Sample records for fixed-site security systems

  1. Chemical, Biological, Radiological, and Nuclear Consequence Management: Ways to Improve Fixed-Site Decontamination Capability

    DTIC Science & Technology

    2007-05-10

    objective is achieved through consequence management and fixed-site decontamination operations. The effectiveness of CBRN consequence management...decontamination operations. The effectiveness of CBRN consequence management and fixed-site decontamination executed in the Joint Security Area can be...when faced with Chemical, Biological, Radiological, or Nuclear (CBRN) contaminated ports of debarkation. The effectiveness of CBRN consequence

  2. A review of physical security robotics at Sandia National Laboratories

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roerig, S.C.

    1990-01-01

    As an outgrowth of research into physical security technologies, Sandia is investigating the role of robotics in security systems. Robotics may allow more effective utilization of guard forces, especially in scenarios where personnel would be exposed to harmful environments. Robots can provide intrusion detection and assessment functions for failed sensors or transient assets, can test existing fixed site sensors, and can gather additional intelligence and dispense delaying elements. The Robotic Security Vehicle (RSV) program for DOE/OSS is developing a fieldable prototype for an exterior physical security robot based upon a commercial four wheel drive vehicle. The RSV will be capablemore » of driving itself, being driven remotely, or being driven by an onboard operator around a site and will utilize its sensors to alert an operator to unusual conditions. The Remote Security Station (RSS) program for the Defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior security systems. The RSS consists of an independent sensor pod, a mobile sensor platform and a control and display console. Sensor data fusion is used to optimize the system's intrusion detection performance. These programs are complementary, the RSV concentrates on developing autonomous mobility, while the RSS thrust is on mobile sensor employment. 3 figs.« less

  3. Director, Operational Test and Evaluation FY 2004 Annual Report

    DTIC Science & Technology

    2004-01-01

    HIGH) Space Based Radar (SBR) Sensor Fuzed Weapon (SFW) P3I (CBU-97/B) Small Diameter Bomb (SDB) Secure Mobile Anti-Jam Reliable Tactical Terminal...detection, identification, and sampling capability for both fixed-site and mobile operations. The system must automatically detect and identify up to ten...staffing within the Services. SYSTEM DESCRIPTION AND MISSION The Services envision JCAD as a hand-held device that automatically detects, identifies, and

  4. 46 CFR 169.564 - Fixed extinguishing system, general.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 7 2011-10-01 2011-10-01 false Fixed extinguishing system, general. 169.564 Section 169.564 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Lifesaving and Firefighting Equipment Firefighting Equipment § 169.564 Fixed extinguishing system...

  5. 46 CFR 169.564 - Fixed extinguishing system, general.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Fixed extinguishing system, general. 169.564 Section 169.564 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Lifesaving and Firefighting Equipment Firefighting Equipment § 169.564 Fixed extinguishing system...

  6. Contextualizing Secure Information System Design: A Socio-Technical Approach

    ERIC Educational Resources Information Center

    Charif, Abdul Rahim

    2017-01-01

    Secure Information Systems (SIS) design paradigms have evolved in generations to adapt to IS security needs. However, modern IS are still vulnerable and are far from secure. The development of an underlying IS cannot be reduced to "technological fixes" neither is the design of SIS. Technical security cannot ensure IS security.…

  7. 46 CFR 169.565 - Fixed carbon dioxide system.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 7 2011-10-01 2011-10-01 false Fixed carbon dioxide system. 169.565 Section 169.565 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Lifesaving and Firefighting Equipment Firefighting Equipment § 169.565 Fixed carbon dioxide system. (a) The...

  8. Operation of remote mobile sensors for security of drinking water distribution systems.

    PubMed

    Perelman, By Lina; Ostfeld, Avi

    2013-09-01

    The deployment of fixed online water quality sensors in water distribution systems has been recognized as one of the key components of contamination warning systems for securing public health. This study proposes to explore how the inclusion of mobile sensors for inline monitoring of various water quality parameters (e.g., residual chlorine, pH) can enhance water distribution system security. Mobile sensors equipped with sampling, sensing, data acquisition, wireless transmission and power generation systems are being designed, fabricated, and tested, and prototypes are expected to be released in the very near future. This study initiates the development of a theoretical framework for modeling mobile sensor movement in water distribution systems and integrating the sensory data collected from stationary and non-stationary sensor nodes to increase system security. The methodology is applied and demonstrated on two benchmark networks. Performance of different sensor network designs are compared for fixed and combined fixed and mobile sensor networks. Results indicate that complementing online sensor networks with inline monitoring can increase detection likelihood and decrease mean time to detection. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. Genesis: A Framework for Achieving Software Component Diversity

    DTIC Science & Technology

    2007-01-01

    correctly—the initial filters develop to fix the Hotmail vulnerability could be circumvented by using alternate character encodings4. Hence, we focus on...Remotely Exploitable Cross-Site Scripting in Hotmail and Yahoo, (March 2004); http://www.greymagic.com/security/advisories/gm005-mc/. 4...EyeonSecurity, Microsoft Passport Account Hijack Attack: Hacking Hotmail and More, Hacker’s Digest. 5. Y.-W. Huang et al., Web Application Security Assessment by

  10. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 7 2014-10-01 2014-10-01 false System security plan: contents. 659.23 Section 659.23 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL TRANSIT ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE SAFETY OVERSIGHT Role of the State Oversight Agency § 659.23 System security...

  11. 46 CFR 169.565 - Fixed carbon dioxide system.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 7 2012-10-01 2012-10-01 false Fixed carbon dioxide system. 169.565 Section 169.565 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Lifesaving and Firefighting Equipment Firefighting Equipment § 169.565 Fixed carbon dioxide system. (a) The number of pounds of carbon dioxide...

  12. 46 CFR 169.565 - Fixed carbon dioxide system.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 7 2013-10-01 2013-10-01 false Fixed carbon dioxide system. 169.565 Section 169.565 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Lifesaving and Firefighting Equipment Firefighting Equipment § 169.565 Fixed carbon dioxide system. (a) The number of pounds of carbon dioxide...

  13. 46 CFR 169.565 - Fixed carbon dioxide system.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 7 2014-10-01 2014-10-01 false Fixed carbon dioxide system. 169.565 Section 169.565 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Lifesaving and Firefighting Equipment Firefighting Equipment § 169.565 Fixed carbon dioxide system. (a) The number of pounds of carbon dioxide...

  14. Federal Security Laboratory Governance Panels: Observations and Recommendations

    DTIC Science & Technology

    2013-01-01

    operates under a sole-source, cost-plus-fixed-fee contract administered by the U.S. Navy’s Naval Sea Systems Command. There are currently 14 UARCs, 13... system of research organizations that support science and technology for U.S. national security. Within this system , the Departments of Defense, Energy...and Homeland Security support about 80 laboratories that focus predominantly on national security matters. These laboratories have different

  15. 46 CFR 193.05-10 - Fixed fire extinguishing systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ....05-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH... provided for internal combustion engine installations in accordance with the following: (1) Enclosed spaces containing gasoline engines shall have fixed carbon dioxide systems. (2) If a fire extinguishing system is...

  16. 46 CFR 193.05-10 - Fixed fire extinguishing systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ....05-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH... provided for internal combustion engine installations in accordance with the following: (1) Enclosed spaces containing gasoline engines shall have fixed carbon dioxide systems. (2) If a fire extinguishing system is...

  17. 49 CFR 659.27 - Internal safety and security reviews.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE SAFETY OVERSIGHT Role of the..., indicating that the rail transit agency is in compliance with its system safety program plan and system... security reviews indicate that the rail transit agency is not in compliance with its system safety program...

  18. 48 CFR 908.7106 - Security cabinets.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ....7106 Section 908.7106 Federal Acquisition Regulations System DEPARTMENT OF ENERGY COMPETITION ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition of Special Items 908.7106 Security...) Fixed-price prime contractors and lower tier subcontractors may use GSA acquisition sources for security...

  19. 46 CFR 34.17-1 - Application-T/ALL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Application-T/ALL. 34.17-1 Section 34.17-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Fixed Foam Extinguishing Systems, Details § 34.17-1 Application—T/ALL. (a) Where a fixed foam extinguishing system is...

  20. 46 CFR 34.17-1 - Application-T/ALL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Application-T/ALL. 34.17-1 Section 34.17-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Fixed Foam Extinguishing Systems, Details § 34.17-1 Application—T/ALL. (a) Where a fixed foam extinguishing system is...

  1. Security concept in 'MyAngelWeb' a website for the individual patient at risk of emergency.

    PubMed

    Pinciroli, F; Nahaissi, D; Boschini, M; Ferrari, R; Meloni, G; Camnasio, M; Spaggiari, P; Carnerone, G

    2000-11-01

    We describe the Security Plan for the 'MyAngelWeb' service. The different actors involved in the service are subject to different security procedures. The core of the security system is implemented at the host site by means of a DBMS and standard Information Technology tools. Hardware requirements for sustainable security are needed at the web-site construction sites. They are not needed at the emergency physician's site. At the emergency physician's site, a two-way authentication system (password and test phrase method) is implemented.

  2. Security concept in 'MyAngelWeb((R))' a website for the individual patient at risk of emergency.

    PubMed

    Pinciroli; Nahaissi; Boschini; Ferrari; Meloni; Camnasio; Spaggiari; Carnerone

    2000-11-01

    We describe the Security Plan for the 'MyAngelWeb' service. The different actors involved in the service are subject to different security procedures. The core of the security system is implemented at the host site by means of a DBMS and standard Information Technology tools. Hardware requirements for sustainable security are needed at the web-site construction sites. They are not needed at the emergency physician's site. At the emergency physician's site, a two-way authentication system (password and test phrase method) is implemented.

  3. Using RFID to enhance security in off-site data storage.

    PubMed

    Lopez-Carmona, Miguel A; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2010-01-01

    Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.

  4. Photonic sensor applications in transportation security

    NASA Astrophysics Data System (ADS)

    Krohn, David A.

    2007-09-01

    There is a broad range of security sensing applications in transportation that can be facilitated by using fiber optic sensors and photonic sensor integrated wireless systems. Many of these vital assets are under constant threat of being attacked. It is important to realize that the threats are not just from terrorism but an aging and often neglected infrastructure. To specifically address transportation security, photonic sensors fall into two categories: fixed point monitoring and mobile tracking. In fixed point monitoring, the sensors monitor bridge and tunnel structural health and environment problems such as toxic gases in a tunnel. Mobile tracking sensors are being designed to track cargo such as shipboard cargo containers and trucks. Mobile tracking sensor systems have multifunctional sensor requirements including intrusion (tampering), biochemical, radiation and explosives detection. This paper will review the state of the art of photonic sensor technologies and their ability to meet the challenges of transportation security.

  5. Using RFID to Enhance Security in Off-Site Data Storage

    PubMed Central

    Lopez-Carmona, Miguel A.; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R.

    2010-01-01

    Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention. PMID:22163638

  6. A Joint Force Medical Command is Required to Fix Combat Casualty Care

    DTIC Science & Technology

    2017-10-05

    that poses an operations security risk. Author: ☒ PA: ☒ 13. SUPPLEMENTARY NOTES Word Count: 10,665 14. ABSTRACT The Military Health System...15. SUBJECT TERMS Military Health System, Joint Trauma System, Defense Health Agency, PROFIS 16. SECURITY CLASSIFICATION OF: 17...The Military Health System (MHS) is required to provide medical operational forces for military and contingency operations while also providing

  7. Fixing health care before it fixes us.

    PubMed

    Kotlikoff, Laurence J

    2009-02-01

    The current American health care system is beyond repair. The problems of the health care system are delineated in this discussion. The current health care system needs to be replaced in its entirety with a new system that provides every American with first-rate, first-tier medicine and that doesn't drive our nation broke. The author describes a 10-point Medical Security System, which he proposes will address the problems of the current health care system.

  8. Securing Volunteers to Fix up the School. Research Brief

    ERIC Educational Resources Information Center

    Johnston, Howard

    2011-01-01

    How can schools secure volunteers to help fix up the building and grounds? There isn't much research on how to secure volunteers to participate in school clean-ups and fix-ups, but some key ideas can be found in anecdotal examples from many communities around the nation. The first recommendation is that securing volunteers is easier when the…

  9. Methods for developing jam-resistant security communications networks at fixed-site facilities

    NASA Astrophysics Data System (ADS)

    Gangel, D. J.; Heustess, J. E.; Snell, M. K.

    Considerable work has been done identifying and developing equipment and procedures that can be used to improve the survivability of a security communications network during a jamming assault. Insight is given into alternate communications methods that can be used to develop resistance to jamming by supplementing existing radio communications. The spatial properties of jamming are then discussed and examples of how these properties can be explocited are examined. Also discussed are spread-spectrum radios that are highly resistant to jamming and the importance of jamming exercises.

  10. Feasibility Study of Solar Photovoltaics on Landfills in Puerto Rico (Second Study)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Salasovich, J.; Mosey, G.

    2011-08-01

    This report presents the results of an assessment of the technical and economic feasibility of deploying a solar photovoltaics (PV) system on landfill sites in Puerto Rico. The purpose of this report is to assess the landfills with the highest potential for possible solar PV installation and estimate cost, performance, and site impacts of three different PV options: crystalline silicon (fixed tilt), crystalline silicon (single-axis tracking), and thin film (fixed tilt). The report outlines financing options that could assist in the implementation of a system. According to the site production calculations, the most cost-effective system in terms of return onmore » investment is the thin-film fixed-tilt technology. The report recommends financing options that could assist in the implementation of such a system. The landfills and sites considered in this report were all determined feasible areas in which to implement solar PV systems.« less

  11. 46 CFR 107.235 - Servicing of hand portable fire extinguishers, semi-portable fire extinguishers and fixed fire...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Servicing of hand portable fire extinguishers, semi-portable fire extinguishers and fixed fire extinguishing systems. 107.235 Section 107.235 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND...

  12. 46 CFR 107.235 - Servicing of hand portable fire extinguishers, semi-portable fire extinguishers and fixed fire...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Servicing of hand portable fire extinguishers, semi-portable fire extinguishers and fixed fire-extinguishing systems. 107.235 Section 107.235 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND...

