate with national development goals. 3 recent proposals include 1) the proposal for an international labor compensatory facility, 2) an international fund for vocational training, and 3) an international fund for manpower resources. A common factor shared by all these programs is that they have all involved on 1 side industrial receiving countries which feel themselves obliged to observe a number of principles guaranteed by law and which govern employment conditions and working relations. The reintegration measures implemented or proposed in cooperation with them have been adopted in full consideration of the prevailing standards of these countries, as different as they may be from 1 country to another. A common consideration has been that the returning migrant should reintegrate in his country of origin as far as possible in conditions allowing the returnee to attain self-sufficiency and social security coverage. However, this underlying context does not necessarily prevail in all world regions where different forms of labor migration take place. Therefore the measures experienced in the relationship of specific countries cannot be easily copied for implementation in other countries. Multilateral measures benefited a rather limited number of individuals only, in many instances skilled and highly skilled migrants.
Securing Resources in Collaborative Environments: A Peer-to-peerApproach
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.
2005-09-19
We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.
The International Space Life Sciences Strategic Planning Working Group
NASA Technical Reports Server (NTRS)
White, Ronald J.; Rabin, Robert; Lujan, Barbara F.
1993-01-01
Throughout the 1980s, ESA and the space agencies of Canada, Germany, France, Japan, and the U.S. have pursued cooperative projects bilaterally and multilaterally to prepare for, and to respond to, opportunities in space life sciences research previously unapproachable in scale and sophistication. To cope effectively with likely future space research opportunities, broad, multilateral, coordinated strategic planning is required. Thus, life scientists from these agencies have allied to form the International Space Life Sciences Strategic Planning Working Group. This Group is formally organized under a charter that specifies the purpose of the Working Group as the development of an international strategic plan for the space life sciences, with periodic revisions as needed to keep the plan current. The plan will be policy-, not operations-oriented. The Working Group also may establish specific implementation teams to coordinate multilateral science policy in specific areas; such teams have been established for space station utilization, and for sharing of flight equipment.
77 FR 62249 - Federal Property Suitable as Facilities To Assist the Homeless
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-12
... Reasons: Secured Area New Mexico 3 Buildings Kirtland AFB Kirtland AFB NM 87117 Landholding Agency: Air... security Reasons: Secured Area Bldg. 30116 5801 Manzano St SE Kirtland AFB NM 87117 Landholding Agency: Air... Area 6 Buildings Kirtland AFB Kirtland AFB NM 87117 Landholding Agency: Air Force Property Number...
Foghammar, Ludvig; Jang, Suyoun; Kyzy, Gulzhan Asylbek; Weiss, Nerina; Sullivan, Katherine A; Gibson-Fall, Fawzia; Irwin, Rachel
2016-08-01
Complex security environments are characterized by violence (including, but not limited to "armed conflict" in the legal sense), poverty, environmental disasters and poor governance. Violence directly affecting health service delivery in complex security environments includes attacks on individuals (e.g. doctors, nurses, administrators, security guards, ambulance drivers and translators), obstructions (e.g. ambulances being stopped at checkpoints), discrimination (e.g. staff being pressured to treat one patient instead of another), attacks on and misappropriation of health facilities and property (e.g. vandalism, theft and ambulance theft by armed groups), and the criminalization of health workers. This paper examines the challenges associated with researching the context, scope and nature of violence directly affecting health service delivery in these environments. With a focus on data collection, it considers how these challenges affect researchers' ability to analyze the drivers of violence and impact of violence. This paper presents key findings from two research workshops organized in 2014 and 2015 which convened researchers and practitioners in the fields of health and humanitarian aid delivery and policy, and draws upon an analysis of organizational efforts to address violence affecting healthcare delivery and eleven in-depth interviews with representatives of organizations working in complex security environments. Despite the urgency and impact of violence affecting healthcare delivery, there is an overall lack of research that is of health-specific, publically accessible and comparable, as well as a lack of gender-disaggregated data, data on perpetrator motives and an assessment of the 'knock-on' effects of violence. These gaps limit analysis and, by extension, the ability of organizations operating in complex security environments to effectively manage the security of their staff and facilities and to deliver health services. Increased research collaboration among aid organizations, researchers and multilateral organizations, such as the WHO, is needed to address these challenges. Copyright © 2016 Elsevier Ltd. All rights reserved.
Advantages of a polycentric approach to climate change policy
NASA Astrophysics Data System (ADS)
Cole, Daniel H.
2015-02-01
Lack of progress in global climate negotiations has led scholars to reconsider polycentric approaches to climate policy. Several examples of subglobal mechanisms to reduce greenhouse-gas emissions have been touted, but it remains unclear why they might achieve better climate outcomes than global negotiations alone. Decades of work conducted by researchers associated with the Vincent and Elinor Ostrom Workshop in Political Theory and Policy Analysis at Indiana University have emphasized two chief advantages of polycentric approaches over monocentric ones: they provide more opportunities for experimentation and learning to improve policies over time, and they increase communications and interactions -- formal and informal, bilateral and multilateral -- among parties to help build the mutual trust needed for increased cooperation. A wealth of theoretical, empirical and experimental evidence supports the polycentric approach.
75 FR 3743 - Medicare Program; Meeting of the Practicing Physicians Advisory Council, March 8, 2010
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-22
... will be provided on the Physician Regulatory Issues Team. In accordance with the Council charter, we... Building, the Hubert H. Humphrey Building, Federal security measures are applicable. In planning your arrival time, we recommend allowing additional time to clear security. To gain access to the building...
Multilateral Research Opportunities in Ground Analogs
NASA Technical Reports Server (NTRS)
Corbin, Barbara J.
2015-01-01
The global economy forces many nations to consider their national investments and make difficult decisions regarding their investment in future exploration. International collaboration provides an opportunity to leverage other nations' investments to meet common goals. The Humans In Space Community shares a common goal to enable safe, reliable, and productive human space exploration within and beyond Low Earth Orbit. Meeting this goal requires efficient use of limited resources and International capabilities. The International Space Station (ISS) is our primary platform to conduct microgravity research targeted at reducing human health and performance risks for exploration missions. Access to ISS resources, however, is becoming more and more constrained and will only be available through 2020 or 2024. NASA's Human Research Program (HRP) is actively pursuing methods to effectively utilize the ISS and appropriate ground analogs to understand and mitigate human health and performance risks prior to embarking on human exploration of deep space destinations. HRP developed a plan to use ground analogs of increasing fidelity to address questions related to exploration missions and is inviting International participation in these planned campaigns. Using established working groups and multilateral panels, the HRP is working with multiple Space Agencies to invite International participation in a series of 30- day missions that HRP will conduct in the US owned and operated Human Exploration Research Analog (HERA) during 2016. In addition, the HRP is negotiating access to Antarctic stations (both US and non-US), the German :envihab and Russian NEK facilities. These facilities provide unique capabilities to address critical research questions requiring longer duration simulation or isolation. We are negotiating release of international research opportunities to ensure a multilateral approach to future analog research campaigns, hoping to begin multilateral campaigns in the latter facilities by 2017. Collaborative use of analog facilities and shared investment in the development of spaceflight countermeasures through multilateral campaigns or missions that leverage the global scientific community will focus high quality research and provide sufficient power to accelerate the development of countermeasures and drive sound recommendations for exploration missions. This panel will provide an overview of efforts to encourage and facilitate multilateral collaboration in analog missions or campaigns and describe the facilities currently under consideration to reach the common goal of enabling safe, reliable, and productive human space exploration.
Three-D multilateration: A precision geodetic measurement system
NASA Technical Reports Server (NTRS)
Escobal, P. R.; Ong, K. M.; Vonroos, O. H.; Shumate, M. S.; Jaffe, R. M.; Fliegel, H. F.; Muller, P. M.
1973-01-01
A technique of satellite geodesy for determining the relative three dimensional coordinates of ground stations within one centimeter over baselines of 20 to 10,000 kilometers is discussed. The system is referred to as 3-D Multilateration and has applications in earthquake hazard assessment, precision surveying, plate tectonics, and orbital mechanics. The accuracy is obtained by using pulsed lasers to obtain simultaneous slant ranges between several ground stations and a moving retroreflector with known trajectory for aiming the lasers.
6. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW ...
6. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW TO WEST. - Minuteman III ICBM Launch Control Facility November-1, 1.5 miles North of New Raymer & State Highway 14, New Raymer, Weld County, CO
7. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW ...
7. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW TO NORTH. - Minuteman III ICBM Launch Control Facility November-1, 1.5 miles North of New Raymer & State Highway 14, New Raymer, Weld County, CO
Mixed Feelings: East Asia’s Debate about China’s Economic Growth and Regional Integration
2003-12-01
to its large subscription and the weighted voting system. Instead of establishing an AMF, Japan and China took part in the multilateral Chiang Mai Initiative...and its damaging impact on trade. Therefore, it too has taken part in the Chiang Mai Initiative. Southeast Asia China remains a minor trade partner for...with the multilateral structure of the Chiang Mai Initiative to manage currency exchange rates than a Japan-dominated AMF. For this reason, they are
NASA Astrophysics Data System (ADS)
Voskresenskaya, Elena; Vorona-Slivinskaya, Lubov
2018-03-01
The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.
The United Nations and Climate Change: Legal and Policy Developments
NASA Astrophysics Data System (ADS)
Bunn, Isabella D.
2009-07-01
The Secretary-General of the United Nations, Ban Ki-moon, has declared that climate change is "the defining challenge of our times." Climate change trends indicate increasingly severe negative impacts on the majority of countries, with disproportionate effects on poor and vulnerable populations. The scientific reports of the Intergovernmental Panel on Climate Change (IPCC), as well as the negotiations under the UN Framework Convention on Climate Change (UNFCCC), have placed the issue on the forefront of the international agenda. This article examines how climate change is shaping legal and policy developments in five key areas of UN responsibility: international law, humanitarian affairs, human rights, development, and peace and security. It concludes with some observations about high-level efforts to coordinate the response of multilateral institutions, the changing stance of the US government, and the role of environmental protection in addressing the current global economic crisis.
Making Our Buildings Safer: Security Management and Equipment Issues.
ERIC Educational Resources Information Center
Clark, James H.
1997-01-01
Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…
Organization and Management of the International Space Station (ISS) Multilateral Medical Operations
NASA Technical Reports Server (NTRS)
Duncan, J. M.; Bogomolov, V. V.; Castrucci, F.; Koike, Y.; Comtois, J. M.; Sargsyan, A. E.
2007-01-01
The goal of this work is to review the principles, design, and function of the ISS multilateral medical authority and the medical support system of the ISS Program. Multilateral boards and panels provide operational framework, direct, and supervise the ISS joint medical operational activities. The Integrated Medical Group (IMG) provides front-line medical support of the crews. Results of ongoing activities are reviewed weekly by physician managers. A broader status review is conducted monthly to project the state of crew health and medical support for the following month. All boards, panels, and groups function effectively and without interruptions. Consensus prevails as the primary nature of decisions made by all ISS medical groups, including the ISS medical certification board. The sustained efforts of all partners have resulted in favorable medical outcomes of the initial fourteen long-duration expeditions. The medical support system appears to be mature and ready for further expansion of the roles of all Partners, and for the anticipated increase in the size of ISS crews.
NASA Astrophysics Data System (ADS)
Sihombing, P.; Siregar, Y. M.; Tarigan, J. T.; Jaya, I.; Turnip, A.
2018-03-01
Security system is one of the common problems to protect an environment such as personal house or a warehouse. There are numerous methods and technologies that can be used as part of a security system. In this paper, we present a security system that offers a better efficiency. The purpose of this study is to build a system that can monitor home security at any time in particular fire and theft. Through sensors, the system will be able to provide warning information of hazard conditions via LCD monitor, sound, and alarm. This information will be sent automatically to the home owner’s smartphone as well as to the corresponding to the security agency. Thus the prevention of theft and fire hazards can be immediately anticipated by the police and firefighters. The system will also notify the position of the coordinates of the location of the building (the house) by a link to the Google map in order to make it easier to get the location quickly.
A Proactive Approach to Building Security.
ERIC Educational Resources Information Center
Winters, Sharon
1994-01-01
Describes building security procedures developed at the Hampton Public Library (Virginia) to deal with problem patrons. Highlights include need for the library monitor program; staffing patterns; monitor selection criteria; training procedures; library behavior guidelines; library policy statements; theft detection systems; and sample job…
Building Security into Schools.
ERIC Educational Resources Information Center
Kosar, John E.; Ahmed, Faruq
2000-01-01
Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…
WEAPONS STORAGE AREA, LOOKING TOWARD ELECTRIC POWER STATION BUILDING (BUILDING ...
WEAPONS STORAGE AREA, LOOKING TOWARD ELECTRIC POWER STATION BUILDING (BUILDING 3583), STORAGE BUILDING (BUILDING 3584)NIGHT AND SECURITY POLICE ENTRY CONTROL (BUILDING 3582)LEFT. VIEW TO NORTHEAST - Plattsburgh Air Force Base, U.S. Route 9, Plattsburgh, Clinton County, NY
2017-03-24
effort 11. NADR - Counterterrorism Finance Assists partner nations to build and strengthen effective anti- money laundering and counterterrorism...Counsel. Briefing slide deck: “Authority and Money : Basics for Building Partner Capacity.” February 2016. (Current as of 2016 DOD Appropriations Act...Warfare Program Provide seed money to support international cooperative development of technological solutions that enable U.S. and friendly armed
18. SITE BUILDING 002 SCANNER BUILDING VIEW OF ...
18. SITE BUILDING 002 - SCANNER BUILDING - VIEW OF SITE SECURITY OFFICE ACCESS DOOR FROM EXTERIOR OF OFFICE. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
SAFETY AND SECURITY BUILDING, TRA614. ELEVATIONS. SECTIONS. TWO ROOF LEVELS. ...
SAFETY AND SECURITY BUILDING, TRA-614. ELEVATIONS. SECTIONS. TWO ROOF LEVELS. BLAW-KNOX 3150-814-2, 3/1950. INL INDEX NO. 531-0614-00-098-100703, REV. 6. - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
SAFETY AND SECURITY BUILDING, TRA614. SIMPLIFIED FLOOR LAYOUT AND WEST ...
SAFETY AND SECURITY BUILDING, TRA-614. SIMPLIFIED FLOOR LAYOUT AND WEST ELEVATION. BLAW-KNOX 3150-14-1, 1/1950. INL INDEX NO. 531-0614-00-098-100024, REV. 2. - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
Secure Utilization of Beacons and UAVs in Emergency Response Systems for Building Fire Hazard
Seo, Seung-Hyun; Choi, Jung-In; Song, Jinseok
2017-01-01
An intelligent emergency system for hazard monitoring and building evacuation is a very important application area in Internet of Things (IoT) technology. Through the use of smart sensors, such a system can provide more vital and reliable information to first-responders and also reduce the incidents of false alarms. Several smart monitoring and warning systems do already exist, though they exhibit key weaknesses such as a limited monitoring coverage and security, which have not yet been sufficiently addressed. In this paper, we propose a monitoring and emergency response method for buildings by utilizing beacons and Unmanned Aerial Vehicles (UAVs) on an IoT security platform. In order to demonstrate the practicability of our method, we also implement a proof of concept prototype, which we call the UAV-EMOR (UAV-assisted Emergency Monitoring and Response) system. Our UAV-EMOR system provides the following novel features: (1) secure communications between UAVs, smart sensors, the control server and a smartphone app for security managers; (2) enhanced coordination between smart sensors and indoor/outdoor UAVs to expand real-time monitoring coverage; and (3) beacon-aided rescue and building evacuation. PMID:28946659
Secure Utilization of Beacons and UAVs in Emergency Response Systems for Building Fire Hazard.
Seo, Seung-Hyun; Choi, Jung-In; Song, Jinseok
2017-09-25
An intelligent emergency system for hazard monitoring and building evacuation is a very important application area in Internet of Things (IoT) technology. Through the use of smart sensors, such a system can provide more vital and reliable information to first-responders and also reduce the incidents of false alarms. Several smart monitoring and warning systems do already exist, though they exhibit key weaknesses such as a limited monitoring coverage and security, which have not yet been sufficiently addressed. In this paper, we propose a monitoring and emergency response method for buildings by utilizing beacons and Unmanned Aerial Vehicles (UAVs) on an IoT security platform. In order to demonstrate the practicability of our method, we also implement a proof of concept prototype, which we call the UAV-EMOR (UAV-assisted Emergency Monitoring and Response) system. Our UAV-EMOR system provides the following novel features: (1) secure communications between UAVs, smart sensors, the control server and a smartphone app for security managers; (2) enhanced coordination between smart sensors and indoor/outdoor UAVs to expand real-time monitoring coverage; and (3) beacon-aided rescue and building evacuation.
Lessons from Burundi’s Security Sector Reform Process
2014-11-01
Defense University,Africa Center for Strategic Studies,300 Fifth Avenue, Building 20 Fort McNair,Washington ,DC,20319-5066 8. PERFORMING ORGANIZATION...Fifth Avenue, Building 20 Fort McNair Washington, D.C. 20319-5066 Phone: + 1 202-685-7300 Website: www.africacenter.org AfricA Security briefS Director...Official Complicity and Impunity (New York: Human Rights Watch, March 2010). 4 Louis- Alexandre Berg, “Security Governance and the Recurrence of
Cybersecurity and Optimization in Smart “Autonomous” Buildings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mylrea, Michael E.; Gourisetti, Sri Nikhil Gup
Significant resources have been invested in making buildings “smart” by digitizing, networking and automating key systems and operations. Smart autonomous buildings create new energy efficiency, economic and environmental opportunities. But as buildings become increasingly networked to the Internet, they can also become more vulnerable to various cyber threats. Automated and Internet-connected buildings systems, equipment, controls, and sensors can significantly increase cyber and physical vulnerabilities that threaten the confidentiality, integrity, and availability of critical systems in organizations. Securing smart autonomous buildings presents a national security and economic challenge to the nation. Ignoring this challenge threatens business continuity and the availability ofmore » critical infrastructures that are enabled by smart buildings. In this chapter, the authors address challenges and explore new opportunities in securing smart buildings that are enhanced by machine learning, cognitive sensing, artificial intelligence (AI) and smart-energy technologies. The chapter begins by identifying cyber-threats and challenges to smart autonomous buildings. Then it provides recommendations on how AI enabled solutions can help smart buildings and facilities better protect, detect and respond to cyber-physical threats and vulnerabilities. Next, the chapter will provide case studies that examine how combining AI with innovative smart-energy technologies can increase both cybersecurity and energy efficiency savings in buildings. The chapter will conclude by proposing recommendations for future cybersecurity and energy optimization research for examining AI enabled smart-energy technology.« less
GENERAL VIEW OF FLIGHT LINE BUILDINGS. FROM RIGHT TO LEFT, ...
GENERAL VIEW OF FLIGHT LINE BUILDINGS. FROM RIGHT TO LEFT, PETROLEUM OPERATIONS BUILDING (BUILDING, 2840), SECURITY POLICE CENTRAL CONTROL BUILDING (BUILDING 2841). MAINTENANCE DOCK (BUILDING 2837) AND MAINTENANCE DOCK (BUILDING 2890). VIEW TO NORTHWEST - Plattsburgh Air Force Base, U.S. Route 9, Plattsburgh, Clinton County, NY
Food Security—A Commentary: What Is It and Why Is It So Complicated?
Gibson, Mark
2012-01-01
Every year over 10 million people die of hunger and hunger related diseases. Nearly six million of these are children under the age of five; that is one child’s death approximately every six seconds. Understanding how this still occurs amid the ever increasing social enlightenment of the 21st century—and under the auspices of a vigilant global developmental community—is one of the key challenges of our time. The science of food security aims to address such concerns. By understanding the multiplicity of the phenomenon, practitioners of global multilateral hegemony seek to shape appropriate policy to address these issues. The difficulty however is that the phenomenon is increasingly wrapped up inside an ever growing bundle of societal aspirations including inter-alia under-nutrition, poverty, sustainability, free trade, national self sufficiency, reducing female subjugation and so on. Any solutions therefore, involve fully understanding just what is indeed included, implied, understood or excluded within the food security catchall. Indeed, until such time as consensus can be found that adequately binds the phenomenon within a fixed delineated concept, current efforts to address the multitude of often divergent threads only serves to dilute efforts and confound attempts to once-and-for-all bring these unacceptable figures under control. PMID:28239088
Building Afghanistan’s Security Forces in Wartime: The Soviet Experience
2011-01-01
weaponry (aircraft, rockets , and thou- sands of Shmel flamethrowers), and funds to pay fighters.16 The Soviets 13 Liakhovskii, 2009. 14 Timofeev...effort to build an effective state in Afghanistan was a failure, prospects for success in developing the security forces of that state were, in retro
There is presently much focus on Homeland Security and the need to understand how potential sources of toxic material are transported and dispersed in the urban environment. Material transport and dispersion within these urban centers is highly influenced by the buildings. Compu...
Checklist for the Safety and Security of Buildings and Grounds.
ERIC Educational Resources Information Center
Virginia State Dept. of Education, Richmond.
An evaluation checklist is provided for assessing a school's strengths and weaknesses relative to the safety and security of buildings and grounds, as well as assessing development and enforcement of policies, the presence of intervention and prevention plans, staff development, parent and community involvement, opportunities for student…
Guidelines for Network Security in the Learning Environment.
ERIC Educational Resources Information Center
Littman, Marlyn Kemper
1996-01-01
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Physical security controls for non-practitioners..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Security Requirements § 1301.73 Physical security... adequate security for the area or building. If such security requires an alarm, such alarm, upon...
78 FR 15797 - Service Delivery Plan
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0048] Service Delivery Plan AGENCY: Social... information, such as Social Security numbers or medical information. 1. Internet: We strongly recommend that... Regulations and Reports Clearance, Social Security Administration, 107 Altmeyer Building, 6401 Security...
1. VIEW, LOOKING NORTH, OF THE SOUTH ELEVATION OF BUILDING ...
1. VIEW, LOOKING NORTH, OF THE SOUTH ELEVATION OF BUILDING 901. BUILDING 901 IS ONE OF FOUR GUARD TOWERS INSTALLED AS PART OF THE PERIMETER SECURITY ZONE TO PROVIDE PROTECTIVE FORCE PERSONNEL WITH A CLEAR HIGH VIEW OF THE SURROUNDING AREAS. THE PERIMETER SECURITY ZONE CONSISTS OF A DOUBLE PERIMETER FENCE WITH CLOSED CIRCUIT TELEVISIONS, ALARMS, AND AN UNINTERRUPTED POWER SUPPLY. - Rocky Flats Plant, Guard Tower, Southeast corner of protected area, Golden, Jefferson County, CO
CDC Support for Global Public Health Emergency Management.
Brencic, Daniel J; Pinto, Meredith; Gill, Adrienne; Kinzer, Michael H; Hernandez, Luis; Pasi, Omer G
2017-12-01
Recent pandemics and rapidly spreading outbreaks of infectious diseases have illustrated the interconnectedness of the world and the importance of improving the international community's ability to effectively respond. The Centers for Disease Control and Prevention (CDC), building on a strong foundation of lessons learned through previous emergencies, international recognition, and human and technical expertise, has aspired to support nations around the world to strengthen their public health emergency management (PHEM) capacity. PHEM principles streamline coordination and collaboration in responding to infectious disease outbreaks, which align with the core capacities outlined in the International Health Regulations 2005. CDC supports PHEM by providing in-country technical assistance, aiding the development of plans and procedures, and providing fellowship opportunities for public health emergency managers. To this end, CDC partners with US agencies, international partners, and multilateral organizations to support nations around the world to reduce illness and death from outbreaks of infectious diseases.
NASA Technical Reports Server (NTRS)
Duncan, James M.; Bogomolov, V. V.; Castrucci, F.; Koike, Y.; Comtois, J. M.; Sargsyan, A. E.
2007-01-01
Long duration crews have inhabited the ISS since November of 2000. The favorable medical outcomes of its missions can be largely attributed to sustained collective efforts of all ISS Partners medical organizations. In-flight medical monitoring and support, although crucial, is just a component of the ISS system of Joint Medical Operations. The goal of this work is to review the principles, design, and function of the multilateral medical support of the ISS Program. The governing documents, which describe the relationships among all ISS partner medical organizations, were evaluated, followed by analysis of the roles, responsibilities, and decision-making processes of the ISS medical boards, panels, and working groups. The degree of integration of the medical support system was evaluated by reviewing the multiple levels of the status reviews and mission assurance activities carried out throughout the last six years. The Integrated Medical Group, consisting of physicians and other essential personnel in the mission control centers represents the front-line medical support of the ISS. Data from their day-to-day activities are presented weekly at the Space Medicine Operations Team (SMOT), where known or potential concerns are addressed by an international group of physicians. A broader status review is conducted monthly to project the state of crew health and medical support for the following month, and to determine measures to return to nominal state. Finally, a comprehensive readiness review is conducted during preparations for each ISS mission. The Multilateral Medical Policy Board (MMPB) issues medical policy decisions and oversees all health and medical matters. The Multilateral Space Medicine Board (MSMB) certifies crewmembers and visitors for training and space flight to the Station, and physicians to practice space medicine for the ISS. The Multilateral Medical Operations Panel (MMOP) develops medical requirements, defines and supervises implementation of operational countermeasures, environmental monitoring, medical care, and emergency medical services. MMOP assures the medical readiness of the Station for each subsequent mission or critical event. All boards and panels have functioned effectively and without interruptions even in various challenging circumstances. Based on the experience of the authors, consensus has prevailed as the primary nature of decisions made by all ISS medical groups, at all levels. The six first years of piloted operation have demonstrated the ability of the ISS medical authority groups and the medical infrastructure to implement medical policies and requirements, effectively interface with non-medical groups, and maintain the health and productivity of the crew in an integrated, multilaterally coordinated fashion. The medical support system appears to be mature and ready for further expansion of all Partners roles, and for the anticipated increase in the size of ISS crews.
SAFETY AND SECURITY BUILDING, TRA614. FLOOR, ROOF, AND FOUNDATION PLANS. ...
SAFETY AND SECURITY BUILDING, TRA-614. FLOOR, ROOF, AND FOUNDATION PLANS. ROOM FUNCTIONS. DOOR AND ROOM FINISH SCHEDULE. BLAW-KNOX 3150-814-1, 3/1950. INL INDEX NO. 531-0614-00-098-100702, REV. 6. - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
Trends in Public Library Buildings.
ERIC Educational Resources Information Center
Holt, Raymond M.
1987-01-01
Review of trends in public library buildings covers cycles in building activity; financial support; site selection; expansion, remodeling, or conversion of existing buildings; size of buildings; and such architectural concerns as flexible space, lighting, power, accommodation of computer systems, heat and ventilation, fire protection, security,…
24. CONTEXT VIEW OF BUILDING 220 (ENTRY CONTROL BUILDING) LOOKING ...
24. CONTEXT VIEW OF BUILDING 220 (ENTRY CONTROL BUILDING) LOOKING NORTH THROUGH SECURITY GATES. - Loring Air Force Base, Weapons Storage Area, Northeastern corner of base at northern end of Maine Road, Limestone, Aroostook County, ME
2013-12-01
device (IED) in a public park is more difficult than setting off an IED in a secured government building . Alternatively, constructing a pipe bomb is...against nuclear and power industry installations” intended to “seize nuclear materials and use them to build WMD for their own political use.” 5...reactor under construction .469 Damascus faces unresolved allegations that it illicitly tried to build a plutonium production reactor at a site
ADS-B and multilateration sensor fusion algorithm for air traffic control
NASA Astrophysics Data System (ADS)
Liang, Mengchen
Air traffic is expected to increase rapidly in the next decade. But, the current Air Traffic Control (ATC) system does not meet the demand of the future safety and efficiency. The Next Generation Air Transportation System (NextGen) is a transformation program for the ATC system in the United States. The latest estimates by Federal Aviation Administration (FAA) show that by 2018 NextGen will reduce total delays in flight by 35 percent and provide 23 billion dollars in cumulative benefits. A satellite-based technology called the Automatic Dependent Surveillance-Broadcast (ADS-B) system is one of the most important elements in NextGen. FAA expects that ADS-B systems will be available in the National Airspace System (NAS) by 2020. However, an alternative surveillance system is needed due to vulnerabilities that exist in ADS-B systems. Multilateration has a high accuracy performance and is believed to be an ideal back-up strategy for ADS-B systems. Thus, in this study, we develop the ADS-B and multilateration sensor fusion algorithm for aircraft tracking applications in ATC. The algorithm contains a fault detection function for ADS-B information monitoring by using Trajectory Change Points reports from ADS-B and numerical vectors from a hybrid estimation algorithm. We consider two types of faults in the ADS-B measurement model to show that the algorithm is able to deal with the bad data from ADS-B systems and automatically select good data from multilateration systems. We apply fuzzy logic concepts and generate time variant parameters during the fusion process. The parameters play a role of weights for combining data from different sensors. The algorithm performance is validated through two aircraft tracking examples.
2015-07-09
Page ii GAO-15-700 Diplomatic Security Figure 2: Time Frames for Updates to Overseas Security Policy Board Residential Security...Standards since 2005 14 Abbreviations ARB Accountability Review Board DS Bureau of Diplomatic Security DS/C DS Directorate...Overseas Buildings Operations OSPB Overseas Security Policy Board RSO Regional Security Officer State Department of State This is a work of
How Homeland Security Affects Spatial Information
ERIC Educational Resources Information Center
Zellmer, Linda
2004-01-01
A recent article in Security-Focus described the fact that several U.S. government buildings in Washington DC could no longer be clearly seen by people using MapQuest's aerial photo database. In addition, the photos of these buildings were altered at the Web sites wherein they are posted at the request of the U.S. Secret Service. This is an…
Ferdinand, Jason
The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience.
BUILDING 122 CONTAINS THREE GENERAL AREAS: OFFICE AREAS, INTERNAL DOSIMETRY, ...
BUILDING 122 CONTAINS THREE GENERAL AREAS: OFFICE AREAS, INTERNAL DOSIMETRY, AND MEDICAL/HEALTH. BUILDING 122 SHARES A COMMON WALL WITH BUILDING 121, THE PLANT SECURITY BUILDING. THE TWO-STORY BUILDING IN THE BACKGROUND IS BUILDING 111. (9/26/52) - Rocky Flats Plant, Emergency Medical Services Facility, Southwest corner of Central & Third Avenues, Golden, Jefferson County, CO
75 FR 43609 - Agency Information Collection Activities: Emergency Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Emergency Request The Social Security Administration (SSA) publishes a list of information collection packages requiring...) Social Security Administration, DCBFM, Attn: Reports Clearance Officer, 1340 Annex Building, 6401...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Staats, E.B.
1978-01-03
A report is presented in which GAO recommends that the secretaries of State and Energy present to the Congress by July 1, 1978, a plan for improving security of U.S. imported oil supplies at reasonable prices by U.S. policy initiatives directed toward changes in access terms, incentives for production in other than OPEC countries, and bilateral and multilateral approaches to OPEC and other nations. Ultimately, this country, as well as the rest of the world, will become independent of oil. This is necessarily true because oil is a finite commodity and will run out someday. Accordingly, national attention ought tomore » be directed to truly responsible concerns about how to achieve an orderly transition to an economy based upon alternative resources of energy. Today's policies must buy time and provide the petroleum supplies needed while other energy sources are developed and put in operation to replace them.« less
[Healthcare: a growing role in international politics].
Dixneuf, M; Rey, J L
2004-01-01
Since the end of the cold war the tone of international relations has clearly changed. Whereas relations were once defined strictly in terms of more or less armed confrontation, economic and social issues now play a growing role. Healthcare policies in Africa have long been influenced by the policies of countries sponsoring bilateral and even multilateral foreign aid programs. However the last ten years have witnessed an increasing interaction between international policy and healthcare policy. The two main reasons for this trend involve 1) access to drug treatment and the WTO and 2) the extension and impact of the AIDS epidemic. The problem of access to drug treatment for poor populations (fundamental right) has led to the emergence of an increasingly strong and effective civil society. Because of its social and economic effects as well as its geopolitical and security implications, AIDS has become a major factor in international relations. With regard to both these issues the place and role of the USA is demonstrative of the interaction between healthcare and international relations.
The Gravity of High-Skilled Migration Policies.
Czaika, Mathias; Parsons, Christopher R
2017-04-01
Combining unique, annual, bilateral data on labor flows of highly skilled immigrants for 10 OECD destinations between 2000 and 2012, with new databases comprising both unilateral and bilateral policy instruments, we present the first judicious cross-country assessment of policies aimed to attract and select high-skilled workers. Points-based systems are much more effective in attracting and selecting high-skilled migrants than requiring a job offer, labor market tests, and shortage lists. Offers of permanent residency, while attracting the highly skilled, overall reduce the human capital content of labor flows because they prove more attractive to non-high-skilled workers. Bilateral recognition of diploma and social security agreements foster greater flows of high-skilled workers and improve the skill selectivity of immigrant flows. Conversely, double taxation agreements deter high-skilled migrants, although they do not alter overall skill selectivity. Our results are robust to a variety of empirical specifications that account for destination-specific amenities, multilateral resistance to migration, and the endogeneity of immigration policies.
Analytical evaluation of ILM sensors, volume 1
NASA Technical Reports Server (NTRS)
Kirk, R. J.
1975-01-01
The functional requirements and operating environment constraints are defined for an independent landing monitor ILM which provides the flight crew with an independent assessment of the operation of the primary automatic landing system. The capabilities of radars, TV, forward looking infrared radiometers, multilateration, microwave radiometers, interferometers, and nuclear sensing concepts to meet the ILM conditions are analyzed. The most critical need for the ILM appears in the landing sequence from 1000 to 2000 meters from threshold through rollout. Of the sensing concepts analyzed, the following show potential of becoming feasible ILM's: redundant microwave landings systems, precision approach radar, airborne triangulation radar, multilateration with radar altimetry, and nuclear sensing.
Integrating International Engineering Organizations For Successful ISS Operations
NASA Technical Reports Server (NTRS)
Blome, Elizabeth; Duggan, Matt; Patten, L.; Pieterek, Hhtrud
2006-01-01
The International Space Station (ISS) is a multinational orbiting space laboratory that is built in cooperation with 16 nations. The design and sustaining engineering expertise is spread worldwide. As the number of Partners with orbiting elements on the ISS grows, the challenge NASA is facing as the ISS integrator is to ensure that engineering expertise and data are accessible in a timely fashion to ensure ongoing operations and mission success. Integrating international engineering teams requires definition and agreement on common processes and responsibilities, joint training and the emergence of a unique engineering team culture. ISS engineers face daunting logistical and political challenges regarding data sharing requirements. To assure systematic information sharing and anomaly resolution of integrated anomalies, the ISS Partners are developing multi-lateral engineering interface procedures. Data sharing and individual responsibility are key aspects of this plan. This paper describes several examples of successful multilateral anomaly resolution. These successes were used to form the framework of the Partner to Partner engineering interface procedures, and this paper describes those currently documented multilateral engineering processes. Furthermore, it addresses the challenges experienced to date, and the forward work expected in establishing a successful working relationship with Partners as their hardware is launched.
A Multilateral Negotiation Model for Cloud Service Market
NASA Astrophysics Data System (ADS)
Yoo, Dongjin; Sim, Kwang Mong
Trading cloud services between consumers and providers is a complicated issue of cloud computing. Since a consumer can negotiate with multiple providers to acquire the same service and each provider can receive many requests from multiple consumers, to facilitate the trading of cloud services among multiple consumers and providers, a multilateral negotiation model for cloud market is necessary. The contribution of this work is the proposal of a business model supporting a multilateral price negotiation for trading cloud services. The design of proposed systems for cloud service market includes considering a many-to-many negotiation protocol, and price determining factor from service level feature. Two negotiation strategies are implemented: 1) MDA (Market Driven Agent); and 2) adaptive concession making responding to changes of bargaining position are proposed for cloud service market. Empirical results shows that MDA achieved better performance in some cases that the adaptive concession making strategy, it is noted that unlike the MDA, the adaptive concession making strategy does not assume that an agent has information of the number of competitors (e.g., a consumer agent adopting the adaptive concession making strategy need not know the number of consumer agents competing for the same service).
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-14
... title V of the Riegle Community Development and Regulatory Improvement Act,\\2\\ the National Flood... renewing a loan secured by a building or a mobile home located in a special flood hazard area to advise the... transferring a loan secured by a building or a mobile home located in a special flood hazard area to notify...
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION TESTIMONY BY EMPLOYEES AND THE PRODUCTION OF RECORDS AND... Security Administration, 300 Altmeyer Building, 6401 Security Blvd., Baltimore, MD 21235-6401. ...
University building safety index measurement using risk and implementation matrix
NASA Astrophysics Data System (ADS)
Rahman, A.; Arumsari, F.; Maryani, A.
2018-04-01
Many high rise building constructed in several universities in Indonesia. The high-rise building management must provide the safety planning and proper safety equipment in each part of the building. Unfortunately, most of the university in Indonesia have not been applying safety policy yet and less awareness on treating safety facilities. Several fire accidents in university showed that some significant risk should be managed by the building management. This research developed a framework for measuring the high rise building safety index in university The framework is not only assessed the risk magnitude but also designed modular building safety checklist for measuring the safety implementation level. The safety checklist has been developed for 8 types of the university rooms, i.e.: office, classroom, 4 type of laboratories, canteen, and library. University building safety index determined using risk-implementation matrix by measuring the risk magnitude and assessing the safety implementation level. Building Safety Index measurement has been applied in 4 high rise buildings in ITS Campus. The building assessment showed that the rectorate building in secure condition and chemical department building in beware condition. While the library and administration center building was in less secure condition.
Building Community Resilience to Disasters: A Way Forward to Enhance National Health Security.
Chandra, Anita; Acosta, Joie; Howard, Stefanie; Uscher-Pines, Lori; Williams, Malcolm; Yeung, Douglas; Garnett, Jeffrey; Meredith, Lisa S
2011-01-01
Community resilience, or the sustained ability of a community to withstand and recover from adversity, has become a key policy issue at federal, state, and local levels, including in the National Health Security Strategy. Because resources are limited in the wake of an emergency, it is increasingly recognized that resilience is critical to a community's ability to reduce long recovery periods after an emergency. This article shares details of a report that provides a roadmap for federal, state, and local leaders who are developing plans to enhance community resilience for health security threats and describes options for building community resilience in key areas. Based on findings from a literature review and a series of community and regional focus groups, the authors provide a definition of community resilience in the context of national health security and a set of eight levers and five core components for building resilience. They then describe suggested activities that communities are pursuing and may want to strengthen for community resilience, and they identify challenges to implementation.
Protecting and securing networked medical devices.
Riha, Chris
2004-01-01
Designing, building, and maintaining a secure environment for medical devices is a critical component in health care technology management. This article will address several avenues to harden a health care information network to provide a secure enclave for medical devices.
77 FR 58903 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-24
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... . (SSA), Social Security Administration, DCRDP, Attn: Reports Clearance Director, 107 Altmeyer Building...
78 FR 22935 - Agency Information Collection Activities; Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-17
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities; Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... . (SSA) Social Security Administration, DCRDP, Attn: Reports Clearance Director, 107 Altmeyer Building...
77 FR 37728 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-22
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...), Social Security Administration, DCRDP, Attn: Reports Clearance Director, 107 Altmeyer Building, 6401...
27 CFR 19.271 - Construction of buildings
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Construction of buildings..., DEPARTMENT OF THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Construction, Equipment and Security § 19.271 Construction of buildings Buildings in which spirits, denatured spirits, articles, or wines are produced...
Increasing drought risk in large-dam basins of South Korea
NASA Astrophysics Data System (ADS)
Jung, I. W.; Shin, Y.; Park, J.; Kim, D.
2017-12-01
In 2015, South Korea suffered one of the worst droughts in recent years. Seoul and Gyeonggi and Gangwon provinces experienced severe drought conditions, receiving less than 43 percent of the annual precipitation average of the past 30 years. Additionally, the 2015 summer precipitation was less than half of the average. The lack of summer precipitation induced serious shortages in dam storages, which are important supplies for the dry season. K-water, a public company managing South Korea's public water supply system, is fighting to secure public water supply and minimize potential damage that may occur before the subsequent wet season. This study detected significant decreasing trends (95% confidence interval) in dry-seasonal runoff rates (=dam inflow / precipitation) in three dams basins (Soyang, Chungju, and Andong). Changes in potential evapotranspiration (PET) and precipitation indices were examined to investigate potential causes of decreasing runoff rates trends. However, there were no clear relations among changes in runoff rates, PET, and precipitation indices. Runoff rate reduction in the three dams may increase the risk of dam operational management and long-term water resource planning. Therefore, it will be necessary to perform a multilateral analysis to better understand decreasing runoff rates.AcknowledgementsThis research was supported by a grant(2017-MPSS31-001) from Supporting Technology Development Program for Disaster Management funded by Ministry of Public Safety and Security(MPSS) of the Korean government.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Authority for one-step turn-key design-build contracting for the United States Coast Guard (USCG). 3036.104-90 Section 3036.104-90 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SPECIAL CATEGORIES OF...
19. VIEW OF INTERIOR OF BUILDING 220 SECOND FLOOR, FROM ...
19. VIEW OF INTERIOR OF BUILDING 220 SECOND FLOOR, FROM THE FEMALE MEDIUM SECURITY AREA FACING THE FEMALE MEDIUM SECURITY SLEEPING AREA. THE FEMALE CELL BLOCK DOOR IN SHOWN ON THE RIGHT OF PHOTO. THE SLEEPING AREA IS IN THE CENTER OF PHOTO. - U.S. Naval Base, Pearl Harbor, Brig, Neville Way near Ninth Street at Marine Barracks, Pearl City, Honolulu County, HI
A&M. Radioactive parts security storage warehouses: TAN648 on left, and ...
A&M. Radioactive parts security storage warehouses: TAN-648 on left, and dolly storage building, TAN-647, on right. Camera facing south. This was the front entry for the warehouse and the rear of the dolly storage building. Date: August 6, 2003. INEEL negative no. HD-36-2-2 - Idaho National Engineering Laboratory, Test Area North, Scoville, Butte County, ID
ERIC Educational Resources Information Center
Bracy, Nicole L.
2009-01-01
Public schools have transformed significantly over the past several decades in response to broad concerns about rising school violence. Today's public schools are high security environments employing tactics commonly found in jails and prisons such as police officers, security cameras, identification systems, and secure building strategies.…
Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community
2012-01-13
unintrusive solutions that boost security. For example, gamers are even buying hardware tokens to protect their World of Warcraft accounts [5]. Build...security technology. http://www. vmware.com/technology/security/vmsafe.html. [4] VNC. http://en.wikipedia.org/wiki/VNC. [5] World of warcraft to sell
Building Assured Systems Framework
2010-09-01
of standards such as ISO 27001 as frameworks [NASCIO 2009]. In this context, a framework is a standard intended to assist in auditing and compliance...Information Security ISO /IEC 27004 Information technology – Security techniques - Information security management measurement ISO /IEC 15939, System and
Blue steps Blue steps Indoor Environment Department Advice for Safeguarding Buildings Against Chemical building operators. It contains our current advice for dealing with a biological or chemical release in a protecting buildings and occupants from chemical or biological attack. Click on the title bar, above, for
Protecting Buildings from People
ERIC Educational Resources Information Center
Progressive Architecture, 1978
1978-01-01
Security in buildings ranges from simple locks to elaborate electronic systems. Most buildings do not need the level of sophistication it is possible to achieve. A survey of these products, however, is appropriate to appreciate their potential and variety. (Author/MLF)
NASA Astrophysics Data System (ADS)
Pettit, Sandra L.
Designing and constructing safe, secure and cost-effective buildings has always been the goal of architects, engineers, developers and community officials. However, in light of recent tragic events, urban security design has become a major concern for both public and private building owners as the threat of terrorism attacks becomes more evident. Modern research and technology have provided a means to counter some of these threats, but there is little doubt that the need for physical security design will continue to increase as long as there are conflicting social, religious, and political agendas in the world. Parallel to this trend, the desire for aesthetically pleasing structures and architecture which pushes the envelope of typical building design make designing a secure, blast and fire resistant building a challenge, as many protective measures clash with the desires of architects. As a result, development of construction materials and technologies with respect to security is on the rise and there is a need for comprehensive solutions. Research into the behavior of stainless steel may prove it to be an elegant and efficient solution to a secure structural design which does not compromise a building's architecture. As a material that is often chosen for its aesthetic appeal, it also exhibits excellent ductility and high stress-strain rates, allowing it to absorb large amounts of energy from blasts before fracturing, compared to carbon steel. Stainless steel also exhibits superior fire-resisting qualities and can perform similarly to carbon steels without unsightly added fire protection. Using stainless steel for elements which have been identified as vulnerable to attack, such as a major column or transfer girder, or elements which can protect the rest of structure from a blast, such as a blast wall, can be an efficient component of a comprehensive urban security design. The challenges associated with the use of stainless steel, which has kept its use in structural design to a minimum, such as higher costs, availability, or special welding procedures, are minimal and will be easily overcome as the use of stainless steel in structure increases and designers and fabricators become more familiar with the material.
NASA Technical Reports Server (NTRS)
Britt, C. L., Jr.
1975-01-01
The development of an RF Multilateration system to provide accurate position and velocity measurements during the approach and landing phase of Vertical Takeoff Aircraft operation is discussed. The system uses an angle-modulated ranging signal to provide both range and range rate measurements between an aircraft transponder and multiple ground stations. Range and range rate measurements are converted to coordinate measurements and the coordinate and coordinate rate information is transmitted by an integral data link to the aircraft. Data processing techniques are analyzed to show advantages and disadvantages. Error analyses are provided to permit a comparison of the various techniques.
Accurate ocean bottom seismometer positioning method inspired by multilateration technique
Benazzouz, Omar; Pinheiro, Luis M.; Matias, Luis M. A.; Afilhado, Alexandra; Herold, Daniel; Haines, Seth S.
2018-01-01
The positioning of ocean bottom seismometers (OBS) is a key step in the processing flow of OBS data, especially in the case of self popup types of OBS instruments. The use of first arrivals from airgun shots, rather than relying on the acoustic transponders mounted in the OBS, is becoming a trend and generally leads to more accurate positioning due to the statistics from a large number of shots. In this paper, a linearization of the OBS positioning problem via the multilateration technique is discussed. The discussed linear solution solves jointly for the average water layer velocity and the OBS position using only shot locations and first arrival times as input data.
ERIC Educational Resources Information Center
Sturgeon, Julie
2002-01-01
Explains why campus security officials consider locker rooms and restrooms the bane of their jobs, and offers a formula for protecting property and privacy at the same time: first secure the entire building, then zero in on specifics. Describes various security options for these campus areas. (EV)
The Security Factor in School Renovations.
ERIC Educational Resources Information Center
Fickes, Michael
1998-01-01
Discusses how one Indiana high school used its renovation as an opportunity to reevaluate the school's security design. Security considerations in the building's external and internal environment include lighting, directional signage, parking, access control technology, and issues regarding the use of closed circuit television. (GR)
1. VIEW, LOOKING SOUTH, OF THE NORTH ELEVATION OF BUILDING ...
1. VIEW, LOOKING SOUTH, OF THE NORTH ELEVATION OF BUILDING 888. BUILDING 888 IS ONE OF SEVEN GUARDHOUSES USED TO CONTROL ACCESS TO DESIGNATED SECURITY AREAS WITHIN THE INDUSTRIAL AREA. - Rocky Flats Plant, Guardhouse, Northwest of Building 886, south of Central Avenue, Golden, Jefferson County, CO
Ontology for Life-Cycle Modeling of Electrical Distribution Systems: Model View Definition
2013-06-01
building information models ( BIM ) at the coordinated design stage of building construction. 1.3 Approach To...standard for exchanging Building Information Modeling ( BIM ) data, which defines hundreds of classes for common use in software, currently supported by...specifications, Construction Operations Building in- formation exchange (COBie), Building Information Modeling ( BIM ) 16. SECURITY CLASSIFICATION OF:
2009-11-01
Amb G (Ambassador-Italy)10. Mrs. G (ISAF Political Advisor)11. Amb K (Amb-Japan)12. Mr. K (ISAF PolAd)13. Mrs. M (Chargé-Netherlands)14. Mr. M ...DCM-Japan)15. BG M (Senior Military Advisor-Finland)16. Amb N (Amb-UK)17. Mr. S (DCM-Germany)18. Lt Col S (MilAd-GE)19. Amb T (Donor Asst-U.S...Building, Year One: From Bonn to Kabul.” Antonio Donini , Norah Niland, and Karin Wermester, eds., Nation Building Unraveled, pp. 39-60. Bloomfield, CT
NASA Astrophysics Data System (ADS)
Major, Maciej; Kosiń, Mariusz
2017-12-01
The paper analyses the effect of steel framing used to secure drywall panels on thermal and humidity properties of outer walls. In the practice of building a light structure, the most popular components are steel and wood studs. They are used to obtain framing for building a wall (an outer wall in this study). Analysis presented in this study concerned the corner of the outer wall build using the technology of light steel framing. Computer simulation was used to perform thermal and humidity analysis for the joint of the outer wall.
8. DETAIL OF FOLDING DOORS ON NORTH ELEVATION OF BUILDING ...
8. DETAIL OF FOLDING DOORS ON NORTH ELEVATION OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL BUILDING). - Loring Air Force Base, Alert Area, Southeastern portion of base, east of southern end of runway, Limestone, Aroostook County, ME
Nuttall, I; Miyagishima, K; Roth, C; de La Rocque, S
2014-08-01
The One Health approach encompasses multiple themes and can be understood from many different perspectives. This paper expresses the viewpoint of those in charge of responding to public health events of international concern and, in particular, to outbreaks of zoonotic disease. Several international organisations are involved in responding to such outbreaks, including the United Nations (UN) and its technical agencies; principally, the Food and Agriculture Organization of the UN (FAO) and the World Health Organization (WHO); UN funds and programmes, such as the United Nations Development Programme, the World Food Programme, the United Nations Environment Programme, the United Nations Children's Fund; the UN-linked multilateral banking system (the World Bank and regional development banks); and partner organisations, such as the World Organisation for Animal Health (OIE). All of these organisations have benefited from the experiences gained during zoonotic disease outbreaks over the last decade, developing common approaches and mechanisms to foster good governance, promote policies that cut across different sectors, target investment more effectively and strengthen global and national capacities for dealing with emerging crises. Coordination among the various UN agencies and creating partnerships with related organisations have helped to improve disease surveillance in all countries, enabling more efficient detection of disease outbreaks and a faster response, greater transparency and stakeholder engagement and improved public health. The need to build more robust national public human and animal health systems, which are based on good governance and comply with the International Health Regulations (2005) and the international standards set by the OIE, prompted FAO, WHO and the OIE to join forces with the World Bank, to provide practical tools to help countries manage their zoonotic disease risks and develop adequate resources to prevent and control disease outbreaks, particularly at the animal source. All these efforts contribute to the One Health agenda.