  13. 46 CFR 107.235 - Servicing of hand portable fire extinguishers, semi-portable fire extinguishers and fixed fire...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Servicing of hand portable fire extinguishers, semi-portable fire extinguishers and fixed fire-extinguishing systems. 107.235 Section 107.235 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND...

  14. 46 CFR 107.235 - Servicing of hand portable fire extinguishers, semi-portable fire extinguishers and fixed fire...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Servicing of hand portable fire extinguishers, semi-portable fire extinguishers and fixed fire extinguishing systems. 107.235 Section 107.235 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND...

  15. 46 CFR 107.235 - Servicing of hand portable fire extinguishers, semi-portable fire extinguishers and fixed fire...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Servicing of hand portable fire extinguishers, semi-portable fire extinguishers and fixed fire extinguishing systems. 107.235 Section 107.235 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND...

  16. A Seasoned Instructor's New Look at Fixed-Income Securities: An Exercise Using Discounted Bonds

    ERIC Educational Resources Information Center

    Secrest, Thomas W.

    2012-01-01

    Having returned to teaching the basics of pricing fixed-income securities after several years, the author recalls the difficulty students have in understanding the total return provided by fixed-income securities that are purchased at either a discount or premium from face value. This teaching note attempts to clarify the concept by suggesting…

  17. Fixed-point Design of the Lattice-reduction-aided Iterative Detection and Decoding Receiver for Coded MIMO Systems

    DTIC Science & Technology

    2011-01-01

    reliability, e.g., Turbo Codes [2] and Low Density Parity Check ( LDPC ) codes [3]. The challenge to apply both MIMO and ECC into wireless systems is on...REPORT Fixed-point Design of theLattice-reduction-aided Iterative Detection andDecoding Receiver for Coded MIMO Systems 14. ABSTRACT 16. SECURITY...illustrates the performance of coded LR aided detectors. 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13. SUPPLEMENTARY NOTES The views, opinions

  18. 49 CFR 659.11 - Confidentiality of investigation reports and security plans.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Confidentiality of investigation reports and security plans. 659.11 Section 659.11 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL TRANSIT ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE SAFETY OVERSIGHT Role of the State § 659.11...

  19. 76 FR 52998 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change by NYSE...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-24

    ... assets in Fixed Income Securities denominated in U.S. dollars. The Fund may invest in Money Market... shorter depending upon market conditions. The Fund may also invest in short-term Money Market Securities.... government securities, as applicable. Money Market Securities Assets not invested in Fixed Income Securities...

  20. 46 CFR 108.430 - General.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Automatic Sprinkling Systems § 108.430 General. Automatic Sprinkler Systems shall comply with NFPA 13-1996. [CGD 95-028, 62 FR 51208, Sept. 30, 1997] Fixed Carbon Dioxide Fire Extinguishing...

  1. 46 CFR 108.430 - General.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Automatic Sprinkling Systems § 108.430 General. Automatic Sprinkler Systems shall comply with NFPA 13-1996. [CGD 95-028, 62 FR 51208, Sept. 30, 1997] Fixed Carbon Dioxide Fire Extinguishing...

  2. 46 CFR 108.430 - General.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Automatic Sprinkling Systems § 108.430 General. Automatic Sprinkler Systems shall comply with NFPA 13-1996. [CGD 95-028, 62 FR 51208, Sept. 30, 1997] Fixed Carbon Dioxide Fire Extinguishing...

  3. 46 CFR 108.430 - General.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Automatic Sprinkling Systems § 108.430 General. Automatic Sprinkler Systems shall comply with NFPA 13-1996. [CGD 95-028, 62 FR 51208, Sept. 30, 1997] Fixed Carbon Dioxide Fire Extinguishing...

  4. 46 CFR 108.430 - General.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Automatic Sprinkling Systems § 108.430 General. Automatic Sprinkler Systems shall comply with NFPA 13-1996. [CGD 95-028, 62 FR 51208, Sept. 30, 1997] Fixed Carbon Dioxide Fire Extinguishing...

  5. 49 CFR 1562.25 - Fixed base operator requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Fixed base operator requirements. 1562.25 Section 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY... Operations § 1562.25 Fixed base operator requirements. (a) Security program. Each FBO must adopt and carry...

  6. 49 CFR 1562.25 - Fixed base operator requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Fixed base operator requirements. 1562.25 Section 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY... Operations § 1562.25 Fixed base operator requirements. (a) Security program. Each FBO must adopt and carry...

  7. 49 CFR 1562.25 - Fixed base operator requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Fixed base operator requirements. 1562.25 Section 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY... Operations § 1562.25 Fixed base operator requirements. (a) Security program. Each FBO must adopt and carry...

  8. 49 CFR 1562.25 - Fixed base operator requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fixed base operator requirements. 1562.25 Section 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY... Operations § 1562.25 Fixed base operator requirements. (a) Security program. Each FBO must adopt and carry...

  9. Environmental setting of fixed sites in the western Lake Michigan drainages, Michigan and Wisconsin

    USGS Publications Warehouse

    Sullivan, D.J.; Peterson, E.M.; Richards, K.D.

    1995-01-01

    This report describes selected environmental- setting features for 11 fixed surface-water sites in the Western Lake Michigan Drainages study unit of the National Water-Quality Assessment Pro- gram. The study unit, which includes 10 major river systems draining to Lake Michigan, is bounded on the south by the Illinois State line and extends north to about 31 miles north of Escanaba, Mich. The fixed sites are on the following streams: Peshekee River, Popple River, Menominee River, Pensaukee River, Duck Creek, Tomorrow River, East River, Fox River, North Branch Milwaukee River, Lincoln Creek, and Milwaukee River. Drainage basins above these sites receive runoff from land uses and land covers, bedrock types, and surficial deposits representative of the main types of each of these characteristics in the study unit. Data types collected at the fixed sites include water chemistry; organic compounds and trace elements in streambed sediment and biological tissues; algal, benthic-invertebrate, and fish communities; and aquatic habitat. Field measurements include water temperature, pH, specific conductance, alkalinity, and dissolved oxygen. Results of water- quality field measurements indicate little variation in temperature among the fixed sites. Specific conductance and alkalinity were generally higher at sites underlain by carbonate bedrock than at sites underlain by igneous/metamorphic bedrock. Differences in pH among the fixed sites were less than those for specific conductance and alkalinity, but pH seemed to increase slightly from north to south. Dissolved-oxygen concentration varied more at agricultural sites than at forested and urban sites, perhaps because of higher nutrient inputs at agricultural sites. The information included in this report has been assembled as reference material for ongoing studies at the fixed sites.

  10. 78 FR 20705 - Fixed Income Roundtable

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-05

    ... of fixed income markets. The roundtable will focus on the municipal securities, corporate bonds, and... corporate bonds and asset-backed securities. The participants in the third panel will discuss potential... discuss potential improvements to the market structure for corporate bonds and asset-backed securities...

  11. Use of a secure Internet Web site for collaborative medical research.

    PubMed

    Marshall, W W; Haley, R W

    2000-10-11

    Researchers who collaborate on clinical research studies from diffuse locations need a convenient, inexpensive, secure way to record and manage data. The Internet, with its World Wide Web, provides a vast network that enables researchers with diverse types of computers and operating systems anywhere in the world to log data through a common interface. Development of a Web site for scientific data collection can be organized into 10 steps, including planning the scientific database, choosing a database management software system, setting up database tables for each collaborator's variables, developing the Web site's screen layout, choosing a middleware software system to tie the database software to the Web site interface, embedding data editing and calculation routines, setting up the database on the central server computer, obtaining a unique Internet address and name for the Web site, applying security measures to the site, and training staff who enter data. Ensuring the security of an Internet database requires limiting the number of people who have access to the server, setting up the server on a stand-alone computer, requiring user-name and password authentication for server and Web site access, installing a firewall computer to prevent break-ins and block bogus information from reaching the server, verifying the identity of the server and client computers with certification from a certificate authority, encrypting information sent between server and client computers to avoid eavesdropping, establishing audit trails to record all accesses into the Web site, and educating Web site users about security techniques. When these measures are carefully undertaken, in our experience, information for scientific studies can be collected and maintained on Internet databases more efficiently and securely than through conventional systems of paper records protected by filing cabinets and locked doors. JAMA. 2000;284:1843-1849.

  12. 46 CFR 108.431 - Carbon dioxide systems: General.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Carbon dioxide systems: General. 108.431 Section 108.431 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.431 Carbon dioxide systems: General. (a)...

  13. 46 CFR 108.431 - Carbon dioxide systems: General.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Carbon dioxide systems: General. 108.431 Section 108.431 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.431 Carbon dioxide systems: General. (a)...

  14. 46 CFR 108.431 - Carbon dioxide systems: General.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Carbon dioxide systems: General. 108.431 Section 108.431 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.431 Carbon dioxide systems: General. (a)...

  15. 46 CFR 108.431 - Carbon dioxide systems: General.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Carbon dioxide systems: General. 108.431 Section 108.431 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.431 Carbon dioxide systems: General. (a)...

  16. The Role of Unmanned Aerial Systems/Sensors in Air Quality Research

    EPA Science Inventory

    The use of unmanned aerial systems (UASs) for a variety of scientific and security purposes has rapidly increased. UASs include aerostats (tethered balloons) and remotely controlled, unmanned aerial vehicles (UAVs) including lighter-than-air vessels, fixed wing airplanes, and he...

  17. The Role of Unmanned Aerial Systems-Sensors in Air Quality Research

    EPA Science Inventory

    The use of unmanned aerial systems (UASs) and miniaturized sensors for a variety of scientific and security purposes has rapidly increased. UASs include aerostats (tethered balloons) and remotely controlled, unmanned aerial vehicles (UAVs) including lighter-than-air vessels, fix...

  18. 46 CFR 108.443 - Controls and valves.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.443 Controls and valves. (a) At least one control for operating a CO2 system must be outside the space or spaces that the...

  19. 19. SITE BUILDING 002 SCANNER BUILDING AIR POLICE ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. SITE BUILDING 002 - SCANNER BUILDING - AIR POLICE SITE SECURITY OFFICE WITH "SITE PERIMETER STATUS PANEL" AND REAL TIME VIDEO DISPLAY OUTPUT FROM VIDEO CAMERA SYSTEM AT SECURITY FENCE LOCATIONS. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA

  20. The design and implementation of web mining in web sites security

    NASA Astrophysics Data System (ADS)

    Li, Jian; Zhang, Guo-Yin; Gu, Guo-Chang; Li, Jian-Li

    2003-06-01

    The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information, so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density-Based Clustering technique is used to reduce resource cost and obtain better efficiency.

  1. 78 FR 77511 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Order Approving Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-23

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71091; File No. SR-FICC-2013-09] Self...[supreg] at FICC's Government Securities Division December 17, 2013. I. Introduction On October 28, 2013, the Fixed Income Clearing Corporation (``FICC'') filed with the Securities and Exchange Commission...

  2. Discussion and a new method of optical cryptosystem based on interference

    NASA Astrophysics Data System (ADS)

    Lu, Dajiang; He, Wenqi; Liao, Meihua; Peng, Xiang

    2017-02-01

    A discussion and an objective security analysis of the well-known optical image encryption based on interference are presented in this paper. A new method is also proposed to eliminate the security risk of the original cryptosystem. For a possible practical application, we expand this new method into a hierarchical authentication scheme. In this authentication system, with a pre-generated and fixed random phase lock, different target images indicating different authentication levels are analytically encoded into corresponding phase-only masks (phase keys) and amplitude-only masks (amplitude keys). For the authentication process, a legal user can obtain a specified target image at the output plane if his/her phase key, and amplitude key, which should be settled close against the fixed internal phase lock, are respectively illuminated by two coherent beams. By comparing the target image with all the standard certification images in the database, the system can thus verify the user's legality even his/her identity level. Moreover, in despite of the internal phase lock of this system being fixed, the crosstalk between different pairs of keys held by different users is low. Theoretical analysis and numerical simulation are both provided to demonstrate the validity of this method.

  3. 46 CFR 108.455 - Enclosure openings.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Enclosure openings. 108.455 Section 108.455 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.455 Enclosure...

  4. 46 CFR 108.453 - Discharge outlets.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Discharge outlets. 108.453 Section 108.453 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.453 Discharge...

  5. 46 CFR 108.453 - Discharge outlets.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Discharge outlets. 108.453 Section 108.453 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.453 Discharge...

  6. 46 CFR 108.455 - Enclosure openings.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Enclosure openings. 108.455 Section 108.455 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.455 Enclosure...

  7. Using digital watermarking to enhance security in wireless medical image transmission.

    PubMed

    Giakoumaki, Aggeliki; Perakis, Konstantinos; Banitsas, Konstantinos; Giokas, Konstantinos; Tachakra, Sapal; Koutsouris, Dimitris

    2010-04-01

    During the last few years, wireless networks have been increasingly used both inside hospitals and in patients' homes to transmit medical information. In general, wireless networks suffer from decreased security. However, digital watermarking can be used to secure medical information. In this study, we focused on combining wireless transmission and digital watermarking technologies to better secure the transmission of medical images within and outside the hospital. We utilized an integrated system comprising the wireless network and the digital watermarking module to conduct a series of tests. The test results were evaluated by medical consultants. They concluded that the images suffered no visible quality degradation and maintained their diagnostic integrity. The proposed integrated system presented reasonable stability, and its performance was comparable to that of a fixed network. This system can enhance security during the transmission of medical images through a wireless channel.

  8. 17 CFR 270.3a-7 - Issuers of asset-backed securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... holders to receive payments that depend primarily on the cash flow from eligible assets; (2) Securities... parties in those eligible assets that principally generate the cash flow needed to pay the fixed-income... the cash flows derived from eligible assets for the benefit of the holders of fixed-income securities...

  9. 17 CFR 270.3a-7 - Issuers of asset-backed securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... holders to receive payments that depend primarily on the cash flow from eligible assets; (2) Securities... parties in those eligible assets that principally generate the cash flow needed to pay the fixed-income... the cash flows derived from eligible assets for the benefit of the holders of fixed-income securities...

  10. 17 CFR 270.3a-7 - Issuers of asset-backed securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... holders to receive payments that depend primarily on the cash flow from eligible assets; (2) Securities... parties in those eligible assets that principally generate the cash flow needed to pay the fixed-income... the cash flows derived from eligible assets for the benefit of the holders of fixed-income securities...