Döös, Marianne; Vinell, Helene; von Knorring, Mia
2017-12-01
To explore nurse manager experiences of working in leadership constellations where more than two managers share leadership, and to compare this multilateral sharing form to what is known about experiences of working in joint leadership in pairs. A qualitative design based on semi-structured interviews with nurse managers in two multilaterally shared leadership constellations at two intensive care units at an emergency hospital in Sweden. Data were analysed using a thematic and comparative approach. The comparative analysis identified four aspects that differ decisively from the positive picture in the literature on joint pair leadership: the perception of mandate with reduced decision-making power and reduced access to forums, the way of working with a strict division of tasks and a rotating schedule, a need to cope with the increasing number of internal relations and a feeling of doubt concerning trust. Shared leadership between nurse managers has gone from being a tight collaboration based on a feeling of "two-getherness", to being an organisational solution multilateral in character. In this transformation, a weakening of leadership qualities has occurred. Further research is necessary on how this new organisational solution impacts the nurse managers, their staff and the care provided in healthcare organisations generally. Copyright © 2017 Elsevier Ltd. All rights reserved.
Report #12-P-0879, September 26, 2012. The security posture and in-place environmental control review of the computer rooms in the Ariel Rios and Potomac Yard buildings revealed numerous security and environmental control deficiencies.
Integrated homeland security system with passive thermal imaging and advanced video analytics
NASA Astrophysics Data System (ADS)
Francisco, Glen; Tillman, Jennifer; Hanna, Keith; Heubusch, Jeff; Ayers, Robert
2007-04-01
A complete detection, management, and control security system is absolutely essential to preempting criminal and terrorist assaults on key assets and critical infrastructure. According to Tom Ridge, former Secretary of the US Department of Homeland Security, "Voluntary efforts alone are not sufficient to provide the level of assurance Americans deserve and they must take steps to improve security." Further, it is expected that Congress will mandate private sector investment of over $20 billion in infrastructure protection between 2007 and 2015, which is incremental to funds currently being allocated to key sites by the department of Homeland Security. Nearly 500,000 individual sites have been identified by the US Department of Homeland Security as critical infrastructure sites that would suffer severe and extensive damage if a security breach should occur. In fact, one major breach in any of 7,000 critical infrastructure facilities threatens more than 10,000 people. And one major breach in any of 123 facilities-identified as "most critical" among the 500,000-threatens more than 1,000,000 people. Current visible, nightvision or near infrared imaging technology alone has limited foul-weather viewing capability, poor nighttime performance, and limited nighttime range. And many systems today yield excessive false alarms, are managed by fatigued operators, are unable to manage the voluminous data captured, or lack the ability to pinpoint where an intrusion occurred. In our 2006 paper, "Critical Infrastructure Security Confidence Through Automated Thermal Imaging", we showed how a highly effective security solution can be developed by integrating what are now available "next-generation technologies" which include: Thermal imaging for the highly effective detection of intruders in the dark of night and in challenging weather conditions at the sensor imaging level - we refer to this as the passive thermal sensor level detection building block Automated software detection for creating initial alerts - we refer to this as software level detection, the next level building block Immersive 3D visual assessment for situational awareness and to manage the reaction process - we refer to this as automated intelligent situational awareness, a third building block Wide area command and control capabilities to allow control from a remote location - we refer to this as the management and process control building block integrating together the lower level building elements. In addition, this paper describes three live installations of complete, total systems that incorporate visible and thermal cameras as well as advanced video analytics. Discussion of both system elements and design is extensive.
A demonstration of a low cost approach to security at shipping facilities and ports
NASA Astrophysics Data System (ADS)
Huck, Robert C.; Al Akkoumi, Mouhammad K.; Herath, Ruchira W.; Sluss, James J., Jr.; Radhakrishnan, Sridhar; Landers, Thomas L.
2010-04-01
Government funding for the security at shipping facilities and ports is limited so there is a need for low cost scalable security systems. With over 20 million sea, truck, and rail containers entering the United States every year, these facilities pose a large risk to security. Securing these facilities and monitoring the variety of traffic that enter and leave is a major task. To accomplish this, the authors have developed and fielded a low cost fully distributed building block approach to port security at the inland Port of Catoosa in Oklahoma. Based on prior work accomplished in the design and fielding of an intelligent transportation system in the United States, functional building blocks, (e.g. Network, Camera, Sensor, Display, and Operator Console blocks) can be assembled, mixed and matched, and scaled to provide a comprehensive security system. The following functions are demonstrated and scaled through analysis and demonstration: Barge tracking, credential checking, container inventory, vehicle tracking, and situational awareness. The concept behind this research is "any operator on any console can control any device at any time."
Kang, Jungho; Kim, Mansik; Park, Jong Hyuk
2016-01-01
With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms. PMID:27399699
Kang, Jungho; Kim, Mansik; Park, Jong Hyuk
2016-07-05
With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms.
1. VIEW, LOOKING SOUTH, OF THE NORTH ELEVATION OF BUILDING ...
1. VIEW, LOOKING SOUTH, OF THE NORTH ELEVATION OF BUILDING 792A. BUILDING 792A, AT PORTAL 3, IS ONE OF THREE PEDESTRIAN ACCESS POINTS THROUGH THE PERIMETER SECURITY ZONE INTO THE PROTECTED AREA. - Rocky Flats Plant, Access Control Building, North of building 771, in parking area 71, just south of North Perimeter Road, Golden, Jefferson County, CO
A Healthy Approach to Fitness Center Security.
ERIC Educational Resources Information Center
Sturgeon, Julie
2000-01-01
Examines techniques for keeping college fitness centers secure while maintaining an inviting atmosphere. Building access control, preventing locker room theft, and suppressing causes for physical violence are discussed. (GR)
Technology's Role in Security.
ERIC Educational Resources Information Center
Day, C. William
1999-01-01
Examines the use of technology to bolster the school security system, tips on selecting a security consultant, and several basic strategies to make buildings and grounds safer. Technological ideas discussed include the use of telephones in classrooms to expedite care in emergency situations, surveillance cameras to reduce crime, and metal…
Resources for International Users
EPA provides technical assistance to its partner countries and to multilateral organizations through training courses, technology transfer, sharing of environmental data and information, and environmental education initiatives.
Harnessing Post-Conflict Transitions: A Conceptual Primer
2010-09-01
aid community uses transition as a key indi- cator of success for development and aid programs (Cliffe et al., 2003; Crane et al., 2009; Crichton ...3, pp. 345-365. Barnett, M ., (2006), “Building a republican peace: Stabilizing states after war,” International Security, Vol. 30, No. 4, pp. 87-112...Security, Vol. 29, No. 4, pp. 157-195. Berdal, M . R., (2009), Building Peace After War, Abingdon, UK; New York; London, UK: Routledge: International
Securing Volunteers to Fix up the School. Research Brief
ERIC Educational Resources Information Center
Johnston, Howard
2011-01-01
How can schools secure volunteers to help fix up the building and grounds? There isn't much research on how to secure volunteers to participate in school clean-ups and fix-ups, but some key ideas can be found in anecdotal examples from many communities around the nation. The first recommendation is that securing volunteers is easier when the…
Falk, Armin; Szech, Nora
2013-05-10
The possibility that market interaction may erode moral values is a long-standing, but controversial, hypothesis in the social sciences, ethics, and philosophy. To date, empirical evidence on decay of moral values through market interaction has been scarce. We present controlled experimental evidence on how market interaction changes how human subjects value harm and damage done to third parties. In the experiment, subjects decide between either saving the life of a mouse or receiving money. We compare individual decisions to those made in a bilateral and a multilateral market. In both markets, the willingness to kill the mouse is substantially higher than in individual decisions. Furthermore, in the multilateral market, prices for life deteriorate tremendously. In contrast, for morally neutral consumption choices, differences between institutions are small.
Superstorm Sandy: Implications For Designing A PostCyber Attack Power Restoration System
2016-03-31
for such progress. Phillip Allison, “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems: Building Security into Your Industrial...TechSvcs/Multi-stateFleetResponseWorkshopReport-02-21-13.pdf. Allison, Phillip. “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems
New Technology's Surprising Security Threats. Building Digital Libraries
ERIC Educational Resources Information Center
Huwe, Terence
2005-01-01
In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…
The Building Blocks of School Security.
ERIC Educational Resources Information Center
Funck, Gary
1999-01-01
Few schools command the funding to shift from zero security to updated closed-circuit TV systems. Cost-effective school security identification cards, which provide a rapid means of identifying those belonging on campus, can be integrated with administrative systems to track attendance, age, subject studied, and other vital statistics. (MLH)
2010-03-17
the sole "superpower" and once again changed the international security paradigm. Finally, on September 11, 2001, a terrorist attack on the U.S. by...be employed in the near term in order to improve operations in today’s security environment. Cooperative security is intended to change how militruy...default. However, the changing world security environment has dictated that the U.S. avoids any actions that could be perceived as heavy-handed
Building a Practical Framework for Enterprise-Wide Security Management
2004-04-28
management. They have found that current efforts to manage security vulnerabilities and security risks only take an enterprise so far, with results...analyzed reports to determine the cause of the increase. Slide 5 © 2004 by Carnegie Mellon University Version 1.0 Secure IT 2004 - page 5 Attack...Nearly 1 in 5 of those surveyed reported that none of their IT staff have any formal security training. [A survey of 896 Computing Technology
Hyett, Nerida; Kenny, Amanda; Dickson-Swift, Virginia
2017-10-01
There is increasing opportunity and support for occupational therapists to expand their scope of practice in community settings. However, evidence is needed to increase occupational therapists' knowledge, confidence, and capacity with building community participation and adopting community-centered practice roles. The purpose of this study is to improve occupational therapists' understanding of an approach to building community participation, through case study of a network of Canadian food security programs. Qualitative case study was utilized. Data were semistructured interviews, field observations, documents, and online social media. Thematic analysis was used to identify and describe four themes that relate to processes used to build community participation. The four themes were use of multiple methods, good leaders are fundamental, growing participation via social media, and leveraging outcomes. Occupational therapists can utilize an approach for building community participation that incorporates resource mobilization. Challenges of sustainability and social exclusion must be addressed.
A Trusted Portable Computing Device
NASA Astrophysics Data System (ADS)
Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang
A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.
About NCI Center for Global Health
Provides assistance and guidance to nations as they develop and implement cancer control plans, trains international investigators, and strengthens U.S. national, regional, multilateral, and bilateral collaboration.
VIEW LOOKING SOUTHEAST AT BUILDING 121. THE BUILDING HOUSES OFFICES, ...
VIEW LOOKING SOUTHEAST AT BUILDING 121. THE BUILDING HOUSES OFFICES, THE ROCKY FLATS PLANT CENTRAL ALARM STATION, ALARM CONSOLES, THE ARMORY, THE LOCK AND KEY SECTION, A COMPUTER ROOM, A UTILITY ROOM, AND LOCKER ROOMS WITH SHOWERS. (1/98) - Rocky Flats Plant, Security & Armory, West of Third Street, south of Central Avenue, Golden, Jefferson County, CO
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rubinstein, Francis M.
Specific recommendations are made to improve the lighting quality and energy efficiency of the lighting system at the Social Security Administration Frank Hagel Building in Richmond, CA. The main recommendation is to replace the recessed fluorescent lighting system in the general office area with indirect lighting. Indirect lighting will improve lighting quality, will provide an energy efficient solution and will be about the same cost as the direct lighting system originally proposed.
The Role of Schools and their Capabilities to Ensure Safe Sheltering During a Storm
2017-03-01
and security aspects include establishing a safe environment in a confined space. While absent from Florida’s 2016 Statewide Emergency Shelter Plan...offer a safe environment for sheltering, and new building codes have been created for this purpose. The northern school districts in Texas sit in...Special Feature 2: Building a Safe and Secure Educational Environment ,” accessed January 15, 2017, http://www.mext.go.jp/b_menu/hakusho/html/hpab201201
The role of multilateral institutions.
Kiss, Agi; Castro, Gonzalo; Newcombe, Kenneth
2002-08-15
In line with its mission of alleviating poverty through support for environmentally and socially sustainable economic development, The World Bank (along with some other multilateral development banks) is working to help developing countries capture a share of the emerging global market in greenhouse-gas-emissions reductions ('carbon trading'). Under the Kyoto Protocol of the United Nations Framework Convention on Climate Change (UNFCCC), the Joint Implementation instrument and the Clean Development Mechanism now provide an opening for substantial international resource transfers and potential for supporting sustainable development through the transfer of cleaner technologies or sustainable forestry and agro-forestry practices. For example, carbon sequestration represents a non-extractive non-consumptive sustainable use of living natural resources that can be incorporated within a multiple-use 'integrated ecosystem management' approach. The World Bank initiated the Prototype Carbon Fund (PCF) in April 2000, to help spur the development of a global carbon market and to 'learn by doing' how to use carbon-purchase transactions across a range of energy-sector technologies (and some forestry applications) to achieve environmentally credible and cost-effective emissions reductions that benefit developing countries and economies in transition. Building on the success of the PCF ($145 million raised from public and private-sector investors), The World Bank expects to launch two new funds in 2002: the Biocarbon Fund and the Community Development Carbon Fund. These funds will target synergies between carbon markets and objectives such as biodiversity conservation, combating desertification and small-scale community-driven development. Experience from the PCF shows that developing countries can have a comparative advantage in supplying this global market, as emissions reductions can be achieved in developing countries in the range of $3-$5 per ton of CO(2) equivalent, compared with a marginal abatement cost of $10-$15 per ton of CO(2) equivalent in most countries within the Organization for Economic Cooperation and Development. However, realizing this economic potential over the next decade, and targeting the market to the rural poor, will require substantial assistance with project development and government legal and institutional capacity building. Specific needs include raising awareness of the potential of carbon markets at all levels (particularly in energy and land-use sectors), clarifying property rights, particularly in the case of communally held land and resources, ensuring the existence of an attractive investment climate, eliminating policies that create perverse incentives and constraints, and mitigating logistical, political and 'reputational' risks that could deter private-sector investors. It will also be necessary to find ways to reconcile the short-term needs of the rural poor and the typically long-term revenue stream associated with carbon sequestration.
Minamata Convention on Mercury
On November 6, 2013 the United States signed the Minamata Convention on Mercury, a new multilateral environmental agreement that addresses specific human activities which are contributing to widespread mercury pollution
Code of Federal Regulations, 2011 CFR
2011-01-01
..., laboratory, office building or other area utilized by the DOE or its contractors or subcontractors for the..., previously referred to as a “security inspector.” Special response team member. A security police officer who...
Code of Federal Regulations, 2012 CFR
2012-01-01
..., laboratory, office building or other area utilized by the DOE or its contractors or subcontractors for the..., previously referred to as a “security inspector.” Special response team member. A security police officer who...
Code of Federal Regulations, 2013 CFR
2013-01-01
..., laboratory, office building or other area utilized by the DOE or its contractors or subcontractors for the..., previously referred to as a “security inspector.” Special response team member. A security police officer who...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gildersleeve, C.W.
An interdisciplinary analysis of the post-Cold War world to determine the optimal strategy to attain the national interests of the United States, and the requisite logistic structure to support that strategy. The optimal solution is found to be a strategy based on multinational defense centered on a permanent force of United Nations garrison port complexes. This multilateral force would be augmented by as small a national defense force as necessary to ensure national security. The theses endeavors to reconnect the cultural and philosophical past of the United States with its immediate future. National interests are identified through examination of Americanmore » Pragmatism and the philosophies of John Locke and Jean-Jacques Rousseau. To determine the current status of common defense, based upon the Foreign Military Sales system, and analysis of current data is accomplished. Future threats to the United States are examined with special emphasis on nuclear terrorism. The ability of Islamic nations in North Africa and the Middle East to produce significant quantities of uranium is demonstrated. The grave political as well as ongoing environmental consequences of this recent capability are discussed in detail.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shaffer, J.; Ederington, B.
The new security environment has a number of distinguishing characteristics. The formerly dominant bipolar power structure now exists only artificially, in the nuclear balance. By every measure of usable power, economic and political as well as military, the world is at a thoroughly multilateral stage, albeit with a single and unquestioned lead actor: the United States. But more and more states in the developing world have the ability to challenge U.S. and allied military forces, a fact demonstrated repeated by Saddam Hussein's Iraq. From an intense focus on a single global threat, Western defense planning has moved to the moremore » complex and varied task of analyzing and preparing for regional crises and wars involving a kaleidoscopic variety of potential aggressors and victims. In part it has done so because such operations may be more likely today than during the cold war, when the risk of escalation to superpower war lurked in all regional conflicts. This shift demands, among other things, forces that are more flexible and agile than those deployed during the cold war. It also requires better intelligence on the developing world, where most immediate military missions lie.« less
New Horizons and New Strategies in Arms Control
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brown, J. editor
In the last ten years, since the break-up of the Soviet Union, remarkable progress in arms control and disarmament has occurred. The Nuclear Non-Proliferation Treaty (NPT), the completion of the Comprehensive Test Ban Treaty (CTBT), and the Chemical Weapons Treaty (CWC) are indicative of the great strides made in the non- proliferation arena. Simultaneously, the Intermediate Nuclear Forces Treaty (INF), the Conventional Forces Treaty in Europe (CFE), and the Strategic Arms Reduction Treaties (START), all associated with US-Soviet Union (now Russia) relations have assisted in redefining European relations and the security landscape. Finally, it now appears that progress is inmore » the offing in developing enhanced compliance measures for the Biological and Toxin Weapons Convention (BTWC). In sum, all of these achievements have set the stage for the next round of arms control activities, which may lead to a much broader, and perhaps more diffused multilateral agenda. In this new and somewhat unpredictable international setting, arms control and disarmament issues will require solutions that are both more creative and innovative than heretofore.« less
Malware Mimics for Network Security Assessment
2011-03-01
Master’s Thesis 4 . TITLE AND SUBTITLE Malware Mimics for Network Security Assessment 6. AUTHOR(S) Taff, William R and Salevski, Paul M. 5...Communication Protocol .......................41 viii 4 . Graphical User Interface for MM-Server .......43 C. BUILDING THE TEST PLATFORM...Extension ...............71 2. More Advanced Modules ........................72 3. Increase Scale of Test Bed ...................73 4 . Security
Building Partner Capacity and Strengthening Security Through Medical Security Force Assistance
2013-06-01
Combatants,” The American Journal of Bioethics 8, no.2 (2008): 13–14. 71 emergencies will decrease the requirement for U.S. forces to engage in...Just Healthcare for Combatants.” The American Journal of Bioethics 8. no.2. 2008: 13–14. Joint Center for International Security Force Assistance
Building Multilevel Secure Web Services-Based Components for the Global Information Grid
2006-05-01
unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Transforming: Business , Security ,Warfighting 16 CROSSTALK The Journal of Defense...A Single Step of the BAC Table 1: A Single Step of the Block Access Controller Transforming: Business , Security ,Warfighting 18 CROSSTALK The Journal
Biomedical devices and systems security.
Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup
2011-01-01
Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.
North Base hangars as seen from the edge of Rogers ...
North Base hangars as seen from the edge of Rogers Dry Lake, looking north northwest (338°). The security fence surrounding the hangars and aircraft apron appears in the foreground. From left to right appear Building 4305 (Unicon Portable Hangar), Building 4401 (Hangar No. 1), Building 4400 (warehouse), Building 4402 (Hangar No. 2) and Building 4505. - Edwards Air Force Base, North Base, North Base Road, Boron, Kern County, CA
2013-06-01
Building in- formation exchange (COBie), Building Information Modeling ( BIM ) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...to develop a life-cycle building model have resulted in the definition of a “core” building information model that contains general information de...develop an information -exchange Model View Definition (MVD) for building electrical systems. The objective of the current work was to document the
The DISAM Journal of International Security Assistance Management. Volume 3, Number 4
2010-03-01
enough to help create jobs and build up the UAE industry . Still, for the near term, the United States stands to benefi t from several major projects ... PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defense Institute of Security Assistance...it was amazing to see what industry brought to the table as far as platforms and capabilities. Industry has made it clear that they can build the
6. Interior, rear offices: operations assistant office looking north toward ...
6. Interior, rear offices: operations assistant office looking north toward security operations officer's office. - Ellsworth Air Force Base, Rushmore Air Force Station, Security Central Control Building, Quesada Drive, Blackhawk, Meade County, SD
18. Photocopy of architectural drawing, September 1942 (original on file ...
18. Photocopy of architectural drawing, September 1942 (original on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). OPERATIONS BUILDING 'A', ARLINGTON HALL STATION. OFFICE BUILDING -- FOUNDATION PLAN -- HEATING. DRAWING M-24-161-24. - Arlington Hall Station, Building No. 401, 4000 Arlington Boulevard, Arlington, Arlington County, VA
77 FR 59900 - North Pacific Fishery Management Council (NPFMC); Public Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-01
... Building at 700 West 9th Street, Juneau, AK. Council address: North Pacific Fishery Management Council, 605... Building in Juneau. Foreign nationals wishing to attend this meeting in person should contact the Council as soon as possible to expedite security clearance at the Federal Building in Juneau. Additional...
Code of Federal Regulations, 2012 CFR
2012-07-01
... political subdivision of a State that has zoning and building code jurisdiction over a particular area having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that... of Veterans Affairs. (c) Building means a walled and roofed structure, other than a gas or liquid...
Code of Federal Regulations, 2011 CFR
2011-07-01
... political subdivision of a State that has zoning and building code jurisdiction over a particular area having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that... of Veterans Affairs. (c) Building means a walled and roofed structure, other than a gas or liquid...
Code of Federal Regulations, 2014 CFR
2014-07-01
... political subdivision of a State that has zoning and building code jurisdiction over a particular area having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that... of Veterans Affairs. (c) Building means a walled and roofed structure, other than a gas or liquid...
Code of Federal Regulations, 2013 CFR
2013-07-01
... political subdivision of a State that has zoning and building code jurisdiction over a particular area having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that... of Veterans Affairs. (c) Building means a walled and roofed structure, other than a gas or liquid...
Code of Federal Regulations, 2014 CFR
2014-01-01
... zoning and building code jurisdiction over a particular area having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that is located or to be located in a special...) Building means a walled and roofed structure, other than a gas or liquid storage tank, that is principally...
Research and development targeted at identifying and mitigating Internet security threats require current network data. To fulfill this need... researchers working for the Center for Applied Internet Data Analysis (CAIDA), a program at the San Diego Supercomputer Center (SDSC) which is based at the...vetted network and security researchers using the PREDICT/IMPACT portal and legal framework. We have also contributed to community building efforts that
Assessing Grant Allocation Methods for Federal Homeland Security Urban Area Assistance Funding
2015-12-01
ALLOCATION METHODS FOR FEDERAL HOMELAND SECURITY URBAN AREA ASSISTANCE FUNDING by Craig Mohar December 2015 Thesis Co-Advisors: Kathleen...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE ASSESSING GRANT ALLOCATION METHODS FOR FEDERAL HOMELAND SECURITY URBAN AREA...the Department of Homeland Security (DHS) is critical for building and sustaining preparedness in urban areas. According to the 9/11 Commission Report
Modeling Security Bridge Certificate Authority Architecture
NASA Astrophysics Data System (ADS)
Ren, Yizhi; Li, Mingchu; Sakurai, Kouichi
Current Public Key Infrastructures suffer from a scaling problem, and some may have security problems, even given the topological simplification of bridge certification authorities. This paper analyzes the security problems in Bridge Certificate Authorities (BCA) model by using the concept of “impersonation risk, ” and proposes a new modified BCA model, which enhances its security, but is a bit more complex incertification path building and implementation than the existing one.
Secure Multiparty Quantum Computation for Summation and Multiplication.
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-21
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.
Secure Multiparty Quantum Computation for Summation and Multiplication
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-01
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197
Canada's global health role: supporting equity and global citizenship as a middle power.
Nixon, Stephanie A; Lee, Kelley; Bhutta, Zulfiqar A; Blanchard, James; Haddad, Slim; Hoffman, Steven J; Tugwell, Peter
2018-04-28
Canada's history of nation building, combined with its status as a so-called middle power in international affairs, has been translated into an approach to global health that is focused on equity and global citizenship. Canada has often aspired to be a socially progressive force abroad, using alliance building and collective action to exert influence beyond that expected from a country with moderate financial and military resources. Conversely, when Canada has primarily used economic self-interest to define its global role, the country's perceived leadership in global health has diminished. Current Prime Minister Justin Trudeau's Liberal federal government has signalled a return to progressive values, driven by appreciation for diversity, equality, and Canada's responsibility to be a good global citizen. However, poor coordination of efforts, limited funding, and the unaddressed legacy of Canada's colonisation of Indigenous peoples weaken the potential for Canadians to make meaningful contributions to improvement of global health equity. Amid increased nationalism and uncertainty towards multilateral commitments by some major powers in the world, the Canadian federal government has a clear opportunity to convert its commitments to equity and global citizenship into stronger leadership on the global stage. Such leadership will require the translation of aspirational messages about health equity and inclusion into concrete action at home and internationally. Copyright © 2018 Elsevier Ltd. All rights reserved.
Knowledge Transfer Project: Cultivating Smart Energy Solutions through Dynamic Peer-to-Peer Learning
DOE Office of Scientific and Technical Information (OSTI.GOV)
As energy policy makers and professionals convene in the Oresund region for the 9th Annual Clean Energy Ministerial (CEM9), the global community is as united as ever around the common goal of accelerating the transition to global clean energy. Through sustained collective effort and thought leadership, CEM partners and stakeholders are systematically addressing the barriers to the widescale deployment of clean energy technologies. Pivotal to their progress is the efficient sharing and dissemination of knowledge. To address that need, the CEM-initiative International SmartGrid Action Network (ISGAN) launched the Knowledge Transfer Project (KTP) in March 2016 to capture, collect, and sharemore » knowledge about smart grid technologies among countries and key stakeholders. Building on ISGAN's experience with delivering deep-dive workshops, the KTP fosters meaningful international dialogue on smart grids with a focus on developing competence and building capacity. After a successful 2016 pilot project and two consecutive projects, each with a different focus and structure, the KTP has become an established practice that can support existing ISGAN or CEM initiatives. To accommodate different purposes, needs, and practical circumstances, ISGAN has adopted three basic models for delivering KTP workshops: Country-Centric, Multilateral, and Hybrid. This fact sheet describes each approach through case studies of workshops in Mexico, India, and Belgium, and invites new ideas and partners for future KTPs.« less
Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).
Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang
2003-01-01
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
Homeland security in the USA: past, present, and future.
Kemp, Roger L
2012-01-01
This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Karthik, Rajasekar; Patlolla, Dilip Reddy; Sorokine, Alexandre
Managing a wide variety of mobile devices across multiple mobile operating systems is a security challenge for any organization [1, 2]. With the wide adoption of mobile devices to access work-related apps, there is an increase in third-party apps that might either misuse or improperly handle user s personal or sensitive data [3]. HTML5 has been receiving wide attention for developing cross-platform mobile apps. According to International Data Corporation (IDC), by 2015, 80% of all mobile apps will be based in part or wholly upon HTML5 [4]. Though HTML5 provides a rich set of features for building an app, itmore » is a challenge for organizations to deploy and manage HTML5 apps on wide variety of devices while keeping security policies intact. In this paper, we will describe an upcoming secure mobile environment for HTML5 apps, called Sencha Space that addresses these issues and discuss how it will be used to design and build a secure and cross-platform mobile mapping service app. We will also describe how HTML5 and a new set of related technologies such as Geolocation API, WebGL, Open Layers 3, and Local Storage, can be used to provide a high end and high performance experience for users of the mapping service app.« less
Building Community Resilience to Disasters
Chandra, Anita; Acosta, Joie; Howard, Stefanie; Uscher-Pines, Lori; Williams, Malcolm; Yeung, Douglas; Garnett, Jeffrey; Meredith, Lisa S.
2011-01-01
Abstract Community resilience, or the sustained ability of a community to withstand and recover from adversity, has become a key policy issue at federal, state, and local levels, including in the National Health Security Strategy. Because resources are limited in the wake of an emergency, it is increasingly recognized that resilience is critical to a community's ability to reduce long recovery periods after an emergency. This article shares details of a report that provides a roadmap for federal, state, and local leaders who are developing plans to enhance community resilience for health security threats and describes options for building community resilience in key areas. Based on findings from a literature review and a series of community and regional focus groups, the authors provide a definition of community resilience in the context of national health security and a set of eight levers and five core components for building resilience. They then describe suggested activities that communities are pursuing and may want to strengthen for community resilience, and they identify challenges to implementation. PMID:28083162
8. Photocopy of engineering drawing. SECURITY UPGRADES, SLC17: ELEVATIONS AND ...
8. Photocopy of engineering drawing. SECURITY UPGRADES, SLC17: ELEVATIONS AND BUILDING SECTION, JULY 1992. - Cape Canaveral Air Station, Launch Complex 17, Facility 28425, East end of Lighthouse Road, Cape Canaveral, Brevard County, FL
Walk the Talk: Progress in Building a Supply Chain Security Culture
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hund, Gretchen
Pacific Northwest National Laboratory (PNNL) has engaged industry to “go beyond compliance” for over a decade in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices to understand their business and to build awareness around best practices to ensure security of goods, technology,more » and information along their supply chains. From conducting this work, PNNL identified indicators that a company can adopt as part of its commitment to nonproliferation ideals with a focus on supply chain security.« less
An authentication infrastructure for today and tomorrow
DOE Office of Scientific and Technical Information (OSTI.GOV)
Engert, D.E.
1996-06-01
The Open Software Foundation`s Distributed Computing Environment (OSF/DCE) was originally designed to provide a secure environment for distributed applications. By combining it with Kerberos Version 5 from MIT, it can be extended to provide network security as well. This combination can be used to build both an inter and intra organizational infrastructure while providing single sign-on for the user with overall improved security. The ESnet community of the Department of Energy is building just such an infrastructure. ESnet has modified these systems to improve their interoperability, while encouraging the developers to incorporate these changes and work more closely together tomore » continue to improve the interoperability. The success of this infrastructure depends on its flexibility to meet the needs of many applications and network security requirements. The open nature of Kerberos, combined with the vendor support of OSF/DCE, provides the infrastructure for today and tomorrow.« less
Beyond Boundaries: A Promising New Model for Security and Global Development. Carnegie Results
ERIC Educational Resources Information Center
Theroux, Karen
2013-01-01
In 2007, a team of international security experts and researchers at the Henry L. Stimson Center launched an initiative to build an effective model for sustainable nonproliferation of biological, chemical, and nuclear weapons. The project represented an exciting and innovative way of thinking about security: a dual-use approach that operated at…
Learner Centric in M-Learning: Integration of Security, Dependability and Trust
ERIC Educational Resources Information Center
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin
2014-01-01
The paper focus on learner centric attributes in a m-learning environment encounters the security measurements. In order to build up a systematic threat and countermeasure for protecting the learners as well as providing awareness and satisfaction in utilizing the mobile learning system, a security model need to be overhauled. The brief literature…
Security Meets Real-World Computing. Building Digital Libraries
ERIC Educational Resources Information Center
Huwe, Terence K.
2005-01-01
The author of this column describes several instances in which secure data on computers were compromised. In each of these instances, a different route was involved in gaining access to the secure data--one by office-based theft, one by hacking, and one by burglary. Is is proposed that the most difficult factor to guarantee in the protection of…
Smart Buildings: An Introduction to the Library of the Future.
Hoy, Matthew B
2016-01-01
Advances in building technologies are combining energy efficiency, networked sensors, and data recording in exciting ways. Modern facilities can adjust lighting, heating, and cooling outputs to maximize efficiency, provide better physical security, improve wayfinding for occupants, and provide detailed reports of building use. This column will briefly explore the idea of "smart buildings," describe some of the technologies that are being developed for these buildings, and explore their implications for libraries. A brief listing of selected smart building technologies is also provided.
Building Partner Country Capacity for Stability Operations
2011-01-01
international aFFairs law and Business national seCurity population and aging puBliC saFety sCienCe and teChnology terrorism and homeland seCurity this... Quantic Thurston, MG-942-A, 2010 (available at http://www.rand.org/pubs/monographs/MG942.html). This research brief was written by Kristin J. Leuschner...AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY TERRORISM AND HOMELAND SECURITY
Securing your financial future.
Kachalia, Parag R
2009-04-01
Securing one's financial future requires dedication and planning. A clear plan must be implemented and continually re-examined to assure an individual remains on track to achieve this security. True success of the plan will be dependent upon taking the appropriate steps to protecting one's assets against unfortunate events along with building assets with a clear end goal in mind. This article will cover the fundamental steps an individual can take to secure their financial future.
20. Photocopy of architectural drawing, September 1942 (original on file ...
20. Photocopy of architectural drawing, September 1942 (original on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). OPERATIONS BUILDING 'A', ARLINGTON HALL STATION. OFFICE BUILDING -- SECOND FLOOR PLAN -- HEATING. DRAWING M-24-161-26. - Arlington Hall Station, Building No. 401, 4000 Arlington Boulevard, Arlington, Arlington County, VA
19. Photocopy of architectural drawing, September 1942 (original on file ...
19. Photocopy of architectural drawing, September 1942 (original on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). OPERATIONS BUILDING 'A', ARLINGTON HALL STATION. OFFICE BUILDING -- FIRST FLOOR PLAN -- HEATING. DRAWING M-24-161-25. - Arlington Hall Station, Building No. 401, 4000 Arlington Boulevard, Arlington, Arlington County, VA
Storytelling Dramas as a Community Building Activity in an Early Childhood Classroom
ERIC Educational Resources Information Center
Wright, Cheryl; Diener, Marissa L.; Kemp, Jacqueline Lindsay
2013-01-01
Healthy social-emotional development is promoted by building a safe, secure and respectful environment in an early childhood setting with positive and consistent relationships among adults, children, and their peers. This study explored storytelling dramas as an opportunity to build community within the context of one early childhood classroom.…
Dickmann, Petra; Sheeley, Heather; Lightfoot, Nigel
2015-01-01
Laboratory capacity building is characterized by a paradox between endemicity and resources: countries with high endemicity of pathogenic agents often have low and intermittent resources (water, electricity) and capacities (laboratories, trained staff, adequate regulations). Meanwhile, countries with low endemicity of pathogenic agents often have high-containment facilities with costly infrastructure and maintenance governed by regulations. The common practice of exporting high biocontainment facilities and standards is not sustainable and concerns about biosafety and biosecurity require careful consideration. A group at Chatham House developed a draft conceptual framework for safer, more secure, and sustainable laboratory capacity building. The draft generic framework is guided by the phrase "LOCAL - PEOPLE - MAKE SENSE" that represents three major principles: capacity building according to local needs (local) with an emphasis on relationship and trust building (people) and continuous outcome and impact measurement (make sense). This draft generic framework can serve as a blueprint for international policy decision-making on improving biosafety and biosecurity in laboratory capacity building, but requires more testing and detailing development.
Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security
NASA Astrophysics Data System (ADS)
Breiing, Marcus; Cole, Mara; D'Avanzo, John; Geiger, Gebhard; Goldner, Sascha; Kuhlmann, Andreas; Lorenz, Claudia; Papproth, Alf; Petzel, Erhard; Schwetje, Oliver
This paper outlines the scientific goals, ongoing work and first results of the SiVe research project on critical infrastructure security. The methodology is generic while pilot studies are chosen from airport security. The outline proceeds in three major steps, (1) building a threat scenario, (2) development of simulation models as scenario refinements, and (3) assessment of alternatives. Advanced techniques of systems analysis and simulation are employed to model relevant airport structures and processes as well as offences. Computer experiments are carried out to compare and optimise alternative solutions. The optimality analyses draw on approaches to quantitative risk assessment recently developed in the operational sciences. To exploit the advantages of the various techniques, an integrated simulation workbench is build up in the project.
Setayesh, Sogol; Mackey, Tim K
2016-06-08
The U.S Congress initiated sanctions against Iran after the 1979 U.S. Embassy hostage crisis in Tehran, and since then the scope of multilateral sanctions imposed by the United States, the European Union, and the United Nations Security Council have progressively expanded throughout the intervening years. Though primarily targeted at Iran's nuclear proliferation activities, sanctions have nevertheless resulted in negative public health outcomes for ordinary Iranian citizens. This includes creating vital domestic shortages to life-saving medicines, leaving an estimated 6 million Iranian patients with limited treatment access for a host of diseases. Sanctions have also crippled Iran's domestic pharmaceutical industry, leading to the disruption of generic medicines production and forcing the country to import medicines and raw materials that are of lower or questionable quality. Countries such as the United States have responded to this medical crisis by implementing export control exemptions with the aim of easing the trade of humanitarian goods (including certain pharmaceuticals and medical devices). However, despite these efforts, pharmaceutical firms and international banking institutions remain cautious about doing business with Iran, leaving the country faced with continuing shortages. We conducted a review of key characteristics of the Iranian drug shortage that identified 73 shortage drugs that closely tracked with the disease burden in the country. Additionally, 44 % of these drugs were also classified as essential medicines by the World Health Organization. A vast majority of these drugs were also covered under export control exemptions that theoretically should make them easier to procure, but nevertheless will still in shortage. Based on our review of the sanctions regulatory framework and key characteristics of the Iranian drug shortage, we propose policy intervention leveraging the recently negotiated P5 + 1 agreement that begins the process of providing Iran relief from the international economic sanctions regime. This specifically includes advocating for the application of "health diplomacy" in ongoing multilateral negotiations following commencement of "implementation day," by advocating for an additional set of reform measures incorporated into this historic negotiation that will finally address the humanitarian and medical crisis of drug shortages in Iran.
Defining the Role of the Professional Security Consultant.
ERIC Educational Resources Information Center
Webster, Jim
2002-01-01
Discusses the skill set that should be available in security consultants to higher education, including the ability to work with mechanical, architectural, electrical, landscaping, and telecommunications systems. Addresses the need to bring consultants into the building design phase. (EV)
Transportation Energy Security and Climate Change Mitigation Act of 2007
DOT National Transportation Integrated Search
2008-09-29
The Committee on Transportation and Infrastructure, to whom was referred the bill (H.R. 2701) to strengthen our Nations energy security and mitigate the effects of climate change by promoting energy efficient transportation and public buildings, c...
Center for Corporate Climate Leadership Building Internal Support in Supply Chain Management
Organizations build support for addressing GHG emissions by developing key allies in business units, leveraging one business unit to drive change across the organization, and securing executive support while communicating resource needs.
17. VIEW OF INTERIOR OF BUILDING 220 SECOND FLOOR, MALE ...
17. VIEW OF INTERIOR OF BUILDING 220 SECOND FLOOR, MALE MEDIUM SECURITY SLEEPING AREA. - U.S. Naval Base, Pearl Harbor, Brig, Neville Way near Ninth Street at Marine Barracks, Pearl City, Honolulu County, HI
NASA Technical Reports Server (NTRS)
Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre
2003-01-01
This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.
Quantum cryptography to satellites for global secure key distribution
NASA Astrophysics Data System (ADS)
Rarity, John G.; Gorman, Philip M.; Knight, Paul; Wallace, Kotska; Tapster, Paul R.
2017-11-01
We have designed and built a free space secure key exchange system using weak laser pulses with polarisation modulation by acousto-optic switching. We have used this system to exchange keys over a 1.2km ground range with absolute security. Building from this initial result we analyse the feasibility of exchanging keys to a low earth orbit satellite.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-18
... Docket Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room.... The security zone will encompass an area of the Detroit River beginning at a point of origin on land... shoreline to connect back to the point of origin. Vessels in close proximity to the security zone will be...
49 CFR 393.118 - What are the rules for securing dressed lumber or similar building products?
Code of Federal Regulations, 2010 CFR
2010-10-01
... Shifting and Falling Cargo Specific Securement Requirements by Commodity Type § 393.118 What are the rules... transported using no more than one tier. Bundles carried on one tier must be secured in accordance with the... one tier. Bundles carried in more than one tier must be either: (1) Blocked against lateral movement...
A study on an information security system of a regional collaborative medical platform.
Zhao, Junping; Peng, Kun; Leng, Jinchang; Sun, Xiaowei; Zhang, Zhenjiang; Xue, Wanguo; Ren, Lianzhong
2010-01-01
The objective of this study was to share the experience of building an information security system for a regional collaborative medical platform (RCMP) and discuss the lessons learned from practical projects. Safety measures are analyzed from the perspective of system engineering. We present the essential requirements, critical architectures, and policies for system security of regional collaborative medical platforms.
78 FR 27472 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-10
... Approved For Collection And Use: Airfield lighting and vault. Runway 21 extension--preliminary design...--80 facility modification design and build-out. Access control enhancements. Security fence replacement. Airfield pavement survey. Jet bridge refurbishment. Security checkpoint modification. Friction...
Afghanistan: Post-Taliban Governance, Security, and U.S. Policy
2009-12-02
relations with the Taliban leadership when it was in power, possibly viewing engagement as a more effective means of preventing spillover of radical...Building............................................................................. 23 Taliban, Al Qaeda, and Related Insurgent Groups...42 Table 5. Major Security- Related Indicators
Facility Decontamination and Decommissioning Program Surveillance and Maintenance Plan, Revision 2
DOE Office of Scientific and Technical Information (OSTI.GOV)
Poderis, Reed J.; King, Rebecca A.
This Surveillance and Maintenance (S&M) Plan describes the activities performed between deactivation and final decommissioning of the following facilities located on the Nevada National Security Site, as documented in the Federal Facility Agreement and Consent Order under the Industrial Sites program as decontamination and decommissioning sites: ? Engine Maintenance, Assembly, and Disassembly (EMAD) Facility: o EMAD Building (Building 25-3900) o Locomotive Storage Shed (Building 25-3901) ? Test Cell C (TCC) Facility: o Equipment Building (Building 25-3220) o Motor Drive Building (Building 25-3230) o Pump Shop (Building 25-3231) o Cryogenic Lab (Building 25-3232) o Ancillary Structures (e.g., dewars, water tower, piping,more » tanks) These facilities have been declared excess and are in various stages of deactivation (low-risk, long-term stewardship disposition state). This S&M Plan establishes and implements a solid, cost-effective, and balanced S&M program consistent with federal, state, and regulatory requirements. A graded approach is used to plan and conduct S&M activities. The goal is to maintain the facilities in a safe condition in a cost-effective manner until their final end state is achieved. This plan accomplishes the following: ? Establishes S&M objectives and framework ? Identifies programmatic guidance for S&M activities to be conducted by National Security Technologies, LLC, for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) ? Provides present facility condition information and identifies hazards ? Identifies facility-specific S&M activities to be performed and their frequency ? Identifies regulatory drivers, NNSA/NFO policies and procedures, and best management practices that necessitate implementation of S&M activities ? Provides criteria and frequencies for revisions and updates ? Establishes the process for identifying and dispositioning a condition that has not been previously identified or documented ? Provides instructions for implementing annual S&M inspections and activities The following facilities that were included in Revision 1 of this plan have reached final disposition and are no longer in the S&M program: ? Reactor Maintenance, Assembly, and Disassembly Facility, Building 25-3110 ? Test Cell A Facility, Building 25-3113 ? TCC Facility, Building 25-3210 ? Pluto Disassembly Facility, Building 26-2201 ? Super Kukla Facility, Building 27-5400« less
PROCESS WATER BUILDING, TRA605. CONTEXTUAL VIEW, CAMERA FACING SOUTHEAST. PROCESS ...
PROCESS WATER BUILDING, TRA-605. CONTEXTUAL VIEW, CAMERA FACING SOUTHEAST. PROCESS WATER BUILDING AND ETR STACK ARE IN LEFT HALF OF VIEW. TRA-666 IS NEAR CENTER, ABUTTED BY SECURITY BUILDING; TRA-626, AT RIGHT EDGE OF VIEW BEHIND BUS. INL NEGATIVE NO. HD46-34-1. Mike Crane, Photographer, 4/2005 - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
2012-11-01
Abbreviations BPC building partner capacity DOD Department of Defense DSCA Defense Security Cooperation Agency EFTS Enhanced Freight Tracking System...SCOs are ready to receive a planned delivery. For both FMS and pseudo-FMS processes, DOD uses the Enhanced Freight Tracking System ( EFTS ), a secure...providing data for this system. The Security Assistance Management Manual recommends that SCOs use the EFTS to maintain awareness of incoming shipments
Whole Building Design Objectives for Campus Safety and Security: A System Dynamics Approach
ERIC Educational Resources Information Center
Oakes, Charles G.
2010-01-01
The May/June 2009 issue of "Facilities Manager" introduced APPA readers to the Whole Building Design Guide (WBDG)--today's most comprehensive Internet-based depository of resources contributing to a systems approach for everything of a building nature. The emphasis in that article was on Operations and Maintenance (O&M) issues and procedures. In…
14. Inner double blast door entrance to perimeter acquisition radar ...
14. Inner double blast door entrance to perimeter acquisition radar building security area - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
DSCOVR Spacecraft Arrival, Offload, & Unpacking
2014-11-20
NOAA’s Deep Space Climate Observatory spacecraft, or DSCOVR, wrapped in plastic and secured onto a portable work stand, makes a short trek from the airlock of Building 2 to the high bay of Building 1 at the Astrotech payload processing facility.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Knipper, W.
This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.
Safeguarding Databases Basic Concepts Revisited.
ERIC Educational Resources Information Center
Cardinali, Richard
1995-01-01
Discusses issues of database security and integrity, including computer crime and vandalism, human error, computer viruses, employee and user access, and personnel policies. Suggests some precautions to minimize system vulnerability such as careful personnel screening, audit systems, passwords, and building and software security systems. (JKP)
2014-10-01
CRm CAL FA~WR£S Q I • Software Engineering Institute I Ccamt>gw l\\~llon Lniwndty 34 Basic attack tree Destroy Building Generate Sufficient...by computer-security company marketing literature that touts 11hacker proof software,11 11triple-DES security,11 and the like. In truth, unbreakable
75 FR 75187 - Sunshine Act Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-02
... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange... liquidity, investor impact, self-regulation, accounting and Build America Bonds. The panel discussion and...
Improved satellite constellations for CONUS ATC coverage
DOT National Transportation Integrated Search
1974-05-01
The report examines the problem of designing a constellation of orbiting satellites capable of supporting an aircraft navigation/surveillance service over CONUS. It is assumed that the aircraft positions are determined by hyperbolic multilateration u...
Forced Shortsightedness: Security Force Assistance Missions
2014-06-01
legislation , it is therefore the intention of the Congress to promote the peace of the world and the foreign policy, security, and general welfare of the... legislation , Congressional Research Service (CRS) reports, the Defense Institute of Security Assistance Management’s (DISAM) Green Book, and interviews with...developed database, there are “184 separate legislative authorities that power the 165 Building Partnership Capacity (BPC) programs managed across
Reforming The U.S. Security Assistance Export Process To Build Existing Capabilities
2015-12-01
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA JOINT APPLIED PROJECT REFORMING THE U.S. SECURITY ASSISTANCE EXPORT PROCESS TO...December 2015 3. REPORT TYPE AND DATES COVERED Joint applied project 4. TITLE AND SUBTITLE REFORMING THE U.S. SECURITY ASSISTANCE EXPORT PROCESS TO...the programs. While acknowledging the expanding role of the programs, the findings indicate a need for reforms in the export -control mechanisms
Closing the Security Gap: Building Irregular Security Forces
2012-06-08
had mutinied against the British during the Second Sikh War. Lawrence had the Punjabi regiments disarmed and then demobilized. The British initially...contributed to the security problem.118 The British were primarily concerned with control of the Punjabi plains because its economic and agricultural...classes were allowed to carry arms. The British recruited the following tribes from within India: Rajput, Hindustani and Punjabi Brahman, Punjabi
Unlocking User-Centered Design Methods for Building Cyber Security Visualizations
2015-10-03
a final, deployed tool. Goodall et al. interviewed analysts to derive requirements for a network security tool [14], while Stoll et al. explain the...4673-7599-3/15/$31.00 c©2015 IEEE 2015 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC) [14] J. R. Goodall , A. A. Ozok, W. G. Lutters, P...Visualization for Cyber Security, pages 91–98. IEEE, 2005. [19] A. Komlodi, P. Rheingans, U. Ayachit, J. Goodall , and A. Joshi. A user- centered look at
Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment
NASA Astrophysics Data System (ADS)
Borgohain, Tuhin; Borgohain, Amardeep; Borgohain, Rajdeep; Sanyal, Sugata
2015-02-01
The purpose of this paper is to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then we suggest a detailed countermeasure, building upon the Jigsaw based secure data transfer [8] for enhanced security of the data flow inside the communication system of a smart grid. The paper has been written without the consideration of any factor of inoperability between the various security techniques inside a smart grid
1988-03-31
MARCI 1988 iAm U m WI 4EUnclT CLSIIAION OF THIS PAGE REPORT DOCUMENTATION PAGE is REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2.. SECUR ...logistics system of the future more capable of supporting the full spectrumn of war 20 OISTRIaSUTION.’AVAILAeILiTY 0" ABSTRACT 21 ABSTRACT SECURITY ... SECURITY CLASSIFICATION OT: THIS PAGF Unclas ’SCUFUTY Cý= I!FICATION OF THIS PAGE 1,Qwcont.) scenarios. Today’s logistics processes assume wartime
16. Photocopy of photograph, 1942 (original print on file at ...
16. Photocopy of photograph, 1942 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW OF CONSTRUCTION OF BUILDING 401. - Arlington Hall Station, Building No. 401, 4000 Arlington Boulevard, Arlington, Arlington County, VA
DSCOVR Spacecraft Arrival, Offload, & Unpacking
2014-11-20
A forklift is enlisted to move NOAA’s Deep Space Climate Observatory spacecraft, or DSCOVR, wrapped in plastic and secured onto a portable work stand, from the airlock of Building 2 to the high bay of Building 1 at the Astrotech payload processing facility.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-30
..., June 4, 2013--1:00 p.m. Until 5:00 p.m. The Subcommittee will review and discuss all cyber security... Flint North building, 11555 Rockville Pike, Rockville, MD. After registering with security, please...
Moving toward energy security and sustainability in 2050 by reconfiguring biofuel production
USDA-ARS?s Scientific Manuscript database
To achieve energy security and sustainability by 2050 requires reconfiguring biofuel production both by building on current infrastructure and existing technology and also by making substantial improvements and changes in the feedstocks used, the process technologies applied, and the fuels produced....
75 FR 27863 - Notice of Open Public Hearing
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-18
... U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION Notice of Open Public Hearing AGENCY: U.S.-China Economic and Security Review Commission. ACTION: Update to notice of open public hearing--May 20, 2010, Washington, DC. Room changed to 562 Dirksen Senate Office Building. [[Page 27864
ERIC Educational Resources Information Center
Spoor, Dana L.