  11. 17 CFR 270.3a-7 - Issuers of asset-backed securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... holders to receive payments that depend primarily on the cash flow from eligible assets; (2) Securities... parties in those eligible assets that principally generate the cash flow needed to pay the fixed-income... the cash flows derived from eligible assets for the benefit of the holders of fixed-income securities...

  12. 17 CFR 270.3a-7 - Issuers of asset-backed securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... holders to receive payments that depend primarily on the cash flow from eligible assets; (2) Securities... parties in those eligible assets that principally generate the cash flow needed to pay the fixed-income... the cash flows derived from eligible assets for the benefit of the holders of fixed-income securities...

  13. 46 CFR 34.17-10 - Controls-T/ALL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Fixed Foam Extinguishing Systems, Details § 34.17-10 Controls—T/ALL. (a) The foam agent, its container, measuring devices, and other items peculiar to the system shall be of an approved type. (b) The foam-producing material...

  14. 46 CFR 34.17-10 - Controls-T/ALL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Fixed Foam Extinguishing Systems, Details § 34.17-10 Controls—T/ALL. (a) The foam agent, its container, measuring devices, and other items peculiar to the system shall be of an approved type. (b) The foam-producing material...

  15. 46 CFR 108.477 - Fire hydrants.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Fire hydrants. 108.477 Section 108.477 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Foam Extinguishing Systems § 108.477 Fire hydrants. (a) If a fixed foam...

  16. 46 CFR 108.443 - Controls and valves.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Controls and valves. 108.443 Section 108.443 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.443 Controls and...

  17. 46 CFR 108.443 - Controls and valves.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Controls and valves. 108.443 Section 108.443 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.443 Controls and...

  18. Recombinant Human Factor IX Produced from Transgenic Porcine Milk

    PubMed Central

    Lee, Meng-Hwan; Lin, Yin-Shen; Tu, Ching-Fu; Yen, Chon-Ho

    2014-01-01

    Production of biopharmaceuticals from transgenic animal milk is a cost-effective method for highly complex proteins that cannot be efficiently produced using conventional systems such as microorganisms or animal cells. Yields of recombinant human factor IX (rhFIX) produced from transgenic porcine milk under the control of the bovine α-lactalbumin promoter reached 0.25 mg/mL. The rhFIX protein was purified from transgenic porcine milk using a three-column purification scheme after a precipitation step to remove casein. The purified protein had high specific activity and a low ratio of the active form (FIXa). The purified rhFIX had 11.9 γ-carboxyglutamic acid (Gla) residues/mol protein, which approached full occupancy of the 12 potential sites in the Gla domain. The rhFIX was shown to have a higher isoelectric point and lower sialic acid content than plasma-derived FIX (pdFIX). The rhFIX had the same N-glycosylation sites and phosphorylation sites as pdFIX, but had a higher specific activity. These results suggest that rhFIX produced from porcine milk is physiologically active and they support the use of transgenic animals as bioreactors for industrial scale production in milk. PMID:24955355

  19. EPA SITE DEMONSTRATION OF BIOTROL AQUEOUS TREATMENT SYSTEM.

    EPA Science Inventory

    BioTrol's pilot scale, fixed-film biological system wa evaluated, under the EPA's SITE program, for its effectiveness at removing pentachlorophenol from groundwater. The demonstration wasa performed in the summer of 1989 at a wood preserving site in New Brighton, Minnesota. The ...

  20. 33 CFR 149.415 - What are the requirements for a fire main system on a manned deepwater port?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... complex must have a fixed fire main system. The system must either: (1) Comply with 46 CFR 108.415 through... fire main system on a manned deepwater port? 149.415 Section 149.415 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: DESIGN...

  1. 75 FR 66815 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-29

    ... Underlying Index measures the performance of investment-grade taxable debt securities of the U.S. municipal... of ICUs based on certain fixed income indexes. See, e.g., Securities Exchange Act Release No. 48662... Investment Company Units based on a fixed income index in Securities Exchange Act Release No. 55783 (May 17...

  2. 46 CFR 108.433 - Quantity of CO2: General.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Quantity of CO2: General. 108.433 Section 108.433 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.433...

  3. 46 CFR 108.445 - Alarm and means of escape.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Alarm and means of escape. 108.445 Section 108.445 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.445...

  4. 46 CFR 108.433 - Quantity of CO2: General.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Quantity of CO2: General. 108.433 Section 108.433 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.433...

  5. 46 CFR 108.433 - Quantity of CO2: General.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Quantity of CO2: General. 108.433 Section 108.433 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.433...

  6. 46 CFR 108.445 - Alarm and means of escape.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Alarm and means of escape. 108.445 Section 108.445 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.445...

  7. 46 CFR 108.451 - CO2 storage.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false CO2 storage. 108.451 Section 108.451 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.451 CO2 storage. (a...

  8. 46 CFR 108.451 - CO2 storage.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false CO2 storage. 108.451 Section 108.451 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.451 CO2 storage. (a...

  9. 46 CFR 108.451 - CO2 storage.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false CO2 storage. 108.451 Section 108.451 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.451 CO2 storage. (a...

  10. 46 CFR 108.451 - CO2 storage.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false CO2 storage. 108.451 Section 108.451 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.451 CO2 storage. (a...

  11. 46 CFR 108.451 - CO2 storage.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false CO2 storage. 108.451 Section 108.451 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.451 CO2 storage. (a...

  12. Determining Tactical Usage Of Non-Lethal Weapons For Fixed Site Security Of U.S. Embassies

    DTIC Science & Technology

    2017-06-01

    Nigeria, including a bombing of the UN headquarters building in Abuja in 2011 (Mshelizza, 2011). Figure 2 shows a map of Nigeria, and Figure 3 shows a...radiofrequency countermeasures; electro-magnetic ( EM ) compatibility and deception; EM hardening, interference, intrusion, and jamming; electronic masking...Boko Haram claim U.N. bombing . Reuters. Retrieved from http://www.reuters.com/article/us-nigeria- bombing -claim- idUSTRE77S3ZO20110829 Nance, R. E

  13. Social Security Is Fair to All Generations: Demystifying the Trust Fund, Solvency, and the Promise to Younger Americans.

    PubMed

    Buchanan, Neil H

    The Social Security system has come under attack for having illegitimately transferred wealth from younger generations to the Baby Boom generation. This attack is unfounded, because it fails to understand how the system was altered in order to force the Baby Boomers to finance their own benefits in retirement. Any challenges that Social Security now faces are not caused by the pay-as-you-go structure of the system but by Baby Boomers' other policy errors, especially the emergence of extreme economic inequality since 1980. Attempting to fix the wrong problem all but guarantees a solution that will make matters worse. Generational justice and distributive justice go hand in hand.

  14. Vehicle barrier

    DOEpatents

    Hirsh, Robert A.

    1991-01-01

    A vehicle security barrier which can be conveniently placed across a gate opening as well as readily removed from the gate opening to allow for easy passage. The security barrier includes a barrier gate in the form of a cable/gate member in combination with laterally attached pipe sections fixed by way of the cable to the gate member and lateral, security fixed vertical pipe posts. The security barrier of the present invention provides for the use of cable restraints across gate openings to provide necessary security while at the same time allowing for quick opening and closing of the gate areas without compromising security.

  15. Implantation of active fixation leads in coronary veins for left ventricular stimulation: report of five cases.

    PubMed

    Hansky, Bert; Vogt, Juergen; Gueldner, Holger; Schulte-Eistrup, Sebastian; Lamp, Barbara; Heintze, Johannes; Horstkotte, Dieter; Koerfer, Reiner

    2007-01-01

    Securing transvenous left ventricular (LV) pacing leads without an active fixation mechanism in proximal coronary vein (CV) segments is usually challenging and frequently impossible. We investigated how active fixation leads can be safely implanted in this location, how to avoid perforating the free wall of the CV, and how to recognize and respond to perforations. In five patients with no alternative to LV pacing from proximal CV segments, 4 Fr SelectSecure (Medtronic, Minneapolis, MN, USA) leads, which have a fixed helix, were implanted through a modified 6 Fr guide catheter with a pre-shaped tip (Launcher, Medtronic). Active fixation leads were successfully implanted in proximal CVs in five patients. There were no complications. Acute and chronic pacing thresholds were comparable to those of conventional CV leads. The pre-shaped guide catheter tip remains in close proximity to the myocardial aspect of the CV, directing the lead helix toward a safe implantation site. If only proximal CV pacing sites are available, 4 Fr SelectSecure leads can be safely implanted through a modified Launcher guide catheter, avoiding more invasive implantation techniques. Other than venous stenting or implantation of leads with retractable tines, SelectSecure leads are expected to remain extractable.

  16. A PDA-based flexible telecommunication system for telemedicine applications.

    PubMed

    Nazeran, Homer; Setty, Sunil; Haltiwanger, Emily; Gonzalez, Virgilio

    2004-01-01

    Technology has been used to deliver health care at a distance for many years. Telemedicine is a rapidly growing area and recently there are studies devoted to prehospital care of patients in emergency cases. In this work we have developed a compact, reliable, and low cost PDA-based telecommunication device for telemedicine applications to transmit audio, still images, and vital signs from a remote site to a fixed station such as a clinic or a hospital in real time. This was achieved based on a client-server architecture. A Pocket PC, a miniature camera, and a hands-free microphone were used at the client site and a desktop computer running the Windows XP operating system was used as a server. The server was located at a fixed station. The system was implemented on TCP/IP and HTTP protocol. Field tests have shown that the system can reliably transmit still images, audio, and sample vital signs from a simulated remote site to a fixed station either via a wired or wireless network in real time. The Pocket PC was used at the client site because of its compact size, low cost and processing capabilities.

  17. Underwater Light Regimes in Rivers from Multiple Measurement Approaches

    NASA Astrophysics Data System (ADS)

    Gardner, J.; Ensign, S.; Houser, J.; Doyle, M.

    2017-12-01

    Underwater light regimes are complex over space and time. Light in rivers is less understood compared to other aquatic systems, yet light is often the limiting resource and a fundamental control of many biological and physical processes in riverine systems. We combined multiple measurement approaches (fixed-site and flowpath) to understand underwater light regimes. We measured vertical light profiles over time (fixed-site) with stationary buoys and over space and time (flowpath) with Lagrangian neutrally buoyant sensors in two different large US rivers; the Upper Mississippi River in Wisconsin, USA and the Neuse River in North Carolina, USA. Fixed site data showed light extinction coefficients, and therefore the depth of the euphotic zone, varied up to three-fold within a day. Flowpath data revealed the stochastic nature of light regimes from the perspective of a neutrally buoyant particle as it moves throughout the water column. On average, particles were in the euphotic zone between 15-50% of the time. Combining flowpath and fixed-site data allowed spatial disaggregation of a river reach to determine if changes in the light regime were due to space or time as well as development of a conceptual model of the dynamic euphotic zone of rivers.

  18. 33 CFR 165.763 - Moving and Fixed Security Zone, Port of Fredericksted, Saint Croix, U.S. Virgin Islands.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., Saint Croix, U.S. Virgin Islands. (a) Location. A moving and fixed security zone is established that surrounds all cruise ships entering, departing, mooring or anchoring in the Port of Fredericksted, Saint Croix, U.S. Virgin Islands. The security zone extends from the cruise ship outward and forms a 50-yard...

  19. 33 CFR 165.763 - Moving and Fixed Security Zone, Port of Fredericksted, Saint Croix, U.S. Virgin Islands.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., Saint Croix, U.S. Virgin Islands. (a) Location. A moving and fixed security zone is established that surrounds all cruise ships entering, departing, mooring or anchoring in the Port of Fredericksted, Saint Croix, U.S. Virgin Islands. The security zone extends from the cruise ship outward and forms a 50-yard...

  20. 33 CFR 165.763 - Moving and Fixed Security Zone, Port of Fredericksted, Saint Croix, U.S. Virgin Islands.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., Saint Croix, U.S. Virgin Islands. (a) Location. A moving and fixed security zone is established that surrounds all cruise ships entering, departing, mooring or anchoring in the Port of Fredericksted, Saint Croix, U.S. Virgin Islands. The security zone extends from the cruise ship outward and forms a 50-yard...

  1. 33 CFR 165.763 - Moving and Fixed Security Zone, Port of Fredericksted, Saint Croix, U.S. Virgin Islands.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., Saint Croix, U.S. Virgin Islands. (a) Location. A moving and fixed security zone is established that surrounds all cruise ships entering, departing, mooring or anchoring in the Port of Fredericksted, Saint Croix, U.S. Virgin Islands. The security zone extends from the cruise ship outward and forms a 50-yard...

  2. 33 CFR 165.763 - Moving and Fixed Security Zone, Port of Fredericksted, Saint Croix, U.S. Virgin Islands.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., Saint Croix, U.S. Virgin Islands. (a) Location. A moving and fixed security zone is established that surrounds all cruise ships entering, departing, mooring or anchoring in the Port of Fredericksted, Saint Croix, U.S. Virgin Islands. The security zone extends from the cruise ship outward and forms a 50-yard...

  3. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals. Job Profiles

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Job Profiles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  4. Implementation Guidelines for State Safety Oversight of Rail Fixed Guideway Systems

    DOT National Transportation Integrated Search

    1996-06-01

    These guidelines will assist states, oversight agencies, and rail transit agencies in developing safety and security programs to satisfy the requirements of the Federal Transit Administration (FTA). These requirements were published in the Federal Re...

  5. Railway cognitive radio to enhance safety, security, and performance of positive train control.

    DOT National Transportation Integrated Search

    2013-02-01

    Robust and interoperable wireless communications are vital to Positive Train Control (PTC). The railway industry has started adopting software-defined radios (SDRs) for packet-data transmission. SDR systems realize previously fixed components as reco...

  6. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  7. Floating nut retention system

    NASA Technical Reports Server (NTRS)

    Charles, J. F.; Theakston, H. A. (Inventor)

    1980-01-01

    A floating nut retention system includes a nut with a central aperture. An inner retainer plate has an opening which is fixedly aligned with the nut aperture. An outer retainer member is formed of a base plate having an opening and a surface adjacent to a surface of the inner retainer plate. The outer retainer member includes a securing mechanism for retaining the inner retainer plate adjacent to the outer retainer member. The securing mechanism enables the inner retainer plate to float with respect to the outer retainer number, while simultaneously forming a bearing surface for inner retainer plate.

  8. Building a Successful Security Infrastructure: What You Want vs. What You Need vs. What You Can Afford

    NASA Technical Reports Server (NTRS)

    Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)

    1995-01-01

    With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.

  9. Fully integrated automated security surveillance system: managing a changing world through managed technology and product applications

    NASA Astrophysics Data System (ADS)

    Francisco, Glen; Brown, Todd

    2012-06-01

    Integrated security systems are essential to pre-empting criminal assaults. Nearly 500,000 sites have been identified (source: US DHS) as critical infrastructure sites that would suffer severe damage if a security breach should occur. One major breach in any of 123 U.S. facilities, identified as "most critical", threatens more than 1,000,000 people. The vulnerabilities of critical infrastructure are expected to continue and even heighten over the coming years.

  10. Security region-based small signal stability analysis of power systems with FSIG based wind farm

    NASA Astrophysics Data System (ADS)

    Qin, Chao; Zeng, Yuan; Yang, Yang; Cui, Xiaodan; Xu, Xialing; Li, Yong

    2018-02-01

    Based on the Security Region approach, the impact of fixed-speed induction generator based wind farm on the small signal stability of power systems is analyzed. Firstly, the key factors of wind farm on the small signal stability of power systems are analyzed and the parameter space for small signal stability region is formed. Secondly, the small signal stability region of power systems with wind power is established. Thirdly, the corresponding relation between the boundary of SSSR and the dominant oscillation mode is further studied. Results show that the integration of fixed-speed induction generator based wind farm will cause the low frequency oscillation stability of the power system deteriorate. When the output of wind power is high, the oscillation stability of the power system is mainly concerned with the inter-area oscillation mode caused by the integration of the wind farm. Both the active power output and the capacity of reactive power compensation of the wind farm have a significant influence on the SSSR. To improve the oscillation stability of power systems with wind power, it is suggested to reasonably set the reactive power compensation capacity for the wind farm through SSSR.

  11. Perimeter security alarm system based on fiber Bragg grating

    NASA Astrophysics Data System (ADS)

    Zhang, Cui; Wang, Lixin

    2010-11-01

    With the development of the society and economy and the improvement of living standards, people need more and more pressing security. Perimeter security alarm system is widely regarded as the first line of defense. A highly sensitive Fiber Bragg grating (FBG) vibration sensor based on the theory of the string vibration, combined with neural network adaptive dynamic programming algorithm for the perimeter security alarm system make the detection intelligently. Intelligent information processing unit identify the true cause of the vibration of the invasion or the natural environment by analyzing the frequency of vibration signals, energy, amplitude and duration. Compared with traditional perimeter security alarm systems, such as infrared perimeter security system and electric fence system, FBG perimeter security alarm system takes outdoor passive structures, free of electromagnetic interference, transmission distance through optical fiber can be as long as 20 km It is able to detect the location of event within short period of time (high-speed response, less than 3 second).This system can locate the fiber cable's breaking sites and alarm automatically if the cable were be cut. And the system can prevent effectively the false alarm from small animals, birds, strong wind, scattering things, snowfalls and vibration of sensor line itself. It can also be integrated into other security systems. This system can be widely used in variety fields such as military bases, nuclear sites, airports, warehouses, prisons, residence community etc. It will be a new force of perimeter security technology.

  12. 46 CFR 193.05-10 - Fixed fire extinguishing systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ....05-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH... combustion engine installations; (2) Gas turbine installations; (3) Enclosed spaces containing gasoline engines; (4) Chemical storerooms; (5) Any space containing auxiliaries with an aggregate power of 1,000...

  13. 46 CFR 193.05-10 - Fixed fire extinguishing systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ....05-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH... combustion engine installations; (2) Gas turbine installations; (3) Enclosed spaces containing gasoline engines; (4) Chemical storerooms; (5) Any space containing auxiliaries with an aggregate power of 1,000...

  14. 46 CFR 193.05-10 - Fixed fire extinguishing systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ....05-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH... combustion engine installations; (2) Gas turbine installations; (3) Enclosed spaces containing gasoline engines; (4) Chemical storerooms; (5) Any space containing auxiliaries with an aggregate power of 1,000...

  15. Remote video assessment for missile launch facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wagner, G.G.; Stewart, W.A.

    1995-07-01

    The widely dispersed, unmanned launch facilities (LFs) for land-based ICBMs (intercontinental ballistic missiles) currently do not have visual assessment capability for existing intrusion alarms. The security response force currently must assess each alarm on-site. Remote assessment will enhance manpower, safety, and security efforts. Sandia National Laboratories was tasked by the USAF Electronic Systems Center to research, recommend, and demonstrate a cost-effective remote video assessment capability at missile LFs. The project`s charter was to provide: system concepts; market survey analysis; technology search recommendations; and operational hardware demonstrations for remote video assessment from a missile LF to a remote security center viamore » a cost-effective transmission medium and without using visible, on-site lighting. The technical challenges of this project were to: analyze various video transmission media and emphasize using the existing missile system copper line which can be as long as 30 miles; accentuate and extremely low-cost system because of the many sites requiring system installation; integrate the video assessment system with the current LF alarm system; and provide video assessment at the remote sites with non-visible lighting.« less

  16. Context matters: the structure of task goals affects accuracy in multiple-target visual search.

    PubMed

    Clark, Kait; Cain, Matthew S; Adcock, R Alison; Mitroff, Stephen R

    2014-05-01

    Career visual searchers such as radiologists and airport security screeners strive to conduct accurate visual searches, but despite extensive training, errors still occur. A key difference between searches in radiology and airport security is the structure of the search task: Radiologists typically scan a certain number of medical images (fixed objective), and airport security screeners typically search X-rays for a specified time period (fixed duration). Might these structural differences affect accuracy? We compared performance on a search task administered either under constraints that approximated radiology or airport security. Some displays contained more than one target because the presence of multiple targets is an established source of errors for career searchers, and accuracy for additional targets tends to be especially sensitive to contextual conditions. Results indicate that participants searching within the fixed objective framework produced more multiple-target search errors; thus, adopting a fixed duration framework could improve accuracy for career searchers. Copyright © 2013 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  17. DOE's Computer Incident Advisory Capability (CIAC)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schultz, E.

    1990-09-01

    Computer security is essential in maintaining quality in the computing environment. Computer security incidents, however, are becoming more sophisticated. The DOE Computer Incident Advisory Capability (CIAC) team was formed primarily to assist DOE sites in responding to computer security incidents. Among CIAC's other responsibilities are gathering and distributing information to DOE sites, providing training workshops, coordinating with other agencies, response teams, and vendors, creating guidelines for incident handling, and developing software tools. CIAC has already provided considerable assistance to DOE sites faced with virus infections and worm and hacker attacks, has issued over 40 information bulletins, and has developed andmore » presented a workshop on incident handling. CIAC's experience in helping sites has produced several lessons learned, including the need to follow effective procedures to avoid virus infections in small systems and the need for sound password management and system administration in networked systems. CIAC's activity and scope will expand in the future. 4 refs.« less

  18. Web vulnerability study of online pharmacy sites.

    PubMed

    Kuzma, Joanne

    2011-01-01

    Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers' personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems.

  19. Measuring factor IX activity of nonacog beta pegol with commercially available one-stage clotting and chromogenic assay kits: a two-center study.

    PubMed

    Bowyer, A E; Hillarp, A; Ezban, M; Persson, P; Kitchen, S

    2016-07-01

    Essentials Validated assays are required to precisely measure factor IX (FIX) activity in FIX products. N9-GP and two other FIX products were assessed in various coagulation assay systems at two sites. Large variations in FIX activity measurements were observed for N9-GP using some assays. One-stage and chromogenic assays accurately measuring FIX activity for N9-GP were identified. Background Measurement of factor IX activity (FIX:C) with activated partial thromboplastin time-based one-stage clotting assays is associated with a large degree of interlaboratory variation in samples containing glycoPEGylated recombinant FIX (rFIX), i.e. nonacog beta pegol (N9-GP). Validation and qualification of specific assays and conditions are necessary for the accurate assessment of FIX:C in samples containing N9-GP. Objectives To assess the accuracy of various one-stage clotting and chromogenic assays for measuring FIX:C in samples containing N9-GP as compared with samples containing rFIX or plasma-derived FIX (pdFIX) across two laboratory sites. Methods FIX:C, in severe hemophilia B plasma spiked with a range of concentrations (from very low, i.e. 0.03 IU mL(-1) , to high, i.e. 0.90 IU mL(-1) ) of N9-GP, rFIX (BeneFIX), and pdFIX (Mononine), was determined at two laboratory sites with 10 commercially available one-stage clotting assays and two chromogenic FIX:C assays. Assays were performed with a plasma calibrator and different analyzers. Results A high degree of variation in FIX:C measurement was observed for one-stage clotting assays for N9-GP as compared with rFIX or pdFIX. Acceptable N9-GP recovery was observed in the low-concentration to high-concentration samples tested with one-stage clotting assays using SynthAFax or DG Synth, or with chromogenic FIX:C assays. Similar patterns of FIX:C measurement were observed at both laboratory sites, with minor differences probably being attributable to the use of different analyzers. Conclusions These results suggest that, of the reagents tested, FIX:C in N9-GP-containing plasma samples can be most accurately measured with one-stage clotting assays using SynthAFax or DG Synth, or with chromogenic FIX:C assays. © 2016 International Society on Thrombosis and Haemostasis.

  20. Technology Evaluation Report: Biological Treatment of Wood Preserving Site Groundwater by Biotrol, Inc

    EPA Science Inventory

    Biological Treatment of Wood Preserving SITE Groundwater by Biotrol, Inc. BioTrol's pilot-scale, fixed-film biological treatment system was evaluated for its effectiveness at removing pentachlorophenol from groundwater. The system employs indigenous microorganisms amended wit...

  1. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Behavioral Interview Guidelines by Job Roles

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Behavioral Interview Guidelines by Job Roles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  2. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals. Individual and Team Performance Guidelines

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Individual and Team Performance Guidelines. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  3. Arm yourself for the coming battle over Social Security.

    PubMed

    Pozen, Robert C

    2002-11-01

    The U.S. Social Security system is in deep trouble--and that's not just bad news for your friends and family. It's also bad news for your company. Unless the Social Security system is changed, by 2017 the cash flowing out of it will exceed the cash coming in, and by 2041 the system will be utterly insolvent. But the trouble will start sooner than that: In the next decade, the very prospect of the rising deficit will mean serious pressure on recent tax cuts, higher long-term interest rates, increased pension-funding costs, and other punishing conditions for U.S. businesses. Clearly, there's a lot at stake for companies, which is why executives need to participate in the growing debate about Social Security reform, says Robert Pozen, a visiting professor at Harvard Law School who served on the President's Commission to Strengthen Social Security. In this article, he urges business leaders to take a stance on how the system should be reformed, suggesting they work with interest groups to make their voices heard. After taking a comprehensive look at the debates surrounding Social Security reform, Pozen outlines the three main alternatives executives might choose to support: increasing contributions to Social Security, decreasing the growth of benefits for more-affluent workers, and increasing investment returns on Social Security assets. What's needed to fix the current system, he contends, is a careful balance of all three.

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roy, Tushar, E-mail: tushar@barc.gov.in; Kashyap, Yogesh; Shukla, Mayank

    Associated particle technique (APT) for detection of explosives is well established but has been implemented mostly for fixed portal systems. In certain situations, a portable system is required where the suspect object cannot be moved from site. This paper discusses the development of a portable APT system in single-sided geometry which can be transported to site and requires only one-sided access to the object. The system comprised D-T neutron source and bismuth germanate (BGO) detectors fixed on a portable module. Different aspects of the system have been discussed such as background contribution, time selection, and elemental signatures. The system wasmore » used to detect benign samples and explosive simulants under laboratory condition. The elemental ratios obtained by analyzing the gamma spectra show good match with the theoretical ratios.« less

  5. 77 FR 2103 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Designation of Longer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-13

    ...-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Designation of Longer Period for Commission Action on Proposed Rule Change To Allow the Mortgage-Backed Securities Division To Provide...''), and on November 21, 2011, amended a proposed rule change to allow the Mortgage-Backed Securities...

  6. 20 CFR 726.105 - Fixing the amount of security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Fixing the amount of security. 726.105 Section 726.105 Employees' Benefits EMPLOYMENT STANDARDS ADMINISTRATION, DEPARTMENT OF LABOR FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, AS AMENDED BLACK LUNG BENEFITS; REQUIREMENTS FOR COAL MINE OPERATOR...

  7. 77 FR 71430 - New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline Assessment for Security Enhancement... voluntary site visits with security and operating officials of public transportation systems. This program...

  8. Feasibility Study of a Vision-Based Landing System for Unmanned Fixed-Wing Aircraft

    DTIC Science & Technology

    2017-06-01

    International Journal of Computer Science and Network Security 7 no. 3: 112–117. Accessed April 7, 2017. http://www.sciencedirect.com/science/ article /pii...the feasibility of applying computer vision techniques and visual feedback in the control loop for an autonomous system. This thesis examines the...integration into an autonomous aircraft control system. 14. SUBJECT TERMS autonomous systems, auto-land, computer vision, image processing

  9. Safe and Secure Services Based on NGN

    NASA Astrophysics Data System (ADS)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  10. A Design of a Surgical Site Verification System.

    PubMed

    Shen, Biyu; He, Yan; Chen, Haoyang

    2017-01-01

    Patient security is a significant issue in medical research and clinical practice at present. The Surgical Verification System (Patent Number: ZL 201420079273.5) is designed to recognize and check surgical sites of patients so as to ensure operation security and decrease the risk for practitioners. Composition: (1) Operating Room Server, (2) Label Reader, (3) E-Label, (4) Surgical Site Display, (5) Ward Client, (6) Label Rader-Writer, and (7) Acousto-Optic Alarm. If the Surgical identification, the surgical site, and so on are incorrect, a flashing label control will appear when the alarm rings. You can specify a sound to play for the alarm, a picture to draw, and a message to send. It is a user-friendly system.