1996-01-01
School districts are integrating security and life-safety systems into school buildings to protect students and property. This proactive approach includes sprinkler systems, fire alarms, and security systems that monitor door movement. Some school districts that are incorporating the latest life-safety technology are in Missouri, Ohio, California,…
Strategic contracting practices to improve procurement of health commodities
Arney, Leslie; Yadav, Prashant; Miller, Roger; Wilkerson, Taylor
2014-01-01
ABSTRACT Public-sector entities responsible for procurement of essential medicines and health commodities in developing countries often lack the technical capacity to efficiently ensure supply security. Under strict public scrutiny and pressures to be transparent, many agencies continue to use archaic procurement methods and to depend on inflexible forecasts and cumbersome tendering processes. On the basis of semi-structured literature reviews and interviews, we identified framework agreements as a strategic procurement practice used by the U.S. federal government that may also be suitable for global health supply chains. Framework agreements are long-term contracts that provide the terms and conditions under which smaller repeat purchasing orders may be issued for a defined period of time. Such agreements are common in U.S. and United Nations procurement systems and in other developed countries and multilateral organizations. In contrast, framework agreements appear to be seldom used in procurement of health commodities in countries of sub-Saharan Africa. The current practice of floating tenders multiple times a year contributes to long lead times and stock-outs, and it hampers the manufacturer's or supplier's ability to plan and respond to the government's needs. To date, government's use of strategic contracting practices in public procurement of health commodities has not received much attention in most developing countries. It may present an opportunity for substantial improvements in procurement efficiency and commodity availability. Enabling legislation and strengthened technical capacity to develop and manage long-term contracts could facilitate the use of framework contracts in sub-Saharan Africa, with improved supply security and cost savings likely to result. PMID:25276589
Strategic contracting practices to improve procurement of health commodities.
Arney, Leslie; Yadav, Prashant; Miller, Roger; Wilkerson, Taylor
2014-08-01
Public-sector entities responsible for procurement of essential medicines and health commodities in developing countries often lack the technical capacity to efficiently ensure supply security. Under strict public scrutiny and pressures to be transparent, many agencies continue to use archaic procurement methods and to depend on inflexible forecasts and cumbersome tendering processes. On the basis of semi-structured literature reviews and interviews, we identified framework agreements as a strategic procurement practice used by the U.S. federal government that may also be suitable for global health supply chains. Framework agreements are long-term contracts that provide the terms and conditions under which smaller repeat purchasing orders may be issued for a defined period of time. Such agreements are common in U.S. and United Nations procurement systems and in other developed countries and multilateral organizations. In contrast, framework agreements appear to be seldom used in procurement of health commodities in countries of sub-Saharan Africa. The current practice of floating tenders multiple times a year contributes to long lead times and stock-outs, and it hampers the manufacturer's or supplier's ability to plan and respond to the government's needs. To date, government's use of strategic contracting practices in public procurement of health commodities has not received much attention in most developing countries. It may present an opportunity for substantial improvements in procurement efficiency and commodity availability. Enabling legislation and strengthened technical capacity to develop and manage long-term contracts could facilitate the use of framework contracts in sub-Saharan Africa, with improved supply security and cost savings likely to result.
26 CFR 1.141-4 - Private security or payment test.
Code of Federal Regulations, 2014 CFR
2014-04-01
... the property (for example, records of costs of a building that was built 30 years before the... proceeds of $10 million. B uses $9.7 million of the proceeds to construct a 10-story office building. B... leases 1 floor of the building for the term of the bonds. Under all of the facts and circumstances, it is...
26 CFR 1.141-4 - Private security or payment test.
Code of Federal Regulations, 2013 CFR
2013-04-01
... the property (for example, records of costs of a building that was built 30 years before the... proceeds of $10 million. B uses $9.7 million of the proceeds to construct a 10-story office building. B... leases 1 floor of the building for the term of the bonds. Under all of the facts and circumstances, it is...
26 CFR 1.141-4 - Private security or payment test.
Code of Federal Regulations, 2012 CFR
2012-04-01
... the property (for example, records of costs of a building that was built 30 years before the... proceeds of $10 million. B uses $9.7 million of the proceeds to construct a 10-story office building. B... leases 1 floor of the building for the term of the bonds. Under all of the facts and circumstances, it is...
26 CFR 1.141-4 - Private security or payment test.
Code of Federal Regulations, 2011 CFR
2011-04-01
... the property (for example, records of costs of a building that was built 30 years before the... proceeds of $10 million. B uses $9.7 million of the proceeds to construct a 10-story office building. B... leases 1 floor of the building for the term of the bonds. Under all of the facts and circumstances, it is...
Koblentz, Gregory D
2012-01-01
The Seventh Review Conference of the Biological Weapons Convention (BWC), the first international treaty to outlaw an entire class of weapons, was held in Geneva in December 2011. On 7 December, Secretary of State Hillary Clinton became the highest-ranking US government official to address a BWC meeting. Secretary Clinton told the assembled delegation that ‘we view the risk of bioweapons attack as both a serious national security challenge and a foreign policy priority’. At the same time, she warned that a large-scale disease outbreak ‘could cripple an already fragile global economy’. Secretary Clinton's speech reflected a new understanding that the range of biological threats to international security has expanded from state-sponsored biological warfare programmes to include biological terrorism, dual-use research and naturally occurring infectious diseases such as pandemics. Recognizing these changes, President Barack Obama released a new national strategy for countering biological threats in 2009. This strategy represents a shift in thinking away from the George W. Bush administration's focus on biodefence, which emphasized preparing for and responding to biological weapon attacks, to the concept of biosecurity, which includes measures to prevent, prepare for and respond to naturally occurring and man-made biological threats. The Obama administration's biosecurity strategy seeks to reduce the global risk of naturally occurring and deliberate disease outbreaks through prevention, international cooperation, and maximizing synergies between health and security. The biosecurity strategy is closely aligned with the Obama administration's broader approach to foreign policy, which emphasizes the pragmatic use of smart power, multilateralism and engagement to further the national interest. This article describes the Obama administration's biosecurity strategy; highlights elements of continuity and change from the policies of the Bush administration; discusses how it fits into Obama's broader foreign policy agenda; and analyses critical issues that will have to be addressed in order to implement the strategy successfully.
Colorado WAM separations standards targets of opportunity and flight test analysis
DOT National Transportation Integrated Search
2009-10-25
The Federal Aviation Administration (FAA) : Surveillance and Broadcast Services (SBS) Program : Office and the Colorado Department of : Transportation are implementing Wide Area : Multilateration (WAM) in Non-Radar Airspace : (NRA) to improve air tra...
International Cancer Screening Network
The International Cancer Screening Network promotes evidence-based cancer screening implementation and evaluation with cooperation from multilateral organizations around the globe. Learn more about how ICSN aims to reduce the global burden of cancer by supporting research and international collaboration.
Code of Federal Regulations, 2010 CFR
2010-04-01
...). Section 140.7 establishes the procedures applicable to multilateral institutions and international organizations. Section 140.8 establishes the procedures applicable to recipients of scholarships and fellowships and participant trainees. Section 140.9 establishes the procedures applicable to non-governmental...
USDA-ARS?s Scientific Manuscript database
This chapter describes the ascomycetous yeast genus Naumovozyma, which was recognized from multigene deoxyribonucleic acid (DNA) sequence analysis. The genus has two describes species, which were formerly classified in the genus Saccharomyces. The species reproduce by multilateral budding but do not...
Foundational Security Principles for Medical Application Platforms* (Extended Abstract)
Vasserman, Eugene Y.; Hatcliff, John
2014-01-01
We describe a preliminary set of security requirements for safe and secure next-generation medical systems, consisting of dynamically composable units, tied together through a real-time safety-critical middleware. We note that this requirement set is not the same for individual (stand-alone) devices or for electronic health record systems, and we must take care to define system-level requirements rather than security goals for components. The requirements themselves build on each other such that it is difficult or impossible to eliminate any one of the requirements and still achieve high-level security goals. PMID:25599096
Articulated Arm Coordinate Measuring Machine Calibration by Laser Tracker Multilateration
Majarena, Ana C.; Brau, Agustín; Velázquez, Jesús
2014-01-01
A new procedure for the calibration of an articulated arm coordinate measuring machine (AACMM) is presented in this paper. First, a self-calibration algorithm of four laser trackers (LTs) is developed. The spatial localization of a retroreflector target, placed in different positions within the workspace, is determined by means of a geometric multilateration system constructed from the four LTs. Next, a nonlinear optimization algorithm for the identification procedure of the AACMM is explained. An objective function based on Euclidean distances and standard deviations is developed. This function is obtained from the captured nominal data (given by the LTs used as a gauge instrument) and the data obtained by the AACMM and compares the measured and calculated coordinates of the target to obtain the identified model parameters that minimize this difference. Finally, results show that the procedure presented, using the measurements of the LTs as a gauge instrument, is very effective by improving the AACMM precision. PMID:24688418
1989-01-01
Center, Panama City 314 Diver Training Building Addition 4,300 4 ,300 50 180 Subtotal 4,300 4,300 Navy Experimental Diving Unit 182 Panama City 347 ...Air Force 001 Security Training Center 4,500 4,500 100 345 Subtotal .4,500 4,500 TOTAL FOR TAS 28,220 28,220 Virginia Naval SecuritY Goui Activity 347 ...Building Addition 4,300 C NEDU Panama City, FL 347 Underwater Equipment Support Complex 2,900 C NPWC Pensacola, FL 109 Wastewater Transfer System 2,100 C
NASA Astrophysics Data System (ADS)
Connolly, Barbara Mary
This dissertation applies theoretical insights from transaction cost economics to explain and predict the organizational form of cooperative agreements between Eastern and Western Europe in areas of regional environmental and political concern. It examines five contracting problems related to nuclear power safety and acid rain, and describes the history of international negotiations to manage these problems. It argues that the level of interdependence in a given issue area, or costly effects experienced in one state due to activities and decisions of other states, along with the level of transactional vulnerability, or sunk costs invested in support of a particular contractual relationship among these states, are key determinants of the governance structures states choose to facilitate cooperation in that issue area. Empirically, the dissertation traces the evolution of three sets of institutional arrangements related to nuclear safety: governance for western nuclear safety assistance to Eastern Europe, negotiations of a global convention on safety standards for nuclear power plants, and contracts among utilities and multilateral banks to build new nuclear power plants in Eastern Europe. Next it studies European acid rain, chronicling the history of international acid rain controls within the UNECE Convention on Long-Range Transboundary Air Pollution (LRTAP) and the European Union, and finally examining institutional arrangements for burden-sharing to promote European bargains on emissions reduction, including bilateral aid transfers and proposals for multilateral burden sharing. Political actors have a wide range of choice among institutional arrangements to facilitate international cooperation, from simple market-type exchanges, to arbitration-type regimes that provide information and enhance reputation effects, to self-enforcing agreements such as issue-linkage, to supranational governance. The governance structures states devise to manage their cooperative relations affects outcomes of cooperation, by influencing the bargains states make and how well those bargains stick. This research shows that patterns of interdependence and sunk costs in cooperative relationships with particular states strongly condition the choices states make between these institutional structures to facilitate mutually beneficial international cooperation while protecting against opportunism.
2015-05-21
lie outside their span of control. This monograph therefore assumes no significant changes to whole-of- government collaboration, legislated ...with several other military and whole-of-government BPC efforts. Security cooperation and security assistance (SA) are legislated portfolios of...Plan Colombia, the campaign proposed in 1999 by the Colombian President to reduce internal conflict, led to increased US confidence and support for
Developing Ministerial Collaborative Planning Capacity
2012-03-14
1204, Arlington, VA 22202- 4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be subject to any...to build capacity and legitimacy within a host nation’s security sector. Providing a safe and secure environment founded on the rule of law is the...6 Vision: A highly efficient ministry capable of providing security and stability for all components of society, applying the rule of law and
Private Military and Security Companies - Counterinsurgency and Nation Building Strategy
2013-04-25
cans, and bought war bonds is long gone. One advantage that the private sector brings to public wars is capacity. Companies like Kellogg and Brown...1 Anne-Marie Buzatu, and Benjamin S . Buckland, “Private Military & Security Companies : Future Challenges in...From -‐ To) September 2012 - April 2013 4. TITLE AND SUBTITLE Private Military and Security Companies - Counterinsurgency and
Fortress America: The Aesthetics of Homeland Security in the Public Realm
2017-09-01
people in a bombing attack on a federal building in Oklahoma City. Americans were stunned by this first modern domestic terrorist attack. The bombing ...Order 12977, signed by President Clinton six months after the bombing , created the Interagency Security Committee (ISC) to address physical security...barricades installed shortly after the Oklahoma City bombing . Later in the article, Brown quotes Stephen Kliment, editor of the Architectural Record
Sea Piracy in Southeast Asia: Implications for Countering Maritime Terrorism in the United States
2006-06-01
least ten agencies that have some involvement in maritime security management with nine authorized to conduct law enforcement operations at sea...exercises, cooperating on consequence management , and sustaining capacity building operations .173 The United States has important bilateral security...Overview and Evaluation,” Journal of Homeland Security and Emergency Management 2, no. 4 (2005). 221 Frittelli, “Terminal Operators ,” 2006, 3
It’s Not New: Historical U.S. Army Security Forces Assistance Efforts
2012-12-06
obligation.30 In a recent article published by Small Wars Journal, Kip Whittington , a research associate at the National Defense University...operations in Afghanistan, Whittington believes that building capable indigenous national security institutions meets U.S. and international security...29Ibid., 11. 30Ibid. 31Kip Whittington , “An Afghanistan Without Institutions: A World Without Rest,” Small Wars Journal 8, no. 2 (February 2012
Code of Federal Regulations, 2010 CFR
2010-04-01
... tanks containing spirits, denatured spirits, or wine shall be individually locked or locked within an... wines or the rooms or buildings in which they are housed, shall be equipped so that they may be secured... lights, alarm systems, guard services) or changes in construction, arrangement, or equipment shall be...
78 FR 19278 - Federal Property Suitable as Facilities To Assist the Homeless
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-29
... Kirtland AFB Kirtland AFB NM 87117 Landholding Agency: Air Force Property Number: 18201220011 Status... SE Kirtland AFB NM 87117 Landholding Agency: Air Force Property Number: 18201220012 Status.../out comprising nat'l security. Reasons: Secured Area 6 Buildings Kirtland AFB Kirtland AFB NM 87117...
12 CFR 1250.2 - Procedural requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... requirements. (a) Procedures. An Enterprise shall implement procedures reasonably designed to ensure for any loan that is secured by improved real estate or a mobile home located in an area that has been... amended and purchased by the Enterprise, the building or mobile home and any personal property securing...
Requirements, model and prototype for a multi-utility locational and security information hub.
DOT National Transportation Integrated Search
2015-11-01
This project lays the foundation for building an exchange hub for locational and security data and risk assessment of potential excavation work. It acts primarily at 2 stages: upstream of the mark-out process, as a decision support tool to help strea...
Cloud-Based Virtual Laboratory for Network Security Education
ERIC Educational Resources Information Center
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek
2014-01-01
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
DOT National Transportation Integrated Search
2001-08-01
This study assesses how to manage the effects or outcomes of organizational change on job security and employee commitment in transit systems using trust-building, empowerment, employee reassurance, and job redesign strategies. The major findings are...
78 FR 56953 - Sunshine Act Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange... headquarters building, to hear oral argument in an appeal by Montford and Company, Inc., d/b/a Montford...
32 CFR 228.13 - Disturbances on protected property.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 2 2014-07-01 2014-07-01 false Disturbances on protected property. 228.13... (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.13 Disturbances on protected property. Any conduct which impedes or threatens the security of protected property, or any buildings or persons thereon, or...
32 CFR 228.13 - Disturbances on protected property.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 2 2013-07-01 2013-07-01 false Disturbances on protected property. 228.13... (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.13 Disturbances on protected property. Any conduct which impedes or threatens the security of protected property, or any buildings or persons thereon, or...
32 CFR 228.13 - Disturbances on protected property.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 2 2012-07-01 2012-07-01 false Disturbances on protected property. 228.13... (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.13 Disturbances on protected property. Any conduct which impedes or threatens the security of protected property, or any buildings or persons thereon, or...
32 CFR 228.13 - Disturbances on protected property.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 2 2011-07-01 2011-07-01 false Disturbances on protected property. 228.13... (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.13 Disturbances on protected property. Any conduct which impedes or threatens the security of protected property, or any buildings or persons thereon, or...
32 CFR 228.13 - Disturbances on protected property.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 2 2010-07-01 2010-07-01 false Disturbances on protected property. 228.13... (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.13 Disturbances on protected property. Any conduct which impedes or threatens the security of protected property, or any buildings or persons thereon, or...
75 FR 55370 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-10
... Securities and Exchange Commission (``Commission'') has submitted to the Office of Management and Budget a... Affairs, Office of Management and Budget, Room 10102, New Executive Office Building, Washington, DC 20503... settlement price for each cash-settled security futures product fairly reflect the opening price of the...
77 FR 66351 - Establishing the White House Homeland Security Partnership Council
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-02
... resources more efficiently, build on one another's expertise, drive innovation, engage in collective action... utilizing diverse perspectives, skills, tools, and resources. The National Security Strategy emphasizes the importance of partnerships, underscoring that to keep our Nation safe ``we must tap the ingenuity outside...
77 FR 73464 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-10
..., grantees, volunteers, interns, and others performing or working on a contract, service, grant, cooperative... tape records are stored in locked file rooms, locked file cabinets, or locked safes. RETRIEVABILITY... safeguarded in a secured environment. Buildings where records are stored have security cameras and 24-hour...
Building a gateway with open source software for secure-DICOM communication over insecure networks
NASA Astrophysics Data System (ADS)
Emmel, Dirk; Ricke, Jens; Stohlmann, Lutz; Haderer, Alexander; Felix, Roland
2002-05-01
For Teleradiology the exchange of DICOM-images is needed for several purposes. Existing solutions often don't consider about the needs for data security and data privacy. Communication is done without any encryption over insecure networks or with encryption using proprietary solutions, which reduces the data communication possibilities to partners with the same equipment. Our goal was to build a gateway, which offers a transparent solution for secure DICOM-communication in a heterogeneous environment We developed a PC-based gateway system with DICOM-communication to the in-house network and secure DICOM communication for the communication over the insecure network. One gateway installed at each location is responsible for encryption/decryption. The sender just transfers the image data over the DICOM protocol to the local gateway. The gateway forwards the data to the gateway on the destination site using the secure DICOM protocol, which is part of the DICOM standard. The receiving gateway forwards the image data to the final destination again using the DICOM-Protocol. The gateway is based on Open Source software and runs under several operating systems. Our experience shows a reliable solution, which solves security issues for DICOM communication of image data and integrates seamless into a heterogeneous DICOM environment.
2013-10-01
exchange (COBie), Building Information Modeling ( BIM ), value-added analysis, business processes, project management 16. SECURITY CLASSIFICATION OF: 17...equipment. The innovative aspect of Building In- formation Modeling ( BIM ) is that it creates a computable building descrip- tion. The ability to use a...interoperability. In order for the building information to be interoperable, it must also con- form to a common data model , or schema, that defines the class
Tsai, Feng-Jen; Lee, Howard; Fan, Victoria Y
2016-07-01
This paper aimed to compare the health systems strengthening (HSS) framework of Gavi and WHO and to analyze resource allocation in HSS by Gavi. Among 76 countries which received HSS funding from Gavi from 2006 to 2013, summary reports of 44 countries and approved proposals of 10 countries were collected. After comparing the HSS framework of WHO and Gavi, each activity described in documents was categorized according to Gavi's framework and funding allocation was analyzed. Compared with WHO's HSS framework, Gavi's has a distinctive function within the building block 'Drugs, Equipment, Supplies, Facilities' and a distinctive function of 'providing incentive and bonuses' under the building block 'Human Resource/Performance Management'. Gavi has steadily invested 10% of their total budget on HSS, but 47% were allocated in these categories, whereas 78% were for activities arguably not covered by WHO's HSS framework. In Africa, 70% of Gavi's budget fell under 'Drugs, Equipment, Supplies, Facilities' and 92.8% were for activities arguably not deemed as HSS by WHO. Gavi's HSS support emphasized inputs with short-term measurable outcomes. Harmonization of the concept of HSS and collaboration between Gavi and multilateral international agencies, such as World Bank and WHO, are needed. © The Author 2015. Published by Oxford University Press on behalf of Royal Society of Tropical Medicine and Hygiene. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Operational Management of Area Environment.
ERIC Educational Resources Information Center
Sprague, George W.
Three phases leading to the automation of the mechanical building systems on the Harvard campus are described. The systems allow a single operator to monitor and control all the mechanical systems, plus fire, flood, and security alarms, for all buildings in a large area of the campus. (JT)
15. Photocopy of photograph, 1942 (original print on file at ...
15. Photocopy of photograph, 1942 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW OF CONSTRUCTION OF BUILDING 401. NOTE PLATFORM-TYPE CONSTRUCTION. - Arlington Hall Station, Building No. 401, 4000 Arlington Boulevard, Arlington, Arlington County, VA
29. Photocopy of photograph, ca. 1930 (original print on file ...
29. Photocopy of photograph, ca. 1930 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW TO SOUTHEAST OF MAIN BUILDING OF ARLINGTON HALL JUNIOR COLLEGE. - Arlington Hall Station, Main Building, 4000 Arlington Boulevard, Arlington, Arlington County, VA
17. Photocopy of photograph, 1942 (original print on file at ...
17. Photocopy of photograph, 1942 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW TO SOUTH OF INTERIOR OF ONE OF BUILDING'S WINGS. - Arlington Hall Station, Building No. 401, 4000 Arlington Boulevard, Arlington, Arlington County, VA
2016-03-09
building human capital and institutions. As such countries as Colombia, Georgia, Romania, and South Korea improved their own governance, for example...institution-building and human capital investments, Congress might consider ways to encourage DoD to consistently prioritize activities that strengthen a
UNDERSTANDING POLLUTANT DISPERSION IN AN URBAN NEIGHBORHOOD
Work has been focused on urban air quality and homeland security issues, modeling the complex airflow patterns in cities and around buildings (e.g. the World Trade Center site in Lower Manhattan, and the Pentagon building in Washington, D.C.). These experimental studies have con...
77 FR 15003 - Passive Activity Losses and Credits Limited; Hearing
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-14
... Service Building, 1111 Constitution Avenue NW., Washington, DC 20224. Due to building security procedures, visitors must enter at the Constitution Avenue entrance. In addition, all visitors must present photo..., Internal Revenue Service, 1111 Constitution Avenue NW., Washington, DC or sent electronically via the...
Credit BG. View looking north northeast at Guard House and ...
Credit BG. View looking north northeast at Guard House and entrance to Building 4505 complex. This Guard House was built in 1993 as a portable unit; it replaced an older structure. The Building 4505 complex is surrounded by a security fence. Building 4496 appears to immediate right of view - Edwards Air Force Base, North Base, Guard House, Northeast of A Street, Boron, Kern County, CA
ERIC Educational Resources Information Center
Chipley, Michael; Lyon, Wesley; Smilowitz, Robert; Williams, Pax; Arnold, Christopher; Blewett, William; Hazen, Lee; Krimgold, Fred
2012-01-01
This publication, part of the new Building and Infrastructure Protection Series (BIPS) published by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) Infrastructure Protection and Disaster Management Division (IDD), serves to advance high performance and integrated design for buildings and infrastructure. This…
Spring Ankle with Regenerative Kinetics to Build a New Generation of Transtibial Prostheses
2008-07-31
form factor that is portable to the wearer. The objective is to build a transtibial prosthesis that will support a Military amputee’s return to...active duty. 15. SUBJECT TERMS Transtibial Prosthesis , regenerative, spring, wearable robot 16. SECURITY CLASSIFICATION OF: 17. LIMITATION...Regenerative Kinetics” to build a new generation of transtibial prostheses Keywords: Transtibial Prosthesis , regenerative, spring, wearable robot
On a Family of Multivariate Modified Humbert Polynomials
Aktaş, Rabia; Erkuş-Duman, Esra
2013-01-01
This paper attempts to present a multivariable extension of generalized Humbert polynomials. The results obtained here include various families of multilinear and multilateral generating functions, miscellaneous properties, and also some special cases for these multivariable polynomials. PMID:23935411
Brolan, Claire E; Hill, Peter S
2016-01-01
In 2001, technocrats from four multilateral organizations selected the Millennium Development Goals mainly from the previous decade of United Nations (UN) summits and conferences. Few accounts are available of that significant yet cloistered synthesis process: none contemporaneous. In contrast, this study examines health’s evolving location in the first-phase of the next iteration of global development goal negotiation for the post-2015 era, through the synchronous perspectives of representatives of key multilateral and related organizations. As part of the Go4Health Project, in-depth interviews were conducted in mid-2013 with 57 professionals working on health and the post-2015 agenda within multilaterals and related agencies. Using discourse analysis, this article reports the results and analysis of a Universal Health Coverage (UHC) theme: contextualizing UHC’s positioning within the post-2015 agenda-setting process immediately after the Global Thematic Consultation on Health and High-Level Panel of Eminent Persons on the Post-2015 Development Agenda (High-Level Panel) released their post-2015 health and development goal aspirations in April and May 2013, respectively. After the findings from the interview data analysis are presented, the Results will be discussed drawing on Shiffman and Smith (Generation of political priority for global health initiatives: a framework and case study of maternal mortality. The Lancet 2007; 370: 1370–79) agenda-setting analytical framework (examining ideas, issues, actors and political context), modified by Benzian et al. (2011). Although more participants support the High-Level Panel’s May 2013 report’s proposal—‘Ensure Healthy Lives’—as the next umbrella health goal, they nevertheless still emphasize the need for UHC to achieve this and thus be incorporated as part of its trajectory. Despite UHC’s conceptual ambiguity and cursory mention in the High-Level Panel report, its proponents suggest its re-emergence will occur in forthcoming State led post-2015 negotiations. However, the final post-2015 SDG framework for UN General Assembly endorsement in September 2015 confirms UHC’s continued distillation in negotiations, as UHC ultimately became one of a litany of targets within the proposed global health goal. PMID:26494847
78 FR 29147 - Federal Property Suitable as Facilities To Assist the Homeless
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
...: Excess Comments: off-site removal only; 9,822 sf.; BDE HQ; repairs needed; asbestos; secured area....; Admin.; repairs needed; asbestos; secured area; contact Army for access/removal requirements Building...: Excess Comments: off-site removal only; 15,484 sf.; Admin.; 4 months vacant; repairs needed; asbestos...