  11. The Defender’s Dilemma: Charting a Course Toward Cybersecurity

    DTIC Science & Technology

    2015-01-01

    Security concerns on the Internet began with the introduction of the Morris worm in November 1988,1 and since that time we have wit- nessed the...Patch Tuesday .” This is when security patches and updates are released for users to implement. As such, “Exploit Wednesday” usually fol- lows “Patch... Tuesday ,” as users are not generally quick to immediately patch their systems. 23 E.g., Oracle or Microsoft patch on a fixed schedule, but will make

  12. National Security/Emergency Preparedness and Disaster Recovery Communications Via ACTS

    NASA Technical Reports Server (NTRS)

    Pasqualino, Christopher R.; Abbe, Brian S.; Dixon, Frank

    1996-01-01

    During the period from early 1993 through 1994, the U.S. National Communication System, a government agency, sponsored the development and execution of several fixed and mobile experiments using the Advanced Communications Technology Satellite (ACTS)...The results of these experiments are described in this paper.

  13. Solution of effective Hamiltonian of impurity hopping between two sites in a metal

    NASA Astrophysics Data System (ADS)

    Ye, Jinwu

    1998-03-01

    We analyze in detail all the possible fixed points of the effective Hamiltonian of a non-magnetic impurity hopping between two sites in a metal obtained by Moustakas and Fisher(MF). We find a line of non-fermi liquid fixed points which continuously interpolates between the 2-channel Kondo fixed point(2CK) and the one channel, two impurity Kondo (2IK) fixed point. There is one relevant direction with scaling dimension 1/2 and one leading irrelevant operator with dimension 3/2. There is also one marginal operator in the spin sector moving along this line. The additional non-fermi liquid fixed point found by MF has the same symmetry as the 2IK, it has two relevant directions with scaling dimension 1/2, therefore also unstable. The system is shown to flow to a line of fermi-liquid fixed points which continuously interpolates between the non-interacting fixed point and the 2 channel spin-flavor Kondo fixed point (2CSFK) discussed by the author previously. The effect of particle-hole symmetry breaking is discussed. The effective Hamiltonian in the external magnetic field is analysed. The scaling functions for the physical measurable quantities are derived in the different regimes; their predictions for the experiments are given. Finally the implications are given for a non-magnetic impurity hopping around three sites with triangular symmetry discussed by MF.

  14. The changing face of Hanford security 1990--1994

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thielman, J.

    The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almostmore » literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.« less

  15. Science and Technology Resources on the Internet: Computer Security.

    ERIC Educational Resources Information Center

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  16. The importance of effective catheter securement.

    PubMed

    Fisher, Jayne

    This article examines the importance of securing/fixing indwelling urinary catheters. The Oxford English dictionary interlinks the two words-'secure' and 'fix'-as having the same meaning. To secure the catheter should not be confused with 'support', whereby the weight of the urine drainage bag is supported with the use of velcro straps or a sleeve. The author introduces the need for the concept of this practice to be at the forefront of nurses' minds in all settings, and this is demonstrated through the use of case studies. Current guidance in this area is reviewed, as well as the problems that can arise when catheters are not secured properly and the available products for health professionals to use.

  17. 49 CFR 1562.25 - Fixed base operator requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain...

  18. TECHNOLOGY EVALUATION REPORT: BIOLOGICAL TREATMENT OF WOOD PRESERVING SITE GROUNDWATER BY BIOTROL, INC.

    EPA Science Inventory

    This report provides the in-depth data analysis from the SITE Program's six-week demonstration of BioTrol's Aqueous Treatment System (BATS) at the MacGillis and Gibbs Company wood treatment facility in New Brighton, Minnesota. he pilot scale (5gpm), fixed-film biological system u...

  19. 42 CFR 73.14 - Incident response.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., security breaches (including information systems), severe weather and other natural disasters, workplace... locations, (10) Site security and control, (11) Procedures for emergency evacuation, including type of...

  20. 76 FR 1559 - Guidelines for the Use of Electronic Voting Systems in Union Officer Elections

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-11

    ... voting. Id. However, there are still concerns regarding on-line computer security, viruses and attacks... casting votes at polling sites; electronic voting from remote site personal computers via the Internet..., Washington, DC 20210. Because of security precautions, the Department continues to experience delays in U.S...

  1. 76 FR 9356 - Intent To Request Approval From OMB of One New Public Collection of Information: Baseline...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-17

    ... during site visits with security and operating officials of transit systems. The STSIs capture and... assessments during site visits with security and operating officials of transit agencies. DATES: Send your... distance passenger railroad providers operate in the United States.\\1\\ Mass transit and passenger rail...

  2. 78 FR 63159 - Amendment to Certification of Nebraska's Central Filing System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-23

    ... system for Nebraska to permit the conversion of all debtor social security and taxpayer identification... automatically convert social security numbers and taxpayer identification numbers into ten number unique... certified central filing systems is available through the Internet on the GIPSA Web site ( http://www.gipsa...

  3. 30 CFR 56.11005 - Fixed ladder anchorage and toe clearance.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Fixed ladder anchorage and toe clearance. 56.11005 Section 56.11005 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR... Travelways § 56.11005 Fixed ladder anchorage and toe clearance. Fixed ladders shall be anchored securely and...

  4. 30 CFR 56.11005 - Fixed ladder anchorage and toe clearance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Fixed ladder anchorage and toe clearance. 56.11005 Section 56.11005 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR... Travelways § 56.11005 Fixed ladder anchorage and toe clearance. Fixed ladders shall be anchored securely and...

  5. 30 CFR 56.11005 - Fixed ladder anchorage and toe clearance.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Fixed ladder anchorage and toe clearance. 56.11005 Section 56.11005 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR... Travelways § 56.11005 Fixed ladder anchorage and toe clearance. Fixed ladders shall be anchored securely and...

  6. 30 CFR 56.11005 - Fixed ladder anchorage and toe clearance.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Fixed ladder anchorage and toe clearance. 56.11005 Section 56.11005 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR... Travelways § 56.11005 Fixed ladder anchorage and toe clearance. Fixed ladders shall be anchored securely and...

  7. 30 CFR 56.11005 - Fixed ladder anchorage and toe clearance.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Fixed ladder anchorage and toe clearance. 56.11005 Section 56.11005 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR... Travelways § 56.11005 Fixed ladder anchorage and toe clearance. Fixed ladders shall be anchored securely and...

  8. A burr hole button to secure the electrode cable in depth electrode placement. Technical note.

    PubMed

    Kamiryo, T; Laws, E R

    1997-05-01

    A simple magnetic resonance imaging-compatible buttonlike device was devised to fix a depth electrode cable securely in the burr hole used for its insertion during surgery for depth electrode placement. The button is tightly fixed in the burr hole and it holds the cable without allowing protrusion or tension on the wound.

  9. Phosphate assimilation in Rhizobium (Sinorhizobium) meliloti: identification of a pit-like gene.

    PubMed

    Bardin, S D; Voegele, R T; Finan, T M

    1998-08-01

    Rhizobium meliloti mutants defective in the phoCDET-encoded phosphate transport system form root nodules on alfalfa plants that fail to fix nitrogen (Fix-). We have previously reported that two classes of second-site mutations can suppress the Fix- phenotype of phoCDET mutants to Fix+. Here we show that one of these suppressor loci (sfx1) contains two genes, orfA and pit, which appear to form an operon transcribed in the order orfA-pit. The Pit protein is homologous to various phosphate transporters, and we present evidence that three suppressor mutations arose from a single thymidine deletion in a hepta-thymidine sequence centered 54 nucleotides upstream of the orfA transcription start site. This mutation increased the level of orfA-pit transcription. These data, together with previous biochemical evidence, show that the orfA-pit genes encode a Pi transport system that is expressed in wild-type cells grown with excess Pi but repressed in cells under conditions of Pi limitation. In phoCDET mutant cells, orfA-pit expression is repressed, but this repression is alleviated by the second-site suppressor mutations. Suppression increases orfA-pit expression compensating for the deficiencies in phosphate assimilation and symbiosis of the phoCDET mutants.

  10. In Situ/On-Site Biodegradation of Refined Oils and Fuels (A Technology Review). Volume 3. Appendices B to F.

    DTIC Science & Technology

    1992-06-01

    streams (Oxitron system). The system combines the features of activated sludge and fixed-film biological processes (see Appendix F, Biotechnologies...contaminated aqueous streams. The system combines the features of activated sludge and fixed-film biological processes (see Appendix F, Biotechnologies in... marine oil spills have been estimated to average $6.50/gal of spilled oil (Bartha and Atlas, 1977). This translates to roughly $2000 per metric ton

  11. 17 CFR 230.480 - Title of securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Title of securities. 230.480 Section 230.480 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND... shares, the par or stated value, if any; the rate of dividends, if fixed, and whether cumulative or non...

  12. 17 CFR 230.480 - Title of securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Title of securities. 230.480 Section 230.480 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND... shares, the par or stated value, if any; the rate of dividends, if fixed, and whether cumulative or non...

  13. 17 CFR 230.480 - Title of securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Title of securities. 230.480 Section 230.480 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND... shares, the par or stated value, if any; the rate of dividends, if fixed, and whether cumulative or non...

  14. The systems approach to airport security: The FAA (Federal Aviation Administration)/BWI (Baltimore-Washington International) Airport demonstration project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Caskey, D.L.; Olascoaga, M.T.

    1990-01-01

    Sandia National Laboratories has been involved in designing, installing and evaluating security systems for various applications during the past 15 years. A systems approach to security that evolved from this experience was applied to aviation security for the Federal Aviation Administration. A general systems study of aviation security in the United States was concluded in 1987. One result of the study was a recommendation that an enhanced security system concept designed to meet specified objectives be demonstrated at an operational airport. Baltimore-Washington International Airport was selected as the site for the demonstration project which began in 1988 and will bemore » completed in 1992. This article introduced the systems approach to airport security and discussed its application at Baltimore-Washington International Airport. Examples of design features that could be included in an enhanced security concept also were presented, including details of the proposed Ramps Area Intrusion Detection System (RAIDS).« less

  15. 46 CFR 34.17-15 - Piping-T/ALL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Piping-T/ALL. 34.17-15 Section 34.17-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Fixed Foam Extinguishing Systems, Details § 34.17-15 Piping—T/ALL. (a) All piping, valves, and fittings shall meet the applicable...

  16. 46 CFR 34.17-20 - Discharge outlets-T/ALL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Discharge outlets-T/ALL. 34.17-20 Section 34.17-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Fixed Foam Extinguishing Systems, Details § 34.17-20 Discharge outlets—T/ALL. (a) Discharge outlets shall be of an approved...

  17. 46 CFR 34.17-20 - Discharge outlets-T/ALL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Discharge outlets-T/ALL. 34.17-20 Section 34.17-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Fixed Foam Extinguishing Systems, Details § 34.17-20 Discharge outlets—T/ALL. (a) Discharge outlets shall be of an approved...

  18. 46 CFR 162.161-5 - Instruction manual for design, installation, operation, and maintenance.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 6 2014-10-01 2014-10-01 false Instruction manual for design, installation, operation, and maintenance. 162.161-5 Section 162.161-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL ENGINEERING EQUIPMENT Fixed Clean Agent Fire Extinguishing Systems §...

  19. Information Security and the Internet.

    ERIC Educational Resources Information Center

    Doddrell, Gregory R.

    1996-01-01

    As business relies less on "fortress" style central computers and more on distributed systems, the risk of disruption increases because of inadequate physical security, support services, and site monitoring. This article discusses information security and why protection is required on the Internet, presents a best practice firewall, and…

  20. 28 CFR 25.8 - System safeguards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...

  1. 28 CFR 25.8 - System safeguards.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...

  2. 28 CFR 25.8 - System safeguards.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...

  3. 28 CFR 25.8 - System safeguards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...

  4. 28 CFR 25.8 - System safeguards.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...

  5. 33 CFR 118.65 - Lights on fixed bridges.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Lights on fixed bridges. 118.65 Section 118.65 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES BRIDGE LIGHTING AND OTHER SIGNALS § 118.65 Lights on fixed bridges. (a) Each fixed bridge span over a navigable...

  6. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters

    PubMed Central

    Wang, Baosheng; Tao, Jing

    2018-01-01

    Revocation functionality and hierarchy key delegation are two necessary and crucial requirements to identity-based cryptosystems. Revocable hierarchical identity-based encryption (RHIBE) has attracted a lot of attention in recent years, many RHIBE schemes have been proposed but shown to be either insecure or bounded where they have to fix the maximum hierarchical depth of RHIBE at setup. In this paper, we propose a new unbounded RHIBE scheme with decryption key exposure resilience and with short public system parameters, and prove our RHIBE scheme to be adaptively secure. Our system model is scalable inherently to accommodate more levels of user adaptively with no adding workload or restarting the system. By carefully designing the hybrid games, we overcome the subtle obstacle in applying the dual system encryption methodology for the unbounded and revocable HIBE. To the best of our knowledge, this is the first construction of adaptively secure unbounded RHIBE scheme. PMID:29649326

  7. 31 CFR 344.4 - What are Time Deposit securities?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time Deposit... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false What are Time Deposit securities? 344...? The issuer must fix the maturity periods for Time Deposit securities, which are issued as follows: (1...

  8. 31 CFR 344.4 - What are Time Deposit securities?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time Deposit... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What are Time Deposit securities? 344...? The issuer must fix the maturity periods for Time Deposit securities, which are issued as follows: (1...

  9. 31 CFR 344.4 - What are Time Deposit securities?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time Deposit... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false What are Time Deposit securities? 344...? The issuer must fix the maturity periods for Time Deposit securities, which are issued as follows: (1...

  10. 31 CFR 344.4 - What are Time Deposit securities?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... AND LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false What are Time Deposit securities? 344... periods? The issuer must fix the maturity periods for Time Deposit securities, which are issued as follows...

  11. 31 CFR 344.4 - What are Time Deposit securities?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time Deposit... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false What are Time Deposit securities? 344...? The issuer must fix the maturity periods for Time Deposit securities, which are issued as follows: (1...