77 FR 12353 - Shipping Coordinating Committee; Notice of Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-29
...); Provision of financial security in cases of abandonment, personal injury to, or death of seafarers related to entry into force of the International Labour Organization Maritime Labour Convention, 2006; Fair... to the seating capacity of the room. To facilitate the building security process, and to request...
Is Your Center Burglar/Vandal Proofed? Guidelines for Protecting Your Center.
ERIC Educational Resources Information Center
Adams, Shawn
1998-01-01
Identifies specific steps that child care centers can take to reduce the chances of burglary and vandalism. Differentiates loss prevention, loss control, and risk financing. Includes discussion of layering defenses, perimeter protection, security lighting, building surface security, locks, and alarm systems. Discusses the importance of reducing…
49 CFR 178.75 - Specifications for MEGCs.
Code of Federal Regulations, 2010 CFR
2010-10-01
... be designed and constructed with supports to provide a secure base during transport and with lifting... pressure build-up. (iv) The main isolation valves on a MEGC must be clearly marked to indicate their... constructed with a support structure to provide a secure base during transport. MEGCs must be protected...
49 CFR 178.75 - Specifications for MEGCs.
Code of Federal Regulations, 2011 CFR
2011-10-01
... be designed and constructed with supports to provide a secure base during transport and with lifting... pressure build-up. (iv) The main isolation valves on a MEGC must be clearly marked to indicate their... constructed with a support structure to provide a secure base during transport. MEGCs must be protected...
Moving Secure Software Assurance into Higher Education: A Roadmap for Change
2011-06-02
Summarized: The Issue: 6/2/20118 Software defects are currently a fact of life Software defects are avenues of security vulnerabilities that cyber ... criminals , terrorists, or hostile nations can exploit. We (THE ENTIRE INDUSTY) need to change the way we build systems Decrease the number of defects
7 CFR 3560.103 - Maintaining housing projects.
Code of Federal Regulations, 2011 CFR
2011-01-01
... common areas, must be free of trash, litter, and debris. Public walkways, walls of buildings and common... lighting and functional interior lighting in common areas which permits safe access and security. (ix... coverings that are intact, securely attached, and in good condition. Brick veneers must be free of missing...
75 FR 6416 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-09
... Securities and Exchange Commission (``Commission'') has submitted to the Office of Management and Budget this... Regulatory Affairs, Office of Management and Budget, Room 10102, New Executive Office Building, Washington... to register securities that are offered for cash upon the exercise of rights that are granted to a...
Central Libraries in Uncertain Times.
ERIC Educational Resources Information Center
Kenney, Brian J.
2001-01-01
Discusses security and safety issues for public libraries, especially high-profile central facilities, in light of the September 11 terrorist attacks. Highlights include inspecting bags as patrons enter as well as exit; the need for security guidelines for any type of disaster or emergency; building design; and the importance of communication.…
NASA Technical Reports Server (NTRS)
Barnett, Traci M.
2004-01-01
Safety and security is very important at NASA. The Security Management and Safeguards Office goal is ensure safety and security for all NASA Lewis and Plum Brook Station visitors and workers. The office protects against theft, sabotage, malicious damage, espionage, and other threats or acts of violence. There are three types of security at NASA: physical, IT, and personnel. IT is concerned with sensitive and classified information and computers. Physical security includes the officers who check visitors and workers in and patrol the facility. Personnel security is concerned with background checks during hiring. During my internship, I met people from and gained knowledge about all three types of security. I primarily worked with Dr. Richard Soppet in physical security. During my experience with physical security, I observed and worked with many aspects of it. I attended various security meetings at both NASA Lewis and Plum Brook. The meetings were about homeland security and other improvements that will be made to both facilities. I also spent time with a locksmith. The locksmith makes copies of keys and unlocks doors for people who need them. I rode around in a security vehicle with an officer as he patrolled. I also observed the officer make a search of a visitor s vehicle. All visitors vehicles are searched upon entering NASA. I spent time and observed in the dispatch office. The officer answers calls and sends out officers when needed. The officer also monitors the security cameras. My primary task was completing an emergency response manual. This manual would assist local law enforcement and fire agencies in case of an emergency. The manual has pictures and descriptions of the buildings. It also contains the information about hazards inside of the buildings. This information will be very helpul to law enforcement so that when called upon during an emergency, they will not create an even bigger problem with collateral damage.
Novel technology for enhanced security and trust in communication networks
NASA Astrophysics Data System (ADS)
Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit; Jannson, Tomasz
2011-06-01
A novel technology that significantly enhances security and trust in wireless and wired communication networks has been developed. It is based on integration of a novel encryption mechanism and novel data packet structure with enhanced security tools. This novel data packet structure results in an unprecedented level of security and trust, while at the same time reducing power consumption and computing/communication overhead in networks. As a result, networks are provided with protection against intrusion, exploitation, and cyber attacks and posses self-building, self-awareness, self-configuring, self-healing, and self-protecting intelligence.
2007-12-01
Media Issues in Combating Terrorism • International Approaches • Ethics and Combating Terrorism • Restructuring the Security Sector for...Terrorism • Organized Crime and Terrorism • Civil-Military Cooperation and Terrorism • Ethics and Combating Terrorism • Border Control • Consequence...Simon. “Confl ict, Ecology and the Politics of Envrionmental Security.” Global Environmental Politics 2, No. 4 (November 2002): pp 25-130. 28
Governance: The Mission Ingredient in Security Cooperation
2017-06-09
assistance guiding principle of “do-no-harm,” should be included in the future DOS guidance. Seven do-no-harm lessons include: (1) norms and... principle of “do-no-harm.” 15. SUBJECT TERMS Security cooperation, security assistance, defense institution building, USAID, best practices...foreign assistance guiding principle of “do-no-harm,” should be included in the future DOS guidance. Seven do-no-harm lessons include: (1) norms and
Chemistry in a Large, Multidisciplinary Laboratory.
ERIC Educational Resources Information Center
Lingren, Wesley E.; Hughson, Robert C.
1982-01-01
Describes a science facility built at Seattle Pacific University for approximately 70 percent of the capital cost of a conventional science building. The building serves seven disciplines on a regular basis. The operation of the multidisciplinary laboratory, special features, laboratory security, and student experience/reactions are highlighted.…
Improving School Access Control
ERIC Educational Resources Information Center
National Clearinghouse for Educational Facilities, 2008
2008-01-01
Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…
Europe’s Role in Nation-Building: From the Balkans to the Congo
2008-01-01
for nonmilitary international actors; thus, Con- cordia was primarily a confidence-building and liaison mission.22 As the EU’s first military mission...for security-sector reform. Con- cordia field teams collected intelligence from several sources, supported the police retraining and integration
27 CFR 19.189 - Identification of structures, areas, apparatus, and equipment.
Code of Federal Regulations, 2011 CFR
2011-04-01
... structures, areas, apparatus, and equipment. 19.189 Section 19.189 Alcohol, Tobacco Products and Firearms... Construction, Equipment, and Security Requirements Other Plant Requirements § 19.189 Identification of structures, areas, apparatus, and equipment. (a) Buildings. The proprietor must mark each building at a...
Wickerhamiella van der Walt (1973)
USDA-ARS?s Scientific Manuscript database
This chapter describes the ascomycetous yeast genus Wickerhamiella, which has five described species and has been defined from multigene deoxyribonucleic acid (DNA) sequence analysis. The species reproduce by multilateral budding but do not form hyphae or pseudohyphae. Asci typically form a single a...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-12
... its salt, ester or hydrate form; or chemical intermediates intended for the manufacture of... salt, ester or hydrate forms of an INN active ingredient should state a rationale for the nomination...
NASA Technical Reports Server (NTRS)
Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)
1995-01-01
With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.
2009-01-01
surfaces in buildings following a terrorist attack using CB agents. Vaporized hydrogen peroxide ( VHP ) and Cl02 are decontamination technologies that...decontaminant. The focus of this technical report is the evaluation of the building interior materials and the Steris VHP technology. 15. SUBJECT...TERMS Material Compatibility VHP vaporized hydrogen peroxide 16. SECURITY CLASSIFICATION OF: a. REPORT U b. ABSTRACT U c. THIS PAGE U 17
Capacity building in indigenous men's groups and sheds across Australia.
Southcombe, Amie; Cavanagh, Jillian; Bartram, Timothy
2015-09-01
This article presents an investigation into capacity building, at the community level, in Aboriginal and Torres Strait Islander Men's Groups and Sheds. As safe men's spaces, Men's Groups and Sheds represent an ever-growing social, and health and well-being community service across Australia. The study is qualitative and employs 'yarning circles' (focus groups), semi-structured interviews and observations to gather data from 15 Groups/Sheds involving 45 men from urban, regional and remote communities. We found that capacity building is primarily about securing relationships between Group Leaders/Shed Co-ordinators and Government services. Capacity building establishes links to services such as Centrelink, Medicare, Department of Housing, Probation and Control, and positive outcomes such as Indigenous men securing housing and Centrelink payments. Capacity building results in better health outcomes and, educates and empowers men to improve their social, cultural, emotional and economic well-being. It helps men to better connect with family and community. The current research paves the way for countries worldwide to explore the conceptual and empirical approach of capacity building applicable to other Indigenous [and non-Indigenous] Men's Groups/Sheds. We recommend feasibilities studies, on approaches to capacity building in Indigenous Groups/Sheds, be carried out within urban, regional and remote regions across the country. © The Author (2014). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Transaction-based building controls framework, Volume 2: Platform descriptive model and requirements
DOE Office of Scientific and Technical Information (OSTI.GOV)
Akyol, Bora A.; Haack, Jereme N.; Carpenter, Brandon J.
Transaction-based Building Controls (TBC) offer a control systems platform that provides an agent execution environment that meets the growing requirements for security, resource utilization, and reliability. This report outlines the requirements for a platform to meet these needs and describes an illustrative/exemplary implementation.
50 CFR 86.20 - What activities are eligible for funding?
Code of Federal Regulations, 2011 CFR
2011-10-01
... or privately owned boating infrastructure tie-up facilities. To be eligible you must: (1) Build these... nontrailerable recreational vessels; (3) Build these tie-up facilities in water deep enough for nontrailerable... fluctuation); (4) Provide security, safety, and service for these boats; and, (5) Install a pumpout station...
50 CFR 86.20 - What activities are eligible for funding?
Code of Federal Regulations, 2012 CFR
2012-10-01
... or privately owned boating infrastructure tie-up facilities. To be eligible you must: (1) Build these... nontrailerable recreational vessels; (3) Build these tie-up facilities in water deep enough for nontrailerable... fluctuation); (4) Provide security, safety, and service for these boats; and, (5) Install a pumpout station...
50 CFR 86.20 - What activities are eligible for funding?
Code of Federal Regulations, 2013 CFR
2013-10-01
... publicly or privately owned boating infrastructure tie-up facilities. To be eligible you must: (1) Build... transient nontrailerable recreational vessels; (3) Build these tie-up facilities in water deep enough for... of lowest fluctuation); (4) Provide security, safety, and service for these boats; and, (5) Install a...
12. Interior view of reception and secretarial space for legal ...
12. Interior view of reception and secretarial space for legal offices; showing wall mounted shelving and exterior window; center and south side of main section of building on top floor; view to southwest. - Ellsworth Air Force Base, Group Administration & Secure Storage Building, 2372 Westover Avenue, Blackhawk, Meade County, SD
12. Photocopy of photograph, 1932 (original print on file at ...
12. Photocopy of photograph, 1932 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). WIDE ANGLE OVERALL VIEW TO SOUTHWEST OF ARLINGTON HALL JUNIOR COLLEGE SHOWING MAIN BUILDING (BUILDING 1) AND POND. - Arlington Hall Station, 4000 Arlington Boulevard, Arlington, Arlington County, VA
31. Photocopy of photograph, ca. 1930 (original print on file ...
31. Photocopy of photograph, ca. 1930 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW TO NORTH OF SOUTH REAR OF MAIN BUILDING OF ARLINGTON HALL JUNIOR COLLEGE. - Arlington Hall Station, Main Building, 4000 Arlington Boulevard, Arlington, Arlington County, VA
11. Photocopy of photograph, ca. 1928 (original print on file ...
11. Photocopy of photograph, ca. 1928 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). OVERALL VIEW TO SOUTHWEST OF ARLINGTON HALL JUNIOR COLLEGE SHOWING POND AND MAIN BUILDING (BUILDING 1). - Arlington Hall Station, 4000 Arlington Boulevard, Arlington, Arlington County, VA
77 FR 67342 - North Pacific Fishery Management Council; Public Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-09
... . Please note that State or Federal ID will be required to enter the Federal Building in Juneau. Foreign... expedite security clearance at the Federal Building in Juneau. Additional information is posted on the.... Thompson, Acting Deputy Director, Office of Sustainable Fisheries, National Marine Fisheries Service. [FR...
77 FR 49781 - North Pacific Fishery Management Council; Public Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-17
.... AST. ADDRESSES: The meeting will be held in the 4th floor conference room at the Federal Building at... expedite security clearance at the Federal Building in Juneau. This public meeting will occur during the... 14, 2012. Tracey L. Thompson, Acting Deputy Director, Office of Sustainable Fisheries, National...
ERIC Educational Resources Information Center
Schwartz, Edward
The purpose of this eight-unit course is to explore the values and issues of modern urban neighborhoods. It focuses on how community leaders can apply the broad principle of justice to problems of security, reciprocity, and fellowship that face most neighborhoods today. The course is intended for use by community leaders in building community…
3 CFR 8672 - Proclamation 8672 of May 9, 2011. National Building Safety Month, 2011
Code of Federal Regulations, 2012 CFR
2012-01-01
... public and private sectors—to implement effective standards and codes that sustain safe and resilient structures. We need innovation and partnerships at all levels of society to develop transformative... Proclamation Building safety is a critical component of our homeland security, our personal and public safety...
23. Interior view of entrance corridor looking towards main stairway; ...
23. Interior view of entrance corridor looking towards main stairway; showing unoccupied corner office space and encased bulletin boards; center of main section of building on main floor; view to northeast. - Ellsworth Air Force Base, Group Administration & Secure Storage Building, 2372 Westover Avenue, Blackhawk, Meade County, SD
78 FR 26217 - National Building Safety Month, 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-03
... Building Safety Month, 2013 By the President of the United States of America A Proclamation When natural.... This month, as we pay tribute to professionals who design, construct, and secure our infrastructure... standards. This month, we take up those tasks once more and recommit to safety in the year ahead. NOW...
Positive Approaches to Preventing School Violence: Peace Building in Schools and Communities.
ERIC Educational Resources Information Center
Plucker, Jonathan A.
2000-01-01
Violence-prevention measures at railroad crossings may not work at schools! This special issue highlights three approaches to dealing with youth violence: prevention (peace building); intervention (peace making); and security (peace keeping). The problem stems from incivility, lack of respect, and unconstructive communication. Diverse perspectives…
19 CFR 10.602 - Packing materials and containers for shipment.
Code of Federal Regulations, 2010 CFR
2010-04-01
...-Central America-United States Free Trade Agreement Rules of Origin § 10.602 Packing materials and....602 Section 10.602 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... into the United States. Accordingly, in applying the build-down, build-up, or net cost method for...
Protection of electronic health records (EHRs) in cloud.
Alabdulatif, Abdulatif; Khalil, Ibrahim; Mai, Vu
2013-01-01
EHR technology has come into widespread use and has attracted attention in healthcare institutions as well as in research. Cloud services are used to build efficient EHR systems and obtain the greatest benefits of EHR implementation. Many issues relating to building an ideal EHR system in the cloud, especially the tradeoff between flexibility and security, have recently surfaced. The privacy of patient records in cloud platforms is still a point of contention. In this research, we are going to improve the management of access control by restricting participants' access through the use of distinct encrypted parameters for each participant in the cloud-based database. Also, we implement and improve an existing secure index search algorithm to enhance the efficiency of information control and flow through a cloud-based EHR system. At the final stage, we contribute to the design of reliable, flexible and secure access control, enabling quick access to EHR information.
Building a strategic security organisation.
Howard, Mike
2016-01-01
In everyone's day-to-day jobs there is constant need to deal with current and newly detected matters. This is now a world of immediacy, driven by the cadence of the business and its needs. These concerns should not be ignored, as failing to deal with these issues would not bode well for the future. It is essential that the gears are kept spinning. The challenge for any security organisation is to identify its short-term tactical requirements, while developing longer-term strategic needs. Once done, the differences can be accounted for and strides can be made toward a desired future state. This paper highlights several steps that the author and his team have taken in their own journey. There is no magic answer, each organisation will have its own unique challenges. Nevertheless, some of the approaches to building a strategic security organisation described in this paper are applicable to all organisations, irrespective of their size.
Tappero, Jordan W; Cassell, Cynthia H; Bunnell, Rebecca E; Angulo, Frederick J; Craig, Allen; Pesik, Nicki; Dahl, Benjamin A; Ijaz, Kashef; Jafari, Hamid; Martin, Rebecca
2017-12-01
To achieve compliance with the revised World Health Organization International Health Regulations (IHR 2005), countries must be able to rapidly prevent, detect, and respond to public health threats. Most nations, however, remain unprepared to manage and control complex health emergencies, whether due to natural disasters, emerging infectious disease outbreaks, or the inadvertent or intentional release of highly pathogenic organisms. The US Centers for Disease Control and Prevention (CDC) works with countries and partners to build and strengthen global health security preparedness so they can quickly respond to public health crises. This report highlights selected CDC global health protection platform accomplishments that help mitigate global health threats and build core, cross-cutting capacity to identify and contain disease outbreaks at their source. CDC contributions support country efforts to achieve IHR 2005 compliance, contribute to the international framework for countering infectious disease crises, and enhance health security for Americans and populations around the world.
Shao, Chaofeng; Tian, Xiaogang; Guan, Yang; Ju, Meiting; Xie, Qiang
2013-05-21
Selecting indicators based on the characteristics and development trends of a given study area is essential for building a framework for assessing urban ecological security. However, few studies have focused on how to select the representative indicators systematically, and quantitative research is lacking. We developed an innovative quantitative modeling approach called the grey dynamic hierarchy analytic system (GDHAS) for both the procedures of indicator selection and quantitative assessment of urban ecological security. Next, a systematic methodology based on the GDHAS is developed to assess urban ecological security comprehensively and dynamically. This assessment includes indicator selection, driving force-pressure-state-impact-response (DPSIR) framework building, and quantitative evaluation. We applied this systematic methodology to assess the urban ecological security of Tianjin, which is a typical coastal super megalopolis and the industry base in China. This case study highlights the key features of our approach. First, 39 representative indicators are selected for the evaluation index system from 62 alternative ones available through the GDHAS. Second, the DPSIR framework is established based on the indicators selected, and the quantitative assessment of the eco-security of Tianjin is conducted. The results illustrate the following: urban ecological security of Tianjin in 2008 was in alert level but not very stable; the driving force and pressure subsystems were in good condition, but the eco-security levels of the remainder of the subsystems were relatively low; the pressure subsystem was the key to urban ecological security; and 10 indicators are defined as the key indicators for five subsystems. These results can be used as the basis for urban eco-environmental management.
Shao, Chaofeng; Tian, Xiaogang; Guan, Yang; Ju, Meiting; Xie, Qiang
2013-01-01
Selecting indicators based on the characteristics and development trends of a given study area is essential for building a framework for assessing urban ecological security. However, few studies have focused on how to select the representative indicators systematically, and quantitative research is lacking. We developed an innovative quantitative modeling approach called the grey dynamic hierarchy analytic system (GDHAS) for both the procedures of indicator selection and quantitative assessment of urban ecological security. Next, a systematic methodology based on the GDHAS is developed to assess urban ecological security comprehensively and dynamically. This assessment includes indicator selection, driving force-pressure-state-impact-response (DPSIR) framework building, and quantitative evaluation. We applied this systematic methodology to assess the urban ecological security of Tianjin, which is a typical coastal super megalopolis and the industry base in China. This case study highlights the key features of our approach. First, 39 representative indicators are selected for the evaluation index system from 62 alternative ones available through the GDHAS. Second, the DPSIR framework is established based on the indicators selected, and the quantitative assessment of the eco-security of Tianjin is conducted. The results illustrate the following: urban ecological security of Tianjin in 2008 was in alert level but not very stable; the driving force and pressure subsystems were in good condition, but the eco-security levels of the remainder of the subsystems were relatively low; the pressure subsystem was the key to urban ecological security; and 10 indicators are defined as the key indicators for five subsystems. These results can be used as the basis for urban eco-environmental management. PMID:23698700
2014-05-22
capacity of several Oil Coast nations through building accountable institutions, 56William Brownfield , Assistant Security of State for International...Maturation of a New U.S. Combatant Command. Carlisle, PA: Strategic Studies Institute, 2013. Brownfield , William. Assistant Security of State for
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-21
... DEPARTMENT OF COMMERCE Bureau of Industry and Security President's Export Council; Subcommittee on... Administration (PECSEA) will meet on June 4, 2013, 9:30 a.m. (pacific daylight time), at Boeing Defense, Space and Security, Space and Intelligence Systems, Building S24, Conference Center, 2020 East Imperial...
Cybersecurity Education: Bridging the Gap between Hardware and Software Domains
ERIC Educational Resources Information Center
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher
2014-01-01
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
16 CFR 802.64 - Acquisitions of voting securities by certain institutional investors.
Code of Federal Regulations, 2010 CFR
2010-01-01
... building and loan company or association; (4) Trust company; (5) Insurance company; (6) Investment company registered with the U.S. Securities and Exchange Commission under the Investment Company Act of 1940 (15 U.S...) or (a)(5); (9) Small Business Investment Company or Minority Enterprise Small Business Investment...
16 CFR 802.64 - Acquisitions of voting securities by certain institutional investors.
Code of Federal Regulations, 2011 CFR
2011-01-01
... building and loan company or association; (4) Trust company; (5) Insurance company; (6) Investment company registered with the U.S. Securities and Exchange Commission under the Investment Company Act of 1940 (15 U.S...) or (a)(5); (9) Small Business Investment Company or Minority Enterprise Small Business Investment...
Well Played: The Origins and Future of Playfulness
ERIC Educational Resources Information Center
Gordon, Gwen
2014-01-01
In this article, the author synthesizes research from several disciplines to shed light on play's central role in healthy development. Gordon builds on research in attachment theory that correlates secure attachment in infancy with adult well-being to demonstrate how playfulness might be a lifelong outcome of secure attachment and a primary…
Design and Emergence of a Pedagogical Online Infosec Laboratory as an Ensemble Artefact
ERIC Educational Resources Information Center
Iqbal, Sarfraz
2016-01-01
Information security (InfoSec) education becomes increasingly important. Building hands-on capabilities to tackle challenges is a precondition to mitigate and eliminate cyber threats. Existing studies, however, show that the field lacks pedagogically founded information security laboratories that can be used flexibly to educate both on-campus and…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-24
... focuses on the unique aspects of nuclear safety and security and highlights the Commission's expectations... safety culture and (2) high level descriptions or traits of areas important to safety culture. The... NRC headquarters. Please allow time at both locations to register with building security upon entering...
Safeguarding Your Technology: Practical Guidelines for Electronic Education Information Security.
ERIC Educational Resources Information Center
Szuba, Tom
This guide was developed specifically for educational administrators at the building, campus, district, system, and state levels, and is meant to serve as a framework to help them better understand why and how to effectively secure their organization's information, software, and computer and networking equipment. This document is organized into 10…
Code of Federal Regulations, 2010 CFR
2010-04-01
...) Fire safety system; (vii) Security system; and (viii) Roof, foundation, walls, floors. (12) Unscheduled...) Monitoring and preventive maintenance of building structures and systems, including but not limited to: (i..., repainting); (14) Security services; (15) Management fees; and (16) Other reasonable and necessary operation...
ERIC Educational Resources Information Center
Grossman, Michael; Schortgen, Francis
2016-01-01
This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…
Analysis Of Using Firewall And Single Honeypot In Training Attack On Wireless Network
NASA Astrophysics Data System (ADS)
Mohd. Diansyah, Tengku.; Faisal, Ilham; Perdana, Adidtya; Octaviani Sembiring, Boni; Hidayati Sinaga, Tantri
2017-12-01
Security issues become one of the important aspects of a network, especially a network security on the server. These problems underlie the need to build a system that can detect threats from parties who do not have access rights (hackers) that are by building a security system honeypot. A Honeypot is a diversion of intruders' attention, in order for intruders to think that it has managed to break down and retrieve data from a network, when in fact the data is not important and the location is isolated. A way to trap or deny unauthorized use of effort in an information system. One type of honeypot is honeyd. Honeyd is a low interaction honeypot that has a smaller risk compared to high interaction types because the interaction with the honeypot does not directly involve the real system. The purpose of the implementation of honeypot and firewall, firewall is used on Mikrotik. Can be used as an administrative tool to view reports of Honeyd generated activity and administrators can also view reports that are stored in the logs in order to assist in determining network security policies.
Implementing a High-Assurance Smart-Card OS
NASA Astrophysics Data System (ADS)
Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.
Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.
Homeland security challenges in nursing practice.
Boatright, Connie; McGlown, K Joanne
2005-09-01
Nurses need a comprehensive knowledge of doctrine, laws, regulations,programs, and processes that build the operational framework for health care preparedness. Key components of this knowledge base reside in the areas of: evolution of homeland security: laws and mandates affecting health care and compliance and regulatory issues for health care organizations. This article addresses primary components in both of these areas, after first assessing the status of nursing's involvement (in homeland security), as portrayed in the professional literature.