  12. 75 FR 879 - National Semiconductor Corporation Arlington Manufacturing Site Including On-Site Leased Workers...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-06

    ... Foods, Allied Barton Security, ASIL, ASML and Construction Mechanical Systems Arlington, TX; Amended... leased workers from ASML and Construction Mechanical Systems were employed on-site at the Arlington... Department is amending the certification to include workers leased from ASML and Construction Mechanical...

  13. Fracture Surface Analysis of Clinically Failed Fixed Partial Dentures

    PubMed Central

    Taskonak, B.; Mecholsky, J.J.; Anusavice, K.J.

    2008-01-01

    Ceramic systems have limited long-term fracture resistance, especially when they are used in posterior areas or for fixed partial dentures. The objective of this study was to determine the site of crack initiation and the causes of fracture of clinically failed ceramic fixed partial dentures. Six Empress 2® lithia-disilicate (Li2O·2SiO2)-based veneered bridges and 7 experimental lithia-disilicate-based non-veneered ceramic bridges were retrieved and analyzed. Fractography and fracture mechanics methods were used to estimate the stresses at failure in 6 bridges (50%) whose fracture initiated from the occlusal surface of the connectors. Fracture of 1 non-veneered bridge (8%) initiated within the gingival surface of the connector. Three veneered bridges fractured within the veneer layers. Failure stresses of the all-core fixed partial dentures ranged from 107 to 161 MPa. Failure stresses of the veneered fixed partial dentures ranged from 19 to 68 MPa. We conclude that fracture initiation sites are controlled primarily by contact damage. PMID:16498078

  14. 76 FR 28964 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ...' Social Security Number (SSN).'' * * * * * Retrievability: Delete entry and replace with ``Name, date of... site--The eMarine system is a protected network that will employ data encryption, data masking, secure virtual private network (VPN) and DoD approved methods for safeguarding and ensuring compliance. The...

  15. Downgrade of the Savannah River Sites FB-Line

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    SADOWSKI, ED; YOURCHAK, RANDY; PRETZELLO MARJI

    2005-07-05

    This paper will discuss the Safeguards & Security (S&S) activities that resulted in the downgrade of the Savannah River Site's FB-Line (FBL) from a Category I Material Balance Area (MBA) in a Material Access Area (MAA) to a Category IV MBA in a Property Protection Area (PPA). The Safeguards activities included measurement of final product items, transferal of nuclear material to other Savannah River Site (SRS) facilities, discard of excess nuclear material items, and final measurements of holdup material. The Security activities included relocation and destruction of classified documents and repositories, decertification of a classified computer, access control changes, updatesmore » to planning documents, deactivation and removal of security systems, Human Reliability Program (HRP) removals, and information security training for personnel that will remain in the FBL PPA.« less

  16. An alternative to sneakernet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orrell, S.; Ralstin, S.

    1992-04-01

    Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less

  17. An alternative to sneakernet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orrell, S.; Ralstin, S.

    1992-01-01

    Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less

  18. Guidelines for Automatic Data Processing Physical Security and Risk Management. Federal Information Processing Standards Publication 31.

    ERIC Educational Resources Information Center

    National Bureau of Standards (DOC), Washington, DC.

    These guidelines provide a handbook for use by federal organizations in structuring physical security and risk management programs for their automatic data processing facilities. This publication discusses security analysis, natural disasters, supporting utilities, system reliability, procedural measures and controls, off-site facilities,…

  19. Study on the security of the authentication scheme with key recycling in QKD

    NASA Astrophysics Data System (ADS)

    Li, Qiong; Zhao, Qiang; Le, Dan; Niu, Xiamu

    2016-09-01

    In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.

  20. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  1. 33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  2. 33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  3. 33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  4. 33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  5. 33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  6. 33 CFR 165.760 - Security Zones; Tampa Bay, Port of Tampa, Port of Saint Petersburg, Port Manatee, Rattlesnake...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... of Tampa, Port of Saint Petersburg, Port Manatee, Rattlesnake, Old Port Tampa, Big Bend, Weedon..., Old Port Tampa, Big Bend, Weedon Island, and Crystal River, Florida. (a) Location. The following areas, denoted by coordinates fixed using the North American Datum of 1983 (World Geodetic System 1984), are...

  7. 33 CFR 165.760 - Security Zones; Tampa Bay, Port of Tampa, Port of Saint Petersburg, Port Manatee, Rattlesnake...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... of Tampa, Port of Saint Petersburg, Port Manatee, Rattlesnake, Old Port Tampa, Big Bend, Weedon..., Old Port Tampa, Big Bend, Weedon Island, and Crystal River, Florida. (a) Location. The following areas, denoted by coordinates fixed using the North American Datum of 1983 (World Geodetic System 1984), are...

  8. Commercial Technology at the Tactical Edge

    DTIC Science & Technology

    2013-06-01

    Typical environmental examples are survivability in the face of hostile action, lack of fixed infrastructure , high mobility and ruggedness...Disconnected, Intermittent, and Limited (DIL) Communications Delay Tolerance Mobile Ad Hoc Networks (MANETs) Loss of infrastructure Security Cyber...for Apple’s IOS.25 In particular, various vendors have built application infrastructures around the various mobile phone operating systems (OSs) such

  9. 46 CFR 34.17-5 - Quantity of foam required-T/ALL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Quantity of foam required-T/ALL. 34.17-5 Section 34.17-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Fixed Foam Extinguishing Systems, Details § 34.17-5 Quantity of foam required—T/ALL. (a) Area protected. (1) For machinery...

  10. 46 CFR 34.17-5 - Quantity of foam required-T/ALL.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 1 2014-10-01 2014-10-01 false Quantity of foam required-T/ALL. 34.17-5 Section 34.17-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Fixed Foam Extinguishing Systems, Details § 34.17-5 Quantity of foam required—T/ALL. (a) Area protected. (1) For machinery...

  11. 46 CFR 34.17-5 - Quantity of foam required-T/ALL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Quantity of foam required-T/ALL. 34.17-5 Section 34.17-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Fixed Foam Extinguishing Systems, Details § 34.17-5 Quantity of foam required—T/ALL. (a) Area protected. (1) For machinery...

  12. 46 CFR 34.17-5 - Quantity of foam required-T/ALL.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 1 2013-10-01 2013-10-01 false Quantity of foam required-T/ALL. 34.17-5 Section 34.17-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Fixed Foam Extinguishing Systems, Details § 34.17-5 Quantity of foam required—T/ALL. (a) Area protected. (1) For machinery...

  13. 46 CFR 34.17-5 - Quantity of foam required-T/ALL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Quantity of foam required-T/ALL. 34.17-5 Section 34.17-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Fixed Foam Extinguishing Systems, Details § 34.17-5 Quantity of foam required—T/ALL. (a) Area protected. (1) For machinery...

  14. 33 CFR 165.760 - Security Zones; Tampa Bay, Port of Tampa, Port of Saint Petersburg, Port Manatee, Rattlesnake...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... of Tampa, Port of Saint Petersburg, Port Manatee, Rattlesnake, Old Port Tampa, Big Bend, Weedon..., Old Port Tampa, Big Bend, Weedon Island, and Crystal River, Florida. (a) Location. The following areas, denoted by coordinates fixed using the North American Datum of 1983 (World Geodetic System 1984), are...

  15. 33 CFR 165.760 - Security Zones; Tampa Bay, Port of Tampa, Port of Saint Petersburg, Port Manatee, Rattlesnake...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... of Tampa, Port of Saint Petersburg, Port Manatee, Rattlesnake, Old Port Tampa, Big Bend, Weedon..., Old Port Tampa, Big Bend, Weedon Island, and Crystal River, Florida. (a) Location. The following areas, denoted by coordinates fixed using the North American Datum of 1983 (World Geodetic System 1984), are...

  16. 33 CFR 165.760 - Security Zones; Tampa Bay, Port of Tampa, Port of Saint Petersburg, Port Manatee, Rattlesnake...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... of Tampa, Port of Saint Petersburg, Port Manatee, Rattlesnake, Old Port Tampa, Big Bend, Weedon..., Old Port Tampa, Big Bend, Weedon Island, and Crystal River, Florida. (a) Location. The following areas, denoted by coordinates fixed using the North American Datum of 1983 (World Geodetic System 1984), are...

  17. A framework for identifying plant species to be used as 'ecological engineers' for fixing soil on unstable slopes.

    PubMed

    Ghestem, Murielle; Cao, Kunfang; Ma, Wenzhang; Rowe, Nick; Leclerc, Raphaëlle; Gadenne, Clément; Stokes, Alexia

    2014-01-01

    Major reforestation programs have been initiated on hillsides prone to erosion and landslides in China, but no framework exists to guide managers in the choice of plant species. We developed such a framework based on the suitability of given plant traits for fixing soil on steep slopes in western Yunnan, China. We examined the utility of 55 native and exotic species with regard to the services they provided. We then chose nine species differing in life form. Plant root system architecture, root mechanical and physiological traits were then measured at two adjacent field sites. One site was highly unstable, with severe soil slippage and erosion. The second site had been replanted 8 years previously and appeared to be physically stable. How root traits differed between sites, season, depth in soil and distance from the plant stem were determined. Root system morphology was analysed by considering architectural traits (root angle, depth, diameter and volume) both up- and downslope. Significant differences between all factors were found, depending on species. We estimated the most useful architectural and mechanical traits for physically fixing soil in place. We then combined these results with those concerning root physiological traits, which were used as a proxy for root metabolic activity. Scores were assigned to each species based on traits. No one species possessed a suite of highly desirable traits, therefore mixtures of species should be used on vulnerable slopes. We also propose a conceptual model describing how to position plants on an unstable site, based on root system traits.

  18. A Framework for Identifying Plant Species to Be Used as ‘Ecological Engineers’ for Fixing Soil on Unstable Slopes

    PubMed Central

    Ghestem, Murielle; Cao, Kunfang; Ma, Wenzhang; Rowe, Nick; Leclerc, Raphaëlle; Gadenne, Clément; Stokes, Alexia

    2014-01-01

    Major reforestation programs have been initiated on hillsides prone to erosion and landslides in China, but no framework exists to guide managers in the choice of plant species. We developed such a framework based on the suitability of given plant traits for fixing soil on steep slopes in western Yunnan, China. We examined the utility of 55 native and exotic species with regard to the services they provided. We then chose nine species differing in life form. Plant root system architecture, root mechanical and physiological traits were then measured at two adjacent field sites. One site was highly unstable, with severe soil slippage and erosion. The second site had been replanted 8 years previously and appeared to be physically stable. How root traits differed between sites, season, depth in soil and distance from the plant stem were determined. Root system morphology was analysed by considering architectural traits (root angle, depth, diameter and volume) both up- and downslope. Significant differences between all factors were found, depending on species. We estimated the most useful architectural and mechanical traits for physically fixing soil in place. We then combined these results with those concerning root physiological traits, which were used as a proxy for root metabolic activity. Scores were assigned to each species based on traits. No one species possessed a suite of highly desirable traits, therefore mixtures of species should be used on vulnerable slopes. We also propose a conceptual model describing how to position plants on an unstable site, based on root system traits. PMID:25105571

  19. Information Security Analysis Using Game Theory and Simulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schlicher, Bob G; Abercrombie, Robert K

    Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions aremore » always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.« less

  20. ID201202961, DOE S-124,539, Information Security Analysis Using Game Theory and Simulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Schlicher, Bob G

    Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions aremore » always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.« less

  1. Dynamically Timed Electric Motor

    NASA Technical Reports Server (NTRS)

    Casper, Ann M. (Inventor)

    1997-01-01

    A brushless DC motor including a housing having an end cap secured thereto. The housing encloses a rotor. a stator and a rotationally displaceable commutation board having sensors secured thereon and spaced around the periphery of the rotor. An external rotational force is applied to the commutation board for displacement of the sensors to various positions whereby varying feedback signals are generated by the positioning of the sensors relative to the rotating rotor. The commutation board is secured in a fixed position in response to feedback signals indicative of optimum sensor position being determined. The rotation of the commutation board and the securing of the sensors in the desired fixed position is accomplished without requiring the removal of the end cap and with the DC motor operating.

  2. Self port scanning tool : providing a more secure computing Environment through the use of proactive port scanning

    NASA Technical Reports Server (NTRS)

    Kocher, Joshua E; Gilliam, David P.

    2005-01-01

    Secure computing is a necessity in the hostile environment that the internet has become. Protection from nefarious individuals and organizations requires a solution that is more a methodology than a one time fix. One aspect of this methodology is having the knowledge of which network ports a computer has open to the world, These network ports are essentially the doorways from the internet into the computer. An assessment method which uses the nmap software to scan ports has been developed to aid System Administrators (SAs) with analysis of open ports on their system(s). Additionally, baselines for several operating systems have been developed so that SAs can compare their open ports to a baseline for a given operating system. Further, the tool is deployed on a website where SAs and Users can request a port scan of their computer. The results are then emailed to the requestor. This tool aids Users, SAs, and security professionals by providing an overall picture of what services are running, what ports are open, potential trojan programs or backdoors, and what ports can be closed.

  3. APPLICATIONS ANALYSIS REPORT: BIOLOGICAL TREATMENT OF WOOD PRESERVING SITE GROUNDWATER BY BIOTROL, INC.

    EPA Science Inventory

    This report is an evaluation of the Biotrol, Inc. Aqueous Treatment System (BATS), a fixed-film, aerobic biological treatment process for contaminated groundwaters and other wastewaters. t summarizes and analyzes the results of the Superfund Innovative Technology Evaluation (SITE...

  4. 46 CFR 184.410 - Electronic position fixing devices.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 7 2011-10-01 2011-10-01 false Electronic position fixing devices. 184.410 Section 184.410 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER... Electronic position fixing devices. A vessel on an oceans route must be equipped with an electronic position...

  5. 46 CFR 184.410 - Electronic position fixing devices.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 7 2014-10-01 2014-10-01 false Electronic position fixing devices. 184.410 Section 184.410 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER... Electronic position fixing devices. A vessel on an oceans route must be equipped with an electronic position...

  6. 46 CFR 184.410 - Electronic position fixing devices.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Electronic position fixing devices. 184.410 Section 184.410 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER... Electronic position fixing devices. A vessel on an oceans route must be equipped with an electronic position...

  7. 46 CFR 184.410 - Electronic position fixing devices.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 7 2013-10-01 2013-10-01 false Electronic position fixing devices. 184.410 Section 184.410 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER... Electronic position fixing devices. A vessel on an oceans route must be equipped with an electronic position...

  8. 46 CFR 184.410 - Electronic position fixing devices.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 7 2012-10-01 2012-10-01 false Electronic position fixing devices. 184.410 Section 184.410 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER... Electronic position fixing devices. A vessel on an oceans route must be equipped with an electronic position...

  9. 46 CFR 169.654 - Bilge pumps.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Machinery and... bilge pump or fixed power bilge pump having a minimum capacity of 10 gpm. If a fixed hand pump is... section, vessels of 40 feet but less than 65 feet must have a fixed power bilge pump having a minimum...

  10. 46 CFR 169.654 - Bilge pumps.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Machinery and... bilge pump or fixed power bilge pump having a minimum capacity of 10 gpm. If a fixed hand pump is... section, vessels of 40 feet but less than 65 feet must have a fixed power bilge pump having a minimum...

  11. 46 CFR 169.654 - Bilge pumps.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Machinery and... bilge pump or fixed power bilge pump having a minimum capacity of 10 gpm. If a fixed hand pump is... section, vessels of 40 feet but less than 65 feet must have a fixed power bilge pump having a minimum...

  12. 46 CFR 169.654 - Bilge pumps.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Machinery and... bilge pump or fixed power bilge pump having a minimum capacity of 10 gpm. If a fixed hand pump is... section, vessels of 40 feet but less than 65 feet must have a fixed power bilge pump having a minimum...

  13. 46 CFR 169.654 - Bilge pumps.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Machinery and... bilge pump or fixed power bilge pump having a minimum capacity of 10 gpm. If a fixed hand pump is... section, vessels of 40 feet but less than 65 feet must have a fixed power bilge pump having a minimum...

  14. 33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...

  15. 33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...

  16. 33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...

  17. 33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...

  18. 33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...

  19. 78 FR 45003 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change To List...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-25

    ... securities. Corporate debt securities are fixed-income securities issued by businesses to finance their... fundamental factors such as sales, earnings and cash flow growth; valuation factors such as price/earnings... fundamentals, valuation and technical factors, the security's relative valuation and other qualitative factors...

  20. 77 FR 76148 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change To List...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-26

    ..., corporate debt securities are fixed-income securities issued by businesses to finance their operations... consist of both foreign and domestic debt instruments, including corporate bonds, high yield bonds... stated above, the Fund may invest in a variety of debt securities, including corporate debt securities...

  1. 33 CFR 165.805 - Security Zones; Calcasieu River and Ship Channel, Louisiana.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zones; Calcasieu River... § 165.805 Security Zones; Calcasieu River and Ship Channel, Louisiana. (a) Location. (1) The following areas are designated as fixed security zones (all coordinates are based upon North American Datum of...

  2. 33 CFR 165.805 - Security Zones; Calcasieu River and Ship Channel, Louisiana.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zones; Calcasieu River... § 165.805 Security Zones; Calcasieu River and Ship Channel, Louisiana. (a) Location. (1) The following areas are designated as fixed security zones (all coordinates are based upon North American Datum of...

  3. 33 CFR 165.805 - Security Zones; Calcasieu River and Ship Channel, Louisiana.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zones; Calcasieu River... § 165.805 Security Zones; Calcasieu River and Ship Channel, Louisiana. (a) Location. (1) The following areas are designated as fixed security zones (all coordinates are based upon North American Datum of...

  4. 33 CFR 165.805 - Security Zones; Calcasieu River and Ship Channel, Louisiana.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zones; Calcasieu River... § 165.805 Security Zones; Calcasieu River and Ship Channel, Louisiana. (a) Location. (1) The following areas are designated as fixed security zones (all coordinates are based upon North American Datum of...

  5. 78 FR 54756 - Extension of Expiration Dates for Two Body System Listings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-06

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 404 [Docket No. SSA-2013-0039] RIN 0960-AH60 Extension of Expiration Dates for Two Body System Listings AGENCY: Social Security Administration. ACTION... national toll-free number, 1-800-772-1213, or TTY 1-800-325-0778, or visit our Internet site, Social...

  6. Global Geodesy Using GPS Without Fiducial Sites

    NASA Technical Reports Server (NTRS)

    Heflin, Michael B.; Blewitt, Geoffrey

    1994-01-01

    Global Positioning System, GPS, used to make global geodetic measurements without use of fiducial site coordinates. Baseline lengths and geocentric radii for each site determined without having to fix any site coordinates. Given n globally distributed sites, n baseline lengths and n geocentric radii form polyhedron with each site at vertex and with geocenter at intersection of all radii. Geodetic information derived from structure of polyhedron and its change with time. Approach applied to any global geodetic technique.

  7. 33 CFR 101.120 - Alternatives.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Alternatives. 101.120 Section 101... MARITIME SECURITY: GENERAL General § 101.120 Alternatives. (a) Alternative Security Agreements. (1) The U.S... Alternative Security Arrangements covering short international voyages on fixed routes between facilities...

  8. School Security Technologies

    ERIC Educational Resources Information Center

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  9. Opto-mechanical door locking system

    NASA Astrophysics Data System (ADS)

    Patil, Saurabh S.; Rodrigues, Vanessa M.; Patil, Ajeetkumar; Chidangil, Santhosh

    2015-09-01

    We present an Opto-mechanical Door Locking System which is an optical system that combines a simple combination of a coherent light source (Laser) and a photodiode based sensor with focus toward security applications. The basic construct of the KEY comprises a Laser source in a cylindrical enclosure that slides perfectly into the LOCK. The Laser is pulsed at a fixed encrypted frequency unique to that locking system. Transistor-transistor logic (TTL) circuitry is used to achieve encryption. The casing of the key is designed in such a way that it will power the pulsing laser only when the key is inserted in the slot provided for it. The Lock includes a photo-sensor that will convert the detected light intensity to a corresponding electrical signal by decrypting the frequency. The lock also consists of a circuit with a feedback system that will carry the digital information regarding the encryption frequency code. The information received from the sensor is matched with the stored code; if found a perfect match, a signal will be sent to the servo to unlock the mechanical lock or to carry out any other operation. This technique can be incorporated in security systems for residences and safe houses, and can easily replace all conventional locks which formerly used fixed patterns to unlock. The major advantage of this proposed optomechanical system over conventional ones is that it no longer relies on a solid/imprinted pattern to perform its task and hence makes it almost impossible to tamper with.

  10. On-Site Determination and Monitoring of Real-Time Fluence Delivery for an Operating UV Reactor Based on a True Fluence Rate Detector.

    PubMed

    Li, Mengkai; Li, Wentao; Qiang, Zhimin; Blatchley, Ernest R

    2017-07-18

    At present, on-site fluence (distribution) determination and monitoring of an operating UV system represent a considerable challenge. The recently developed microfluorescent silica detector (MFSD) is able to measure the approximate true fluence rate (FR) at a fixed position in a UV reactor that can be compared with a FR model directly. Hence it has provided a connection between model calculation and real-time fluence determination. In this study, an on-site determination and monitoring method of fluence delivery for an operating UV reactor was developed. True FR detectors, a UV transmittance (UVT) meter, and a flow rate meter were used for fundamental measurements. The fluence distribution, as well as reduction equivalent fluence (REF), 10th percentile dose in the UV fluence distribution (F 10 ), minimum fluence (F min ), and mean fluence (F mean ) of a test reactor, was calculated in advance by the combined use of computational fluid dynamics and FR field modeling. A field test was carried out on the test reactor for disinfection of a secondary water supply. The estimated real-time REF, F 10 , F min , and F mean decreased 73.6%, 71.4%, 69.6%, and 72.9%, respectively, during a 6-month period, which was attributable to lamp output attenuation and sleeve fouling. The results were analyzed with synchronous data from a previously developed triparameter UV monitoring system and water temperature sensor. This study allowed demonstration of an accurate method for on-site, real-time fluence determination which could be used to enhance the security and public confidence of UV-based water treatment processes.

  11. Ear epistheses as an alternative to autogenous reconstruction.

    PubMed

    Federspil, Philipp A

    2009-08-01

    An ear episthesis is an artificial substitute for the auricle. The term EAR PROSTHESIS is used synonymously. The breakthrough came with the introduction of the modern silicones and their colorings. Although there are still indications for noninvasive methods of retention such as medical adhesives, the best and most reliable method of fixation is by bone anchorage. Long-lasting osseointegration with reaction-free skin penetration can be achieved with titanium implants. The first system used extraorally was the Brånemark flange fixture. Later, different solitary titanium implants were introduced, such as the ITI system. A different strategy used the titanium grids (Epitec) or plates (Epiplating) derived from osteosynthesis systems. These systems are fixed subperiosteally with several bone screws and are therefore also labeled as grouped implants. With these modern developments, secure retention can be achieved also in unfavorable anatomic situations. The grouped systems are resistant to torque with abutment insertion. The latest development is the subcutaneously implanted double magnet without skin penetration. The advantages of implant retained ear epistheses include optimal camouflage, predictable cosmetic results, fast rehabilitation, no donor site morbidity, and early detection of tumor recurrence. Depending on the clinical setting, prosthetic rehabilitation may be more than just an alternative to plastic reconstructive surgery. Copyright Thieme Medical Publishers.

  12. Feasibility Study of Economics and Performance of Solar Photovoltaics in Nitro, West Virginia

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lisell, L.; Mosey, G.

    2010-08-01

    The study described in this report assessed brownfield sites designated by the City of Nitro, West Virginia for solar photovoltaic (PV) installations. The study analyzed three different types of PV systems for eight sites. The report estimates the cost, performance, and site impacts of thin film technology and crystalline silicon panels (both fixed-axis tracking and single-axis tracking systems). Potential job creation and electrical rate increases were also considered, and the report recommends financing options that could assist in the implementation of a system.

  13. A security architecture for interconnecting health information systems.

    PubMed

    Gritzalis, Dimitris; Lambrinoudakis, Costas

    2004-03-31

    Several hereditary and other chronic diseases necessitate continuous and complicated health care procedures, typically offered in different, often distant, health care units. Inevitably, the medical records of patients suffering from such diseases become complex, grow in size very fast and are scattered all over the units involved in the care process, hindering communication of information between health care professionals. Web-based electronic medical records have been recently proposed as the solution to the above problem, facilitating the interconnection of the health care units in the sense that health care professionals can now access the complete medical record of the patient, even if it is distributed in several remote units. However, by allowing users to access information from virtually anywhere, the universe of ineligible people who may attempt to harm the system is dramatically expanded, thus severely complicating the design and implementation of a secure environment. This paper presents a security architecture that has been mainly designed for providing authentication and authorization services in web-based distributed systems. The architecture has been based on a role-based access scheme and on the implementation of an intelligent security agent per site (i.e. health care unit). This intelligent security agent: (a). authenticates the users, local or remote, that can access the local resources; (b). assigns, through temporary certificates, access privileges to the authenticated users in accordance to their role; and (c). communicates to other sites (through the respective security agents) information about the local users that may need to access information stored in other sites, as well as about local resources that can be accessed remotely.

  14. Dynamically timed electric motor

    NASA Technical Reports Server (NTRS)

    Casper, Ann M. (Inventor)

    1994-01-01

    The invention disclosed in this document is a brushless DC motor including a housing having an end cap secured thereto. The housing encloses a rotor, a stator and a rotationally displaceable commutation board having 5 sensors secured thereon and spaced around the periphery of the rotor. An external rotational force is applied to the commutation board for displacement of the sensors to various positions whereby varying feedback signals are generated by the positioning of the sensors relative to the rotating rotor. The commutation board is secured in a fixed position in response to feedback signals indicative of optimum sensor position being determined. The rotation of the commutation board and the securing of the sensors in the desired fixed position is accomplished without requiring the removal of the 5 end cap and with the DC motor operating.

  15. Benchmarking the performance of fixed-image receptor digital radiography systems. Part 2: system performance metric.

    PubMed

    Lee, Kam L; Bernardo, Michael; Ireland, Timothy A

    2016-06-01

    This is part two of a two-part study in benchmarking system performance of fixed digital radiographic systems. The study compares the system performance of seven fixed digital radiography systems based on quantitative metrics like modulation transfer function (sMTF), normalised noise power spectrum (sNNPS), detective quantum efficiency (sDQE) and entrance surface air kerma (ESAK). It was found that the most efficient image receptors (greatest sDQE) were not necessarily operating at the lowest ESAK. In part one of this study, sMTF is shown to depend on system configuration while sNNPS is shown to be relatively consistent across systems. Systems are ranked on their signal-to-noise ratio efficiency (sDQE) and their ESAK. Systems using the same equipment configuration do not necessarily have the same system performance. This implies radiographic practice at the site will have an impact on the overall system performance. In general, systems are more dose efficient at low dose settings.

  16. Donation return time at fixed and mobile donation sites

    PubMed Central

    Carey, Patricia M.; High, Patrick M.; Schlumpf, Karen S.; Johnson, Bryce R.; Mast, Alan E.; Rios, Jorge A.; Simon, Toby L.; Wilkinson, Susan L.

    2013-01-01

    BACKGROUND This study investigated the effect of blood donation environment, fixed or mobile with differing sponsor types, on donation return time. STUDY DESIGN AND METHODS Data from 2006 through 2009 at six US blood centers participating in the Retrovirus Epidemiology Donor Study-II (REDS-II) were used for analysis. Descriptive statistics stratified by whole blood (WB), plateletpheresis (PP), and double red blood cell (R2) donations were obtained for fixed and mobile locations, including median number of donations and median interdonation interval. A survival analysis estimated median return time at fixed and mobile sites, while controlling for censored return times, demographics, blood center, and mandatory recovery times. RESULTS Two-thirds (67.9%) of WB donations were made at mobile sites, 97.4% of PP donations were made at fixed sites, and R2 donations were equally distributed between fixed and mobile locations. For donations at fixed sites only or alternating between fixed and mobile sites, the highest median numbers of donations were nine and eight, respectively, and the shortest model-adjusted median return times (controlling for mandatory eligibility times of 56 and 112 days) were 36 and 30 days for WB and R2 donations, respectively. For PP donations, the shortest model-adjusted median return time was 23 days at a fixed location and the longest was 693 days at community locations. CONCLUSION WB, PP, and R2 donors with the shortest time between donations were associated with fixed locations and those alternating between fixed and mobile locations, even after controlling for differing mandatory recovery times for the different blood donation procedures. PMID:21745215

  17. 33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; St. Thomas, U.S....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas...