Unlocking User-Centered Design Methods for Building Cyber Security Visualizations
2015-08-07
have rarely linked these methods to a final, deployed tool. Goodall et al. interviewed analysts to derive requirements for a network security tool [14... Goodall , W. Lutters, and A. Komlodi. The work of intrusion detec- tion: rethinking the role of security analysts. AMCIS 2004 Proceed- ings, 2004. [14] J. R... Goodall , A. A. Ozok, W. G. Lutters, P. Rheingans, and A. Kom- lodi. A user-centered approach to visualizing network traffic for intru- sion
Building Better Armies: An Insider’s Account of Liberia
2013-11-01
penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE NOV 2013 2... inform different ideas about security may not easily translate into a coherent and actionable national se- curity strategy. The human security perspective...and relevance, and by support- 17 ing the creation of a balanced and effective security sector, informed by a clear understanding of its objec- tives
Stand Up and Be Counted: The Continuing Challenge of Building the Iraqi Security Forces
2007-01-01
forces in conjunction with neutralizing Iraq’s insurgency and developing Iraqi forces capable of securing the country . From the fall of 2003...effort to develop the Iraqi Security Forces (ISF), we cannot assess the operational capability of these forces. We are actually left with more...First we trained the army for threats from outside the country . But we realized the true threats were inside the country …. It’s the Iraqis
US-LA CRN Clinical Cancer Research in Latin America
The United States – Latin America Cancer Research Network (US-LA CRN) convened its Annual Meeting, in coordination with the Ministry of Health of Chile to discuss the Network’s first multilateral clinical research study: Molecular Profiling of Breast Cancer (MPBC).
Success through Inattention in School Administration and Elsewhere.
ERIC Educational Resources Information Center
Lindblom, Charles E.
1994-01-01
Examines two ways of achieving social coordination: unilateral/hierarchical controls and multilateral controls. Discusses advantages of using mutual adjustment as an alternative to central coordination. Mutual adjustment occurs variously through language creation, moral codes, biological self-selection, market systems, and politics. Although…
DOT National Transportation Integrated Search
1974-02-17
A number of satellite system techniques have been suggested as candidates to provide ATC surveillance, communication, and/or navigation service over CONUS. All techniques determine the aircraft positions by multilateration based on the arrival times ...
TCBMs over the military use of outer space
NASA Astrophysics Data System (ADS)
Takaya-Umehara, Yuri
2010-11-01
Although no legal instrument resulted from long negotiations in the UN and Conference on Disarmament (CD), the application of confidence-building measures (CBMs) that was once considered in the 1990's attracted attention again to restrict military use of outer space. Since 2005, the concept of "Transparency and confidence-building measures (TCBMs)" entered into the lexicon of space law to explore the possibility of reinforcing security in outer space activities. While CBMs have been developed and applied to treaty-based verification mechanisms, the introduction of TCBMs in space law needs further examination to fit in the context of space security. Therefore, by evaluating the function of CBMs applied to the existing law on disarmament and arms control, the author examines the application of TCBMs to space law and calls for the need to establish non-treaty-based monitoring mechanisms for transparency and confidence-building in outer space activities.
Royall, Julia; Bennett, Mark; van Schayk, Ingeborg; Alilio, Martin
2004-08-01
"When spider webs unite, they can tie up a lion" (Ethiopian folk adage). The Multilateral Initiative on Malaria Communications Network (MIMCom) facilitates a new way of doing research in Africa and African scientists' participation in the international scientific community. The MIMCom supports full access to the Internet and the resources of the WorldWide Web at 19 research sites in 11 African countries. Furthermore, the MIMCom project comprises two websites: one includes links to resources, databases, and publications as well as a document delivery service for full text journal articles, and the other is a research agenda specific website with a server for a research network desiring to share raw data. Other important components of MIMCom are training and evaluation components. The MIMCom was conceived in 1997 by African researchers and has been designed, implemented, and overseen by the U.S. National Library of Medicine in collaboration with partners in Africa, the United States, and the United Kingdom. This project demonstrates clearly that it can make a positive difference in the functioning of remote research sites in Africa, in terms of site growth and productivity and in the professional lives of individual researchers. This report reviews the project's background, methods of operation with an emphasis on local needs and priorities, cost effectiveness, and local responsibility; results focusing on a technical network; documentation of the system and two-way exchange of information; the MIMCom website; a network approach to research; and financial sustainability. The report concludes with summaries of evaluations by an independent panel, the Multilateral Initiative on Malaria Secretariat, and the U.S. National Library of Medicine. Copyright 2004 The American Society of Tropical Medicine and Hygiene
Type II Forward Storage Site Facilities: POMCUS System. Volume 2.
1980-09-01
shall be PROVIDED. (2) b. 4.14.2 Gas-tight,solid, non- combustible partitions will be used to separate oxygen and other combustion supporting gases from...buildings responsive to POMCUS activities; especially, 1) adequate insulation for temperature controlled buildings, 2) structural adequacy for lift...4.6.1 A building for storage of rations will be PROVIDED for a secured ready supply of meals for combat ( MCI ). This allows MCI replenishment as needed
Oslo Ministerial Declaration--global health: a pressing foreign policy issue of our time.
2007-04-21
Under their initiative on Global Health and Foreign Policy, launched in September, 2006, in New York, the Ministers of Foreign Affairs of Brazil, France, Indonesia, Norway, Senegal, South Africa, and Thailand issued the following statement in Oslo on March 20, 2007-In today's era of globalisation and interdependence there is an urgent need to broaden the scope of foreign policy. Together, we face a number of pressing challenges that require concerted responses and collaborative efforts. We must encourage new ideas, seek and develop new partnerships and mechanisms, and create new paradigms of cooperation. We believe that health is one of the most important, yet still broadly neglected, long-term foreign policy issues of our time. Life and health are our most precious assets. There is a growing awareness that investment in health is fundamental to economic growth and development. It is generally acknowledged that threats to health may compromise a country's stability and security. We believe that health as a foreign policy issue needs a stronger strategic focus on the international agenda. We have therefore agreed to make impact on health a point of departure and a defining lens that each of our countries will use to examine key elements of foreign policy and development strategies, and to engage in a dialogue on how to deal with policy options from this perspective. As Ministers of Foreign Affairs, we will work to: increase awareness of our common vulnerability in the face of health threats by bringing health issues more strongly into the arenas of foreign policy discussions and decisions, in order to strengthen our commitment to concerted action at the global level; build bilateral, regional and multilateral cooperation for global health security by strengthening the case for collaboration and brokering broad agreement, accountability, and action; reinforce health as a key element in strategies for development and for fighting poverty, in order to reach the Millennium Development Goals; ensure that a higher priority is given to health in dealing with trade issues and in conforming to the Doha principles, affirming the right of each country to make full use of TRIPS flexibilities in order to ensure universal access to medicines; strengthen the place of health measures in conflict and crisis management and in reconstruction efforts. For this purpose, we have prepared a first set of actionable steps for raising the priority of health in foreign policy in an Agenda for Action. We pledge to pursue these issues in our respective regional settings and in relevant international bodies. We invite Ministers of Foreign Affairs from all regions to join us in further exploring ways and means to achieve our objectives.
2016-10-27
This archival image was released as part of a gallery comparing JPL's past and present, commemorating the 80th anniversary of NASA's Jet Propulsion Laboratory on Oct. 31, 2016. The Administration Building of NASA's Jet Propulsion Laboratory (Building 180) is pictured in January 1965. What appears as a parking lot in this photograph later becomes "The Mall", a landscaped open-air gathering place. A small security control post can be seen at the left of the 1965 image. And Building 167, one of the lab's cafeterias, is on the right. http://photojournal.jpl.nasa.gov/catalog/PIA21121
Building Toxic Metal Characterization and Decontamination Report: Area 6, Building 914
DOE Office of Scientific and Technical Information (OSTI.GOV)
NSTec Industrial Hygiene
2011-08-15
The purpose of this report is to outline the toxic metal characterization and decontamination efforts in Area 6, Building 914. This includes the initial building inspection, the hotspot sampling, results/findings, building cleanup, and the verification sampling. Building 914 is a steel light frame building that was constructed in 1992. It is about 16,454 square feet, and five employees are assigned to this building. According to the building's floor plan blueprints, it could be inferred that this building was once a Wiremen/Lineman shop. In 2002-2004, the National Nuclear Security Administration Nevada Site Office embarked on a broad characterization of beryllium (Be)more » surface concentrations throughout the North Las Vegas Facility, the Nevada National Security Site (NNSS), and ancillary facilities like the Special Technologies Laboratory, Remote Sensing Laboratory, etc. Building 914 was part of this characterization. The results of the 2002 study illustrated that the metal housekeeping limits were within acceptable limits and from a Be standpoint, the building was determined to be fit for occupancy. On March 2, 2011, based on a request from Building 914 users, National Security Technologies, LLC (NSTec) Industrial Hygiene (IH) collected bulk samples from the southwest corner of Building 914 at heights above 6 feet where black dust had been noticed on this particular wall. IH conducted surface swipe sampling of the area and analyzed the samples for toxic metals, namely, beryllium (Be), cadmium (Cd), chromium (Cr), lead (Pb), and manganese (Mn). The sample results indicated values two to four times above the housekeeping threshold for Be, Cd, Cr, Pb, and Mn. Subsequently, the facility was closed and posted; the necessary personnel were notified; and controls were instituted for ingress and egress of the building. On March 17, 2011, IH performed an extensive sampling event involving the entire warehouse in accordance with NSTec Organization Procedure OP-P250.004, Sampling Procedures. Analysis of the results from this exercise illustrated that toxic metal contamination was ubiquitous throughout the warehouse section of this building but did not extend into the office, restroom, and break room areas. On March 22, 2011, a planning meeting was held with Environment, Safety, Health & Quality management; Operations & Infrastructure (O&I) mangement; Facility Management; Occupational Medicine; O&I Operations; and IH. After a brief discussion concerning the salient facts of the surface sample results, it was agreed that the facility and its contents required cleaning. The facility would then be re-sampled to verify cleanliness and suitability for re-occupancy. On April 18, 2011, warehouse cleanup activites began. On July 5, 2011, upon receipt of the results from the last cleaned section, the cleanup operations were concluded. The building was statistically determined to be clean; thus, it could be reoccupied and the warehouse operations could resume immediately.« less
Computer security: a necessary element of integrated information systems.
Butzen, F; Furler, F
1986-01-01
The Matheson Report sees the medical library as playing a key role in a network of interlocking information bases that will extend from central repositories of medical information to each physician's personal records. It appears, however, that the role of security in this vision has not been fully delineated. This paper discusses problems in maintaining the security of confidential medical information, the state of the applicable law, and techniques for security (with special emphasis on the UNIX operating system). It is argued that the absence of security threatens any plan to build an information network, as there will be resistance to any system that may give intruders access to confidential data. PMID:3742113
Building Foundations for Nuclear Security Enterprise Analysis Utilizing Nuclear Weapon Data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Josserand, Terry Michael; Young, Leone; Chamberlin, Edwin Phillip
The Nuclear Security Enterprise, managed by the National Nuclear Security Administration - a semiautonomous agency within the Department of Energy - has been associated with numerous assessments with respect to the estimating, management capabilities, and practices pertaining to nuclear weapon modernization efforts. This report identifies challenges in estimating and analyzing the Nuclear Security Enterprise through an analysis of analogous timeframe conditions utilizing two types of nuclear weapon data - (1) a measure of effort and (2) a function of time. The analysis of analogous timeframe conditions that utilizes only two types of nuclear weapon data yields four summary observations thatmore » estimators and analysts of the Nuclear Security Enterprise will find useful.« less
75 FR 34989 - Board of Visitors, United States Military Academy (USMA)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-21
... issues. DATES: Thursday, July 8, 2010, at 9 a.m.-11 a.m. ADDRESSES: Building 600 (Taylor Hall... security screening. 4. Location: Building 600 (Taylor Hall), Superintendent's Conference Room. 5. Purpose... (MASG), 646 Swift Road, West Point, NY 10996-1905 or faxed to the Designated Federal Officer (DFO) at...
77 FR 34056 - Federal Property Suitable as Facilities To Assist the Homeless
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-08
... Area New Mexico 3 Buildings Kirtland AFB Kirtland AFB NM 87117 Landholding Agency: Air Force Property...: Secured Area New Mexico Bldg. 30116 5801 Manzano St SE Kirtland AFB NM 87117 Landholding Agency: Air Force... Buildings Kirtland AFB Kirtland AFB NM 87117 Landholding Agency: Air Force Property Number: 18201220013...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-08
... under EPC? c. Should EPCs permit the investments of green building measures if sufficient savings or.... weekdays at the above address. Due to security measures at the HUD Headquarters building, an advance... assessment and auditing protocol for PHA's undertaking self-direct EPCs? Could a Green Physical Needs...
32. Photocopy of photograph, ca. 1930 (original print on file ...
32. Photocopy of photograph, ca. 1930 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). INTERIOR VIEW TO WEST OF FIRST FLOOR ROOM TO NORTHWEST OF MAIN ENTRY IN MAIN BUILDING OF ARLINGTON HALL JUNIOR COLLEGE. - Arlington Hall Station, Main Building, 4000 Arlington Boulevard, Arlington, Arlington County, VA
24. Interior view of entrance corridor looking down east corridor; ...
24. Interior view of entrance corridor looking down east corridor; showing unoccupied corner office space and stairs going down to lower floor; center of main section of building on main floor; view to northeast. - Ellsworth Air Force Base, Group Administration & Secure Storage Building, 2372 Westover Avenue, Blackhawk, Meade County, SD
Athletic Facilities: Planning, Designing, and Operating Today's Physical-Education Centers.
ERIC Educational Resources Information Center
Spoor, Dana L.
1998-01-01
Examines what should be featured in an athletic facility, how to plan for the many different sports and activities that will be housed, and how to get the community involved. Areas addressed include planning for locker rooms and storage, flooring and lighting, building code adherence, spectator seating, building security, and outdoor recreation…
78 FR 49772 - Notice of a Public Meeting of the Advisory Committee on Apprenticeship (ACA)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-15
... for the listening room will be: U.S. Department of Labor, Frances Perkins Building, 200 Constitution Avenue NW., Washington, DC 20210. (Please consult the Security Instructions for the Frances Perkins... Perkins Building, 200 Constitution Avenue NW., Washington, DC, 20210, Room, C5515. Members of the public...
SPERTI Reactor Pit Building (PER605) from contrasting direction as photo ...
SPERT-I Reactor Pit Building (PER-605) from contrasting direction as photo above (ID-33-F-32). Note Guard House door, security fencing around facility. Photographer: R.G. Larsen. Date: July 22, 1955. INEEL negative no. 55-1702. - Idaho National Engineering Laboratory, SPERT-I & Power Burst Facility Area, Scoville, Butte County, ID
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-15
... Building, 1111 Constitution Avenue NW., Washington, DC 20224. Due to building security procedures, visitors must enter at the Constitution Avenue entrance. In addition, all visitors must present photo..., 1111 Constitution Avenue NW., Washington, DC 20224 or sent electronically via the Federal eRulemaking...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-31
... impacts. The proposed action will involve no construction or major renovation of any buildings or... to potential non-radiological impacts, there will be no construction or renovation of buildings or... adequate protection of public health and safety and common defense and security.'' The licensee claims that...
2016-12-01
conservation, building occupant comfort and satisfaction 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a...21 3.2.7 Occupant Comfort and Satisfaction ............................................................................. 22 3.2.8 Facility...50 6.7 PO-VII: INCREASE IN OCCUPANT SATISFACTION ......................................... 51 6.8 PO-VIII
PROCESS WATER BUILDING, TRA605. CONTROL PANEL SUPPLIES STATUS INDICATORS. CARD ...
PROCESS WATER BUILDING, TRA-605. CONTROL PANEL SUPPLIES STATUS INDICATORS. CARD IN LOWER RIGHT WAS INSERTED BY INL PHOTOGRAPHER TO COVER AN OBSOLETE SECURITY RESTRICTION ON ORIGINAL NEGATIVE. INL NEGATIVE NO. 4219. Unknown Photographer, 2/13/1952 - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
The Wicked Problem of Information Sharing in Homeland Security - A Leadership Perspective
2014-06-01
filled environment. One such coping strategy termed emotion work, describes how analysts manage their feelings to display a public face or bodily ...in many aspects of Western culture but 56 Jeff Conklin, Dialogue Mapping : Building Shared...effective, whether modifications should be 60 Conklin, Dialogue Mapping : Building Shared Understanding
Selection of the Best Security Controls for Rapid Development of Enterprise-Level Cyber Security
2017-03-01
time, money , and people, which in most cases are very restricted. To rapidly build up “the first line of defense,” enterprises should select the most...any other development effort, cyber capability development requires resources of time, money , and people, which in most cases are very restricted...that provide the most security per unit of time, money , or human capital investment. A. CYBER: THE FIFTH DOMAIN OF WARFARE Leon E. Panetta, the U.S
Breaking through: Engendering, Monitoring and Evaluation in Adult Education.
ERIC Educational Resources Information Center
Medel-Anonuevo, Carolyn, Ed.
This document contains 14 papers that were developed for a 5-day international seminar-workshop at which representatives of multilateral agencies, governments, nongovernmental organizations (NGOs), women's organizations, feminist groups, and universities discussed gender issues in monitoring and evaluation of adult education. The following papers…
ERIC Educational Resources Information Center
Chan-Tiberghien, Jennifer
2004-01-01
This article challenges three predominant narratives on educational globalization--"educational restructuring," "educational institutionalism," and "educational multilateralism"--and shows how they have largely failed to propose alternatives to the neoliberal order. I connect two disparate literatures--on educational globalization and…
Course Design: World Rhetorics
ERIC Educational Resources Information Center
Sharma, Ghanashyam
2016-01-01
In light of increasing international immigration and student mobility, unprecedented redistribution of geopolitical power, and the pervasive effects of the internet on institutions and communities locally and globally, rhetoric and composition has, albeit more in theory than in practice, started responding to the multilateral flow of ideas across…
Trade Policies toward Developing Countries: The Multilateral Trade Negotiations.
ERIC Educational Resources Information Center
Perez, Lorenzo L., Ed.; Benedick, Gerald R., Ed.
Proceedings are presented of a 1977 conference about aspects of international trade negotiations of importance to developing countries. Participants included staff from Washington-based international organizations, various United States departments, Congressional staff, and students of the Foreign Service Institute. Transcripts of three addresses…
Transforming Power Systems; 21st Century Power Partnership
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2015-05-20
The 21st Century Power Partnership - a multilateral effort of the Clean Energy Ministerial - serves as a platform for public-private collaboration to advance integrated solutions for the large-scale deployment of renewable energy in combination with deep energy ef?ciency and smart grid solutions.
47 CFR 90.365 - Partitioned licenses and disaggregated spectrum.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 47 Telecommunication 5 2012-10-01 2012-10-01 false Partitioned licenses and disaggregated spectrum... § 90.365 Partitioned licenses and disaggregated spectrum. (a) Eligibility. (1) Party seeking approval... disaggregate their licensed spectrum at any time following the grant of their licenses. Multilateration LMS...
47 CFR 90.365 - Partitioned licenses and disaggregated spectrum.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 47 Telecommunication 5 2011-10-01 2011-10-01 false Partitioned licenses and disaggregated spectrum... § 90.365 Partitioned licenses and disaggregated spectrum. (a) Eligibility. (1) Party seeking approval... disaggregate their licensed spectrum at any time following the grant of their licenses. Multilateration LMS...
47 CFR 90.365 - Partitioned licenses and disaggregated spectrum.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 5 2013-10-01 2013-10-01 false Partitioned licenses and disaggregated spectrum... § 90.365 Partitioned licenses and disaggregated spectrum. (a) Eligibility. (1) Party seeking approval... disaggregate their licensed spectrum at any time following the grant of their licenses. Multilateration LMS...
47 CFR 90.365 - Partitioned licenses and disaggregated spectrum.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 5 2014-10-01 2014-10-01 false Partitioned licenses and disaggregated spectrum... § 90.365 Partitioned licenses and disaggregated spectrum. (a) Eligibility. (1) Party seeking approval... disaggregate their licensed spectrum at any time following the grant of their licenses. Multilateration LMS...
15 CFR 730.6 - Control purposes.
Code of Federal Regulations, 2013 CFR
2013-01-01
... carry out its international obligations. Some controls are designed to restrict access to dual use items... controls designed to stem the proliferation of weapons of mass destruction and controls designed to limit.... Multilateral export control cooperation is sought through arrangements such as the Nuclear Suppliers Group, the...
15 CFR 730.6 - Control purposes.
Code of Federal Regulations, 2012 CFR
2012-01-01
... carry out its international obligations. Some controls are designed to restrict access to dual use items... controls designed to stem the proliferation of weapons of mass destruction and controls designed to limit.... Multilateral export control cooperation is sought through arrangements such as the Nuclear Suppliers Group, the...
15 CFR 730.6 - Control purposes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... carry out its international obligations. Some controls are designed to restrict access to dual use items... controls designed to stem the proliferation of weapons of mass destruction and controls designed to limit.... Multilateral export control cooperation is sought through arrangements such as the Nuclear Suppliers Group, the...
Strategic planning for the International Space Station
NASA Technical Reports Server (NTRS)
Griner, Carolyn S.
1990-01-01
The concept for utilization and operations planning for the International Space Station Freedom was developed in a NASA Space Station Operations Task Force in 1986. Since that time the concept has been further refined to definitize the process and products required to integrate the needs of the international user community with the operational capabilities of the Station in its evolving configuration. The keystone to the process is the development of individual plans by the partners, with the parameters and formats common to the degree that electronic communications techniques can be effectively utilized, while maintaining the proper level and location of configuration control. The integration, evaluation, and verification of the integrated plan, called the Consolidated Operations and Utilization Plan (COUP), is being tested in a multilateral environment to prove out the parameters, interfaces, and process details necessary to produce the first COUP for Space Station in 1991. This paper will describe the concept, process, and the status of the multilateral test case.
NASA Astrophysics Data System (ADS)
Larson, Robert Sherman
An Unmanned Aerial Vehicle (UAV) and a manned aircraft are tracked using ADS-B transponders and the Local Area Multilateration System (LAMS) in simulated GPS-degraded and GPS-denied environments. Several position estimation and fusion algorithms are developed for use with the Autonomous Flight Systems Laboratory (AFSL) TRansponder based Position Information System (TRAPIS) software. At the lowest level, these estimation and fusion algorithms use raw information from ADS-B and LAMS data streams to provide aircraft position estimates to the ground station user. At the highest level, aircraft position is estimated using a discrete time Kalman filter with real-time covariance updates and fusion involving weighted averaging of ADS-B and LAMS positions. Simulation and flight test results are provided, demonstrating the feasibility of incorporating an ADS-B transponder on a commercially-available UAS and maintaining situational awareness of aircraft positions in GPS-degraded and GPS-denied environments.
What drives donor funding in population assistance programs? Evidence from OECD countries.
van Dalen, Hendrik P; Reuser, Mieke
2006-09-01
The 1994 International Conference on Population and Development (ICPD) established goals for the expansion of population assistance. To date, the financial promises made by donor countries in 1994 have not been met. To unravel the gap between ambitions and contributions, we use panel estimation methods to see what lies behind the level of donor contributions and the sharing of burdens across the various categories of population and HIV/AIDS assistance in 21 donor countries for the years 1996-2002. Contributions by donors depend heavily on the economic wealth and subjective preferences of donor countries. The sharing of the ICPD burden within the group of OECD/DAC countries is in line with the countries' ability to pay, although within the aggregate we observe a specialization in channels for aid: small countries predominantly use multilateral aid agencies, whereas large countries rely more on bilateral aid channels. Catholic countries are averse to donating unrestricted funds (flowing primarily to multilateral agencies) or restricted funds targeted at family planning programs.
Laboratory of Viral Diseases Guest Researcher Seminar Series | Center for Cancer Research
Laboratory of Viral Diseases Guest Researcher Seminar Series New Epigenetic Regulators of HIV Latency Speaker: Melanie Ott, M.D., Ph.D, Senior Investigator & Professor of Medicine Gladstone Institutes & University of California Building 33, Main Conference Room 1N09 Main NIH CAMPUS *BLDG 33 is a secure facility, please allow time to pass through security.
Small Ships in Theater Security Cooperation
2008-01-01
ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE...Civil Affairs, Washington, D.C.: Joint Staff, April14, 2003. Marquis, Jefferson P., Richard E. Darilek, Jasen J. Castillo, Cathryn Quantic Thurston...McFadden, Cathryn Quantic Thurston, and Anny Wong. Building Partner Capabilities for Coalition Operations, Santa Monica, Calif.: RAND Corporation, MG
Homeland Security Collaboration: Catch Phrase or Preeminent Organizational Construct?
2009-09-01
collaborative effort? C. RESEARCH METHODOLOGY This research project utilized a modified case study methodology. The traditional case study method ...discussing the research method , offering smart practices and culminate with findings and recommendations. Chapter II Homeland Security Collaboration...41 Centers for Regional Excellence, “Building Models.” 16 Chapter III Research Methodology: Modified Case Study Method is
NREL: News - New Energy Systems Enhance National Security
resources, bioenergy and bio-based products, zero energy buildings, wind energy, geothermal energy, solar Energy Systems Enhance National Security Washington D.C., March 14, 2002 Experts from the U.S . Department of Energy's National Renewable Energy Laboratory (NREL) have identified key renewable energy
76 FR 33297 - Consumer Advisory Council; Notice of Meeting of the Consumer Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-08
..., in Dining Room E on the Terrace Level of the Martin Building. For security purposes, anyone planning.... Proposed Rules Regarding Ability to Pay for Mortgage Loans Members will discuss the Board's proposed rules... on a proposed rule that would require sponsors of asset-backed securities to retain at least 5...
Preliminary Impacts of SECURe PreK on Child- and Classroom-Level Outcomes
ERIC Educational Resources Information Center
Jones, Stephanie M.; Kargman, Marie; Kargman, Max; Bailey, Rebecca
2014-01-01
This paper presents initial results from a pilot evaluation of the pre-K component of a new school-based intervention strategy (Social, Emotional, and Cognitive Understanding and Regulation in education, SECURe) for pre-kindergarten through 3rd grade that is designed to build skills in social-emotional learning (focusing on executive function and…
Adding Big Data Analytics to GCSS-MC
2014-09-30
TERMS Big Data , Hadoop , MapReduce, GCSS-MC 15. NUMBER OF PAGES 93 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...10 2.5 Hadoop . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3 The Experiment Design 23 3.1 Why Add a Big Data Element...23 3.2 Adding a Big Data Element to GCSS-MC . . . . . . . . . . . . . . 24 3.3 Building a Hadoop Cluster
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wong, Amy S.; Powell, Kimberly S.
Los Alamos National Laboratory's newest facility, the Radiological Laboratory Utility Office Building (RLUOB), is also its first to achieve both the Leadership in Energy and Environmental Design (LEED) status and LEED Gold certification from the U.S. Green Building Council (USGBC). From its robust design to its advanced scientific equipment, RLUOB is essential to the Laboratory's national security mission in support of the National Nuclear Security Administration's (NNSA) nuclear weapons program. At more than 200,000 square feet, this building is the only radiological facility within the Department of Energy to have attained LEED Gold, which contributes to NNSA's achievement towards themore » high performance sustainable building goals outlined in Executive Order 13514, Federal Leadership in Environmental, Energy, and Economic Performance. 'As we celebrate RLUOB being completed almost one year ahead of schedule and having achieved LEED certification at the Gold level, we approach our plutonium mission at Los Alamos and NNSA with a great sense of achievement,' said Don Cook, NNSA's deputy administrator for defense programs. 'RLUOB adds a major component to NNSA's plutonium support capability and RLUOB demonstrates our commitment in helping to deliver President Obama's nuclear security agenda which includes ensuring the safety, security and effectiveness of the nuclear deterrent without testing.' The facility contains laboratories for analytical chemistry and materials characterization of special nuclear material, along with space for offices, training and emergency operations. Its multi-functional purpose makes RLUOB a unique project for which LEED certification was sought. 'LEED certification was a huge goal and one we sought from the very beginning of this project,' said Laboratory Director Charlie McMillan. 'It's an important step forward, allowing us to advance national security science in modern, safer, more efficient infrastructure.' The Laboratory's project team and its contractor partners, especially in coordination with Jacobs Engineering, focused on green design and construction in LEED categories, such as sustainable sites, water efficiency, energy and atmosphere, materials and resources, indoor environmental quality and innovation in design. RLUOB's features include: (1) Building envelope design (orientation, materials and insulation) yielded a 20 percent improvement in energy performance; (2) Incorporation of building materials with 24 percent recycled content; (3) Diversion of 72 percent of construction-generated materials through reuse, recycle and salvage; (4) Roofing comprised of 93 percent highly-reflective materials to reduce heat island effects; (5) High efficiency, gas-fired hot water boilers, air-cooled chillers, thermal storage systems and variable frequency drives for compressors, fans and pumps; (6) Energy efficient lighting for interiors, exteriors, process glove boxes and fume hoods; (7) Water efficient fixtures resulting in 30 percent reduction in usage; (8) Low emission paints and carpeting for improved indoor air quality; (9) Landscaping that doesn't require permanent irrigation; (10) Enhanced building system commissioning; and (11) Comprehensive transportation alternatives, including public transportation, bicycle storage and changing rooms, and a refueling station for government vehicles using alternative fuels. 'RLUOB's LEED certification demonstrates tremendous leadership in green building,' says Rick Fedrizzi, president and CEO of USGBC. 'The urgency of our mission has challenged the industry to move faster and reach further than ever before, and RLUOB serves as a prime example of just how much we can accomplish.'« less
WASTE TREATMENT BUILDING SYSTEM DESCRIPTION DOCUMENT
DOE Office of Scientific and Technical Information (OSTI.GOV)
F. Habashi
2000-06-22
The Waste Treatment Building System provides the space, layout, structures, and embedded subsystems that support the processing of low-level liquid and solid radioactive waste generated within the Monitored Geologic Repository (MGR). The activities conducted in the Waste Treatment Building include sorting, volume reduction, and packaging of dry waste, and collecting, processing, solidification, and packaging of liquid waste. The Waste Treatment Building System is located on the surface within the protected area of the MGR. The Waste Treatment Building System helps maintain a suitable environment for the waste processing and protects the systems within the Waste Treatment Building (WTB) from mostmore » of the natural and induced environments. The WTB also confines contaminants and provides radiological protection to personnel. In addition to the waste processing operations, the Waste Treatment Building System provides space and layout for staging of packaged waste for shipment, industrial and radiological safety systems, control and monitoring of operations, safeguards and security systems, and fire protection, ventilation and utilities systems. The Waste Treatment Building System also provides the required space and layout for maintenance activities, tool storage, and administrative facilities. The Waste Treatment Building System integrates waste processing systems within its protective structure to support the throughput rates established for the MGR. The Waste Treatment Building System also provides shielding, layout, and other design features to help limit personnel radiation exposures to levels which are as low as is reasonably achievable (ALARA). The Waste Treatment Building System interfaces with the Site Generated Radiological Waste Handling System, and with other MGR systems that support the waste processing operations. The Waste Treatment Building System interfaces with the General Site Transportation System, Site Communications System, Site Water System, MGR Site Layout, Safeguards and Security System, Site Radiological Monitoring System, Site Electrical Power System, Site Compressed Air System, and Waste Treatment Building Ventilation System.« less
Building Energy Management Open Source Software
DOE Office of Scientific and Technical Information (OSTI.GOV)
This is the repository for Building Energy Management Open Source Software (BEMOSS), which is an open source operating system that is engineered to improve sensing and control of equipment in small- and medium-sized commercial buildings. BEMOSS offers the following key features: (1) Open source, open architecture – BEMOSS is an open source operating system that is built upon VOLTTRON – a distributed agent platform developed by Pacific Northwest National Laboratory (PNNL). BEMOSS was designed to make it easy for hardware manufacturers to seamlessly interface their devices with BEMOSS. Software developers can also contribute to adding additional BEMOSS functionalities and applications.more » (2) Plug & play – BEMOSS was designed to automatically discover supported load controllers (including smart thermostats, VAV/RTUs, lighting load controllers and plug load controllers) in commercial buildings. (3) Interoperability – BEMOSS was designed to work with load control devices form different manufacturers that operate on different communication technologies and data exchange protocols. (4) Cost effectiveness – Implementation of BEMOSS deemed to be cost-effective as it was built upon a robust open source platform that can operate on a low-cost single-board computer, such as Odroid. This feature could contribute to its rapid deployment in small- or medium-sized commercial buildings. (5) Scalability and ease of deployment – With its multi-node architecture, BEMOSS provides a distributed architecture where load controllers in a multi-floor and high occupancy building could be monitored and controlled by multiple single-board computers hosting BEMOSS. This makes it possible for a building engineer to deploy BEMOSS in one zone of a building, be comfortable with its operation, and later on expand the deployment to the entire building to make it more energy efficient. (6) Ability to provide local and remote monitoring – BEMOSS provides both local and remote monitoring ability with role-based access control. (7) Security – In addition to built-in security features provided by VOLTTRON, BEMOSS provides enhanced security features, including BEMOSS discovery approval process, encrypted core-to-node communication, thermostat anti-tampering feature and many more. (8) Support from the Advisory Committee – BEMOSS was developed in consultation with an advisory committee from the beginning of the project. BEMOSS advisory committee comprises representatives from 22 organizations from government and industry.« less
Fiber optic sensor based on Mach-Zehnder interferometer for securing entrance areas of buildings
NASA Astrophysics Data System (ADS)
Nedoma, Jan; Fajkus, Marcel; Martinek, Radek; Mec, Pavel; Novak, Martin; Bednarek, Lukas; Vasinek, Vladimir
2017-10-01
Authors of this article focused on the utilization of fiber optic sensors based on interferometric measurements for securing entrance areas of buildings such as windows and doors. We described the implementation of the fiber-optic interferometer (type Mach-Zehnder) into the window frame or door, sensor sensitivity, analysis of the background noise and methods of signal evaluation. The advantage of presented solution is the use of standard telecommunication fiber standard G.652.D, high sensitivity, immunity of sensor to electromagnetic interference (EMI) and passivity of the sensor regarding power supply. Authors implemented the Graphical User Interface (GUI) which offers the possibility of remote monitoring presented sensing solution.
Wagner, G Gale; Brown, Corrie C
2002-11-01
The public needs no reminder that deadly infectious diseases such as FMD could emerge in any country at any moment, or that national food security could be compromised by Salmonella or Listeria infections. Protections against these risks include the knowledge that appropriate and equivalent veterinary education will enable detection and characterization of emerging disease agents, as well as an appropriate response, wherever they occur. Global veterinary leadership is needed to reduce the global threat of infectious diseases of major food animal and public health importance. We believe that the co-curriculum is an excellent way to prepare and train veterinarians and future leaders who understand and can deal with global issues. The key to the success of the program is the veterinarian's understanding that there is a cultural basis to the practice of veterinary medicine in any country. The result will be a cadre of veterinarians, faculty, and other professionals who are better able (language and culture) to understand the effects of change brought about by free trade and the importance of interdisciplinary and institutional relationships to deal effectively with national and regional issues of food safety and security. New global veterinary leadership programs will build on interests, experience, ideas, and ambitions. A college that wishes to take advantage of this diversity must offer opportunities that interest veterinarians throughout their careers and that preferably connect academic study with intensive experiential training in another country. At its best, the global veterinary leadership program would include a partnership between veterinarians and several international learning centers, a responsiveness to the identified international outreach needs of the profession, and attention to critical thinking and reflection. The global veterinary leadership program we have described is intended to be a set of ideas meant to promote collaboration, coalitions, and discussion among veterinarians and veterinary educators who may be intrigued by the concept. The impact of the program can be summarized as follows: Outreach Programs: The global veterinary leadership program will establish new partnerships between veterinarians and veterinary college faculty as they supervise the international internships and see a relationship between their goals and the value of food safety to this country. Strategic Opportunity: The program will build on the critical role that US veterinarians and veterinary colleges already play in strengthening the safety of free trade in this hemisphere. Diversity in an Age of Specialization: The program will combine a global orientation, language ability, and access to comprehensive, research- and economic-related work/study opportunities to expose veterinarians to the expanding world market for veterinary expertise. New Linkages Through Corporate Partners: Through the success and high visibility of current research and education programs, most veterinary colleges are well positioned to engage industry, government, and university leaders in ways to use the proposed program to increase the flow of new ideas and talent into the world food enterprise. International Funding: A new partnership among veterinarians, industry, government, and university leaders can coordinate strong multilateral requests for funding from national and international sources. An Interdisciplinary Strategy that Benefits Veterinary Medicine: The program will combine the diverse veterinary research and education system with our strong national and international network of collaborators to provide globally competent veterinarians who will be needed for the corporate and public opportunities of the future.
NASA Astrophysics Data System (ADS)
Rashid, F. I. A.; Zolkaffly, M. Z.; Jamal, N.
2018-01-01
In order to keep abreast on issues related to CTBT in Malaysia, Malaysian Nuclear Agency (Nuklear Malaysia), as the CTBT National Authority in Malaysia, has collaborated with local partners to implement various stakeholder engagement programme. This paper aims at highlighting Malaysia’s approach in promoting CTBT through stakeholder engagement programme targeted at multilevel stakeholders, both national and international. Such programmes includes participation in the international forums, inter-agency meetings, awareness seminars, training courses, technical visits to IMS station, promoting civil and scientific application of International Monitoring System (IMS) data and International Data Centre (IDC) products using Virtual Data Exploitation Center (vDEC), inviting youth groups to participate in the CTBTO Youth Group, and publications of CTBT-related topics. This approach has successfully fortify Malaysia’s commitments at the international level, enhanced national awareness of global multilateral framework, increased stakeholders awareness and their roles related to CTBT, as well as building domestic capacity on CTBT matters. In conclusion, stakeholder engagement is crucial in promoting and enhancing stakeholders understanding on CTBT. Continuous engagement with relevant stakeholders will enable effective dissemination and smooth implementation of CTBT related matters that will eventually support global universalization of CTBT.
Raffo, Veronica; Bliss, Tony; Shotten, Marc; Sleet, David; Blanchard, Claire
2013-12-01
This case study of the Argentina Road Safety Project demonstrates how the application of World Bank road safety project guidelines focused on institution building can accelerate knowledge transfer, scale up investment and improve the focus on results. The case study highlights road safety as a development priority and outlines World Bank initiatives addressing the implementation of the World Report on Road Traffic Injury's recommendations and the subsequent launch of the Decade of Action for Road Safety, from 2011-2020. The case study emphasizes the vital role played by the lead agency in ensuring sustainable road safety improvements and promoting the shift to a 'Safe System' approach, which necessitated the strengthening of all elements of the road safety management system. It summarizes road safety performance and institutional initiatives in Argentina leading up to the preparation and implementation of the project. We describe the project's development objectives, financing arrangements, specific components and investment staging. Finally, we discuss its innovative features and lessons learned, and present a set of supplementary guidelines, both to assist multilateral development banks and their clients with future road safety initiatives, and to encourage better linkages between the health and transportation sectors supporting them.
Executive summary—Biomarkers of Nutrition for Development: Building a Consensus123
Namasté, Sorrel; Brabin, Bernard; Combs, Gerald; L'Abbe, Mary R; Wasantwisut, Emorn; Darnton-Hill, Ian
2011-01-01
The ability to develop evidence-based clinical guidance and effective programs and policies to achieve global health promotion and disease prevention goals depends on the availability of valid and reliable data. With specific regard to the role of food and nutrition in achieving those goals, relevant data are developed with the use of biomarkers that reflect nutrient exposure, status, and functional effect. A need exists to promote the discovery, development, and use of biomarkers across a range of applications. In addition, a process is needed to harmonize the global health community's decision making about what biomarkers are best suited for a given use under specific conditions and settings. To address these needs, the Eunice Kennedy Shriver National Institute of Child Health and Human Development, National Institutes of Health, US Department of Health and Human Services, organized a conference entitled “Biomarkers of Nutrition for Development: Building a Consensus,” which was hosted by the International Atomic Energy Agency. Partners included key multilateral, US agencies and public and private organizations. The assembly endorsed the utility of this initiative and the need for the BOND (Biomarkers of Nutrition for Development) project to continue. A consensus was reached on the requirement to develop a process to inform the community about the relative strengths or weaknesses and specific applications of various biomarkers under defined conditions. The articles in this supplement summarize the deliberations of the 4 working groups: research, clinical, policy, and programmatic. Also described are content presentations on the harmonization processes, the evidence base for biomarkers for 5 case-study micronutrients, and new frontiers in science and technology. PMID:21733880
Energy Independence and Security Act of 2007: A Summary of Major Provisions
2007-12-21
Service,The Library of Congress,101 Independence Ave, SW,Washington,DC,20540-7500 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/ MONITORING ...establishes a zero -energy commercial buildings initiative. A national goal is set to achieve zero -net-energy use CRS-8 for new commercial buildings built...after 2025. A further goal is to retrofit all pre- 2025 buildings to zero -net-energy use by 2050. Section 423 requires that DOE establish a national
Bates, Imelda; Taegtmeyer, Miriam; Squire, S Bertel; Ansong, Daniel; Nhlema-Simwaka, Bertha; Baba, Amuda; Theobald, Sally
2011-03-28
Despite substantial investment in health capacity building in developing countries, evaluations of capacity building effectiveness are scarce. By analysing projects in Africa that had successfully built sustainable capacity, we aimed to identify evidence that could indicate that capacity building was likely to be sustainable. Four projects were selected as case studies using pre-determined criteria, including the achievement of sustainable capacity. By mapping the capacity building activities in each case study onto a framework previously used for evaluating health research capacity in Ghana, we were able to identify activities that were common to all projects. We used these activities to derive indicators which could be used in other projects to monitor progress towards building sustainable research capacity. Indicators of sustainable capacity building increased in complexity as projects matured and included- early engagement of stakeholders; explicit plans for scale up; strategies for influencing policies; quality assessments (awareness and experiential stages)- improved resources; institutionalisation of activities; innovation (expansion stage)- funding for core activities secured; management and decision-making led by southern partners (consolidation stage).Projects became sustainable after a median of 66 months. The main challenges to achieving sustainability were high turnover of staff and stakeholders, and difficulties in embedding new activities into existing systems, securing funding and influencing policy development. Our indicators of sustainable capacity building need to be tested prospectively in a variety of projects to assess their usefulness. For each project the evidence required to show that indicators have been achieved should evolve with the project and they should be determined prospectively in collaboration with stakeholders.
2006-03-01
20 6. Community Concerns........................................................................21 G ...44 viii 6. Community Concerns........................................................................45 G ...
Children's Rights and Global Civil Society
ERIC Educational Resources Information Center
Fuchs, Eckhardt
2007-01-01
Although the Convention on the Rights of the Child (1989) was a significant international achievement, its adoption requires analysis and interpretation in terms of the possibilities and limitations of multilateral cooperation. The international movement for children's rights can only be conceived as the result of a system of multilateral…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-01
... representative of the HIV/AIDS community, academia, international experts, partner government representatives, multilateral and bilateral agency representatives, foundations, advocates, and non-governmental organizations... international strategies and implementation, and the role of PEPFAR in the international discourse regarding...
Testing Neoclassical Competitive Theory in Multilateral Decentralized Markets
ERIC Educational Resources Information Center
List, John A.
2004-01-01
Walrasian tatonnement has been a fundamental assumption in economics ever since Walras' general equilibrium theory was introduced in 1874. Nearly a century after its introduction, Vernon Smith relaxed the Walrasian tatonnement assumption by showing that neoclassical competitive market theory explains the equilibrating forces in "double-auction"…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sathaye, Jayant A.; Price, Lynn; Kumar, Satish
Development and poverty eradication are urgent andoverriding goals internationally. The World Summit on SustainableDevelopment made clear the need for increased access to affordable,reliable and cleaner energy and the international community agreed in theDelhi Declaration on Climate Change and Sustainable Development on theimportance of the development agenda in considering any climate changeapproach. To this end, six countries (Australia, China, India, Japan,Republic of Korea and the United States) have come together to form theAsia Pacific Partnership in accordance with their respective nationalcircumstances, to develop, deploy and transfer cleaner, more efficienttechnologies and to meet national pollution reduction, energy securityand climate change concerns consistentmore » with the principles of the U.N.Framework Convention on Climate Change (UNFCCC). The APP builds on thefoundation of existing bilateral and multilateral initiativescomplements.APP has established eight public-private sector Task Forcescovering: (1) cleaner fossil energy; (2) renewable energy and distributedgeneration; (3) power generation and transmission; (4) steel; (5)aluminium; (6) cement; (7) coal mining; and (8) buildings and appliances.As a priority, each Task Force will formulate detailed action plansoutlining both immediate and medium-term specific actions, includingpossible "flagship" projects and relevant indicators of progress by 31August 2006. The partnership will help the partners build human andinstitutional capacity to strengthen cooperative efforts, and will seekopportunities to engage the private sector. The APP organized An OutreachWorkshop: Business&Technology Cooperation Opportunities forIndustry on August 26, 2006, New Delhi. This paper was prepared toprovide background information for participants of the Conference. Ithighlights energy efficiency, renewable energy, and climate technologies,barriers, and partnerships that are being implemented in the US, Indiaand other selected countries. The paper discusses the lessons to belearned from these partnerships, and ways by which the APP could fostercooperation between India and the other member countries. It highlightsthe types of technologies that Indian public sector and private industrycould access from US national laboratories and also be able to leveragecurrent and planned USAID/India activities. The paper builds on anearlier background paper that was prepared for the US-India EnergyDialogue Working Group on Energy Efficiency.« less
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-03-31
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-01-01
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572
DOE Office of Scientific and Technical Information (OSTI.GOV)
MATALUCCI,RUDOLPH V.; O'CONNOR,SHARON
The mission of the Architectural Surety{trademark} program at Sandia National Laboratories is to assure the performance of buildings, facilities, and other infrastructure systems under normal, abnormal, and malevolent threat conditions. Through educational outreach efforts in the classroom, at conferences, and presentations such as this one, public and professional awareness of the need to defuse and mitigate such threats is increased. Buildings, airports, utilities, and other kinds of infrastructure deteriorate over time, as evidenced most dramatically by the crumbling cities and aging buildings, bridges, and other facility systems. Natural disasters such as tornadoes, earthquakes, hurricanes, and flooding also stress the materialsmore » and structural elements of the built environment. In addition, criminals, vandals, and terrorists attack federal buildings, dams, bridges, tunnels, and other public and private facilities. Engineers and architects are beginning to systematically consider these threats during the design, construction, and retrofit phases of buildings and infrastructures and are recommending advanced research in new materials and techniques. Existing building codes and standards do not adequately address nor protect the infrastructure or the public from many of these emerging threats. The activities in Sandia National Laboratories' Architectural Surety{trademark} efforts take a risk management approach to enhancing the safety, security, and reliability of the constructed environment. The technologies and techniques developed during Sandia's 50 years as the nation's lead laboratory for nuclear weapons surety are now being applied to assessing and reducing the vulnerability of dams, to enhancing the safety and security of staff in foreign embassies, and assuring the reliability of other federal facilities. High consequence surety engineering and design brings together technological advancements, new material requirements, systems integration, and risk management to improve the safety, security, and reliability of the as-built environment. The thrust of this paper is the role that new materials can play in protecting the infrastructure. Retrofits of existing buildings, innovative approaches to the design and construction of new facilities, and the mitigation of consequences in the event of an unpreventable disaster are some of the areas that new construction materials can benefit the Architectural Surety{trademark} of the constructed environment.« less
3. VIEW OF WEST AND SOUTH FACES OF VEHICLE SUPPORT ...
3. VIEW OF WEST AND SOUTH FACES OF VEHICLE SUPPORT BUILDING. NOTE BLAST-PROTECTION WALL SURROUNDING DOOR TO ROOM 106 (PYROTECHNIC STORAGE ROOM) NEAR SOUTHWEST CORNER. East face not accesible for photography due to proximity of security fence. - Vandenberg Air Force Base, Space Launch Complex 3, Vehicle Support Building, Napa & Alden Roads, Lompoc, Santa Barbara County, CA
75 FR 71789 - The Future of Aviation Advisory Committee (FAAC); Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
... from 8:45 a.m. to 9:30 a.m. Please arrive early for parking, security clearance, and escort to meeting...-mail registration. There is no facility parking and parking at public parking lots is limited. Car... DOT Headquarters Building. There is no Internet access. Bringing computers into the building requires...
30. Photocopy of photograph, ca. 1930 (original print on file ...
30. Photocopy of photograph, ca. 1930 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW TO SOUTHEAST OF MAIN BUILDING OF ARLINGTON HALL JUNIOR COLLEGE SHOWING EAST WING AND CONNECTING LINK BETWEEN EAST AND WEST WINGS. - Arlington Hall Station, Main Building, 4000 Arlington Boulevard, Arlington, Arlington County, VA
ERIC Educational Resources Information Center
Whitehouse, B.; Patel, M.; Gofton, K.
Recent years have shown an increase in arson, theft, and vandalism committed in educational facilities resulting in a need for managers to formulate security policies. This document provides technical advice and guidance on policy for the design, specification, installation, maintenance, operation, and management of closed circuit TV (CCTV)…
Code of Federal Regulations, 2010 CFR
2010-10-01
... contract will require the construction of a multi-story office building, the prospective bidder/offeror..., etc.) Complexity: (office building, etc.) Type of construction: Value of project: If the prospective... (P.L. 99-399; 22 U.S.C. 4852). The Act limits certain construction projects abroad to United States...
2016-12-05
conservation, building occupant comfort and satisfaction 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a...21 3.2.7 Occupant Comfort and Satisfaction ............................................................................. 22 3.2.8 Facility...50 6.7 PO-VII: INCREASE IN OCCUPANT SATISFACTION ......................................... 51 6.8 PO-VIII
Measuring Information Security: Guidelines to Build Metrics
NASA Astrophysics Data System (ADS)
von Faber, Eberhard
Measuring information security is a genuine interest of security managers. With metrics they can develop their security organization's visibility and standing within the enterprise or public authority as a whole. Organizations using information technology need to use security metrics. Despite the clear demands and advantages, security metrics are often poorly developed or ineffective parameters are collected and analysed. This paper describes best practices for the development of security metrics. First attention is drawn to motivation showing both requirements and benefits. The main body of this paper lists things which need to be observed (characteristic of metrics), things which can be measured (how measurements can be conducted) and steps for the development and implementation of metrics (procedures and planning). Analysis and communication is also key when using security metrics. Examples are also given in order to develop a better understanding. The author wants to resume, continue and develop the discussion about a topic which is or increasingly will be a critical factor of success for any security managers in larger organizations.
Rep. Schock, Aaron [R-IL-18
2011-07-14
Senate - 08/18/2011 Committee on Homeland Security and Governmental Affairs referred to Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Developing a Defense Sector Assessment Rating Tool
2010-01-01
JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...Cathryn Quantic Thurston, and Gregory F. Treverton (MG-863-OSD). • Making Liberia Safe: Transformation of the National Security Sector, by David C...Cathryn Quantic Thurston, and Gregory F. Treverton, A Framework to Assess Programs for Building Partnerships, Santa Monica, Calif.: RAND Corporation