  18. 33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas, U.S. Virgin Islands. The security zone for a cruise ship entering port is activated when the vessel...

  19. 33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas, U.S. Virgin Islands. The security zone for a cruise ship entering port is activated when the vessel...

  20. 33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas, U.S. Virgin Islands. The security zone for a cruise ship entering port is activated when the vessel...

  1. 33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas, U.S. Virgin Islands. The security zone for a cruise ship entering port is activated when the vessel...

  2. 76 FR 29018 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing and Order...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64488; File No. SR-FICC-2011-03] Self... Clearing Fund Securities and Eligible Participants Fund Securities May 13, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ notice is hereby given that on May 10, 2011...

  3. 78 FR 22923 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Amended...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-17

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69362; File No. 600-23] Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Amended Application for Registration as a Clearing Agency April 11, 2013. I. Introduction On April 5, 2013, the Fixed Income Clearing Corporation...

  4. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ...., 1150 18th Street NW., Suite 910, Washington, DC 20036. FOR FURTHER INFORMATION CONTACT: The RTCA... (202) 833-9434, or Web site at http://www.rtca.org . SUPPLEMENTARY INFORMATION: Pursuant to section 10... Security System Standard for Airport Access Control, RTCA Paper No. 168-13/SC224-048 TOR Review--Status of...

  5. 10 CFR 73.40 - Physical protection: General requirements at fixed sites.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Physical protection: General requirements at fixed sites. 73.40 Section 73.40 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection Requirements at Fixed Sites § 73.40 Physical protection: General...

  6. 10 CFR 73.40 - Physical protection: General requirements at fixed sites.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Physical protection: General requirements at fixed sites. 73.40 Section 73.40 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection Requirements at Fixed Sites § 73.40 Physical protection: General...

  7. 10 CFR 73.40 - Physical protection: General requirements at fixed sites.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Physical protection: General requirements at fixed sites. 73.40 Section 73.40 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection Requirements at Fixed Sites § 73.40 Physical protection: General...

  8. 10 CFR 73.40 - Physical protection: General requirements at fixed sites.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Physical protection: General requirements at fixed sites. 73.40 Section 73.40 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection Requirements at Fixed Sites § 73.40 Physical protection: General...

  9. Personal carbon monoxide exposures of preschool children in Helsinki, Finland—comparison to ambient air concentrations

    NASA Astrophysics Data System (ADS)

    Alm, S.; Mukala, K.; Tiittanen, P.; Jantunen, M. J.

    The associations of personal carbon monoxide (CO) exposures with ambient air CO concentrations measured at fixed monitoring sites, were studied among 194 children aged 3-6 yr in four downtown and four suburban day-care centers in Helsinki, Finland. Each child carried a personal CO exposure monitor between 1 and 4 times for a time period of between 20 and 24 h. CO concentrations at two fixed monitoring sites were measured simultaneously. The CO concentrations measured at the fixed monitoring sites were usually lower (mean maximum 8-h concentration: 0.9 and 2.6 mg m -3) than the personal CO exposure concentrations (mean maximum 8-h concentration: 3.3 mg m -3). The fixed site CO concentrations were poor predictors of the personal CO exposure concentrations. However, the correlations between the personal CO exposure and the fixed monitoring site CO concentrations increased (-0.03--0.12 to 0.13-0.16) with increasing averaging times from 1 to 8 h. Also, the fixed monitoring site CO concentrations explained the mean daily or weekly personal CO exposures of a group of simultaneously measured children better than individual exposure CO concentrations. This study suggests that the short-term CO personal exposure of children cannot be meaningfully assessed using fixed monitoring sites.

  10. Wheeled mobility device transportation safety in fixed route and demand-responsive public transit vehicles within the United States.

    PubMed

    Frost, Karen L; van Roosmalen, Linda; Bertocci, Gina; Cross, Douglas J

    2012-01-01

    An overview of the current status of wheelchair transportation safety in fixed route and demand-responsive, non-rail, public transportation vehicles within the US is presented. A description of each mode of transportation is provided, followed by a discussion of the primary issues affecting safety, accessibility, and usability. Technologies such as lifts, ramps, securement systems, and occupant restraint systems, along with regulations and voluntary industry standards have been implemented with the intent of improving safety and accessibility for individuals who travel while seated in their wheeled mobility device (e.g., wheelchair or scooter). However, across both fixed route and demand-responsive transit systems a myriad of factors such as nonuse and misuse of safety systems, oversized wheeled mobility devices, vehicle space constraints, and inadequate vehicle operator training may place wheeled mobility device (WhMD) users at risk of injury even under non-impact driving conditions. Since WhMD-related incidents also often occur during the boarding and alighting process, the frequency of these events, along with factors associated with these events are described for each transit mode. Recommendations for improving WhMD transportation are discussed given the current state of

  11. [System construction of early warning for ecological security at cultural and natural heritage mixed sites and its application: a case study of Wuyishan Scenery District].

    PubMed

    You, Wei-Bin; He, Dong-Jin; Qin, De-Hua; Ji, Zhi-Rong; Wu, Li-Yun; Yu, Jian-An; Chen, Bing-Rong; Tan, Yong

    2014-05-01

    This paper proposed a new concept of ecological security for protection by a comprehensive analysis of the contents and standards of world heritage sites. A frame concept model named "Pressure-State-Control" for early warning of ecological security at world heritage mixed sites was constructed and evaluation indicators of this frame were also selected. Wuyishan Scenery District was chosen for a case study, which has been severely disturbed by natural and artificial factors. Based on the frame model of "Pressure-State-Control" and by employing extension analysis, the matter-element model was established to assess the ecological security status of this cultural and natural world heritage mixed site. The results showed that the accuracy of ecological security early warning reached 84%. Early warning rank was I level (no alert status) in 1997 and 2009, but that in 2009 had a higher possibility to convert into II level. Likewise, the early-warning indices of sensitive ranks were different between 1997 and 2009. Population density, population growth rate, area index for tea garden, cultivated land owned per capita, level of drought, and investment for ecological and environmental construction were the main limiting factors to hinder the development of ecological security from 2009 to future. In general, the status of Wuyishan Scenery District ecological security was relatively good and considered as no alert level, while risk conditions also existed in terms of a few early-warning indicators. We still need to pay more attention to serious alert indicators and adopt effective prevention and control measures to maintain a good ecological security status of this heritage site.

  12. The Space Shuttle orbiter payload retention systems

    NASA Technical Reports Server (NTRS)

    Hardee, J. H.

    1982-01-01

    Payloads are secured in the orbiter payload bay by the payload retention system or are equipped with their own unique retention systems. The orbiter payload retention mechanisms provide structural attachments for each payload by using four or five attachment points to secure the payload within the orbiter payload bay during all phases of the orbiter mission. The payload retention system (PRS) is an electromechanical system that provides standarized payload carrier attachment fittings to accommodate up to five payloads for each orbiter flight. The mechanisms are able to function under either l-g or zero-g conditions. Payload berthing or deberthing on orbit is accomplished by utilizing the remote manipulator system (RMS). The retention mechanisms provide the capability for either vertical or horizontal payload installation or removal. The payload support points are selected to minimize point torsional, bending, and radial loads imparted to the payloads. In addition to the remotely controlled latching system, the passive system used for nondeployable payloads performs the same function as the RMS except it provides fixed attachments to the orbiter.

  13. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... part to distinguish such securities from “inflation-protected” securities. We refer to fixed-principal... years. (2) Treasury inflation-protected notes. (i) Are issued with a stated rate of interest to be applied to the inflation-adjusted principal on each interest payment date; (ii) Have interest payable...

  14. 20 CFR 703.204 - Decision on insurance carrier's application; minimum amount of deposit.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.204 Decision on insurance... determining the extent of an insurance carrier's unsecured LHWCA obligations and fixing the amount of security... number of factors in setting the security deposit amount including, but not limited to, the— (1...

  15. 20 CFR 703.204 - Decision on insurance carrier's application; minimum amount of deposit.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.204 Decision on insurance... determining the extent of an insurance carrier's unsecured LHWCA obligations and fixing the amount of security... number of factors in setting the security deposit amount including, but not limited to, the— (1...

  16. Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Singh, Surya V.; Thronas, Aaron I.

    2010-01-01

    This paper discusses the importance of remote access via virtual private network (VPN) for the Second Line of Defense (SLD) Central Alarm System (CAS) sites, the requirements for maintaining secure channels while using VPN and implementation requirements for current and future sites.

  17. 12 CFR 208.34 - Recordkeeping and confirmation of certain securities transactions effected by State member banks.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... primarily by the cash flows of a discrete pool of receivables or other financial assets, either fixed or... security that represents an interest in or is secured by a pool of receivables or other financial assets... interest in or is secured by a pool of receivables or other financial assets that are subject to continuous...

  18. 12 CFR 208.34 - Recordkeeping and confirmation of certain securities transactions effected by State member banks.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... primarily by the cash flows of a discrete pool of receivables or other financial assets, either fixed or... security that represents an interest in or is secured by a pool of receivables or other financial assets... interest in or is secured by a pool of receivables or other financial assets that are subject to continuous...

  19. 12 CFR 208.34 - Recordkeeping and confirmation of certain securities transactions effected by State member banks.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... primarily by the cash flows of a discrete pool of receivables or other financial assets, either fixed or... security that represents an interest in or is secured by a pool of receivables or other financial assets... interest in or is secured by a pool of receivables or other financial assets that are subject to continuous...

  20. Configuring a Graphical User Interface for Managing Local HYSPLIT Model Runs Through AWIPS

    NASA Technical Reports Server (NTRS)

    Wheeler, mark M.; Blottman, Peter F.; Sharp, David W.; Hoeth, Brian; VanSpeybroeck, Kurt M.

    2009-01-01

    Responding to incidents involving the release of harmful airborne pollutants is a continual challenge for Weather Forecast Offices in the National Weather Service. When such incidents occur, current protocol recommends forecaster-initiated requests of NOAA's Hybrid Single-Particle Lagrangian Integrated Trajectory (HYSPLIT) model output through the National Centers of Environmental Prediction to obtain critical dispersion guidance. Individual requests are submitted manually through a secured web site, with desired multiple requests submitted in sequence, for the purpose of obtaining useful trajectory and concentration forecasts associated with the significant release of harmful chemical gases, radiation, wildfire smoke, etc., into local the atmosphere. To help manage the local HYSPLIT for both routine and emergency use, a graphical user interface was designed for operational efficiency. The interface allows forecasters to quickly determine the current HYSPLIT configuration for the list of predefined sites (e.g., fixed sites and floating sites), and to make any necessary adjustments to key parameters such as Input Model. Number of Forecast Hours, etc. When using the interface, forecasters will obtain desired output more confidently and without the danger of corrupting essential configuration files.

  1. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  2. Distributed generation of shared RSA keys in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  3. Nevada National Security Site Environmental Report 2011

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment,more » Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less

  4. A Security Monitoring Framework For Virtualization Based HEP Infrastructures

    NASA Astrophysics Data System (ADS)

    Gomez Ramirez, A.; Martinez Pedreira, M.; Grigoras, C.; Betev, L.; Lara, C.; Kebschull, U.; ALICE Collaboration

    2017-10-01

    High Energy Physics (HEP) distributed computing infrastructures require automatic tools to monitor, analyze and react to potential security incidents. These tools should collect and inspect data such as resource consumption, logs and sequence of system calls for detecting anomalies that indicate the presence of a malicious agent. They should also be able to perform automated reactions to attacks without administrator intervention. We describe a novel framework that accomplishes these requirements, with a proof of concept implementation for the ALICE experiment at CERN. We show how we achieve a fully virtualized environment that improves the security by isolating services and Jobs without a significant performance impact. We also describe a collected dataset for Machine Learning based Intrusion Prevention and Detection Systems on Grid computing. This dataset is composed of resource consumption measurements (such as CPU, RAM and network traffic), logfiles from operating system services, and system call data collected from production Jobs running in an ALICE Grid test site and a big set of malware samples. This malware set was collected from security research sites. Based on this dataset, we will proceed to develop Machine Learning algorithms able to detect malicious Jobs.

  5. Solar radiation - to - power generation models for one-axis tracking PV system with on-site measurements from Eskisehir, Turkey

    NASA Astrophysics Data System (ADS)

    Filik, Tansu; Başaran Filik, Ümmühan; Nezih Gerek, Ömer

    2017-11-01

    In this study, new analytic models are proposed for mapping on-site global solar radiation values to electrical power output values in solar photovoltaic (PV) panels. The model extraction is achieved by simultaneously recording solar radiation and generated power from fixed and tracking panels, each with capacity of 3 kW, in Eskisehir (Turkey) region. It is shown that the relation between the solar radiation and the corresponding electric power is not only nonlinear, but it also exhibits an interesting time-varying characteristic in the form of a hysteresis function. This observed radiation-to-power relation is, then, analytically modelled with three piece-wise function parts (corresponding to morning, noon and evening times), which is another novel contribution of this work. The model is determined for both fixed panels and panels with a tracking system. Especially the panel system with a dynamic tracker produces a harmonically richer (with higher values in general) characteristic, so higher order polynomial models are necessary for the construction of analytical solar radiation models. The presented models, characteristics of the hysteresis functions, and differences in the fixed versus solar-tracking panels are expected to provide valuable insight for further model based researches.

  6. A comprehensive approach to reactive power scheduling in restructured power systems

    NASA Astrophysics Data System (ADS)

    Shukla, Meera

    Financial constraints, regulatory pressure, and need for more economical power transfers have increased the loading of interconnected transmission systems. As a consequence, power systems have been operated close to their maximum power transfer capability limits, making the system more vulnerable to voltage instability events. The problem of voltage collapse characterized by a severe local voltage depression is generally believed to be associated with inadequate VAr support at key buses. The goal of reactive power planning is to maintain a high level of voltage security, through installation of properly sized and located reactive sources and their optimal scheduling. In case of vertically-operated power systems, the reactive requirement of the system is normally satisfied by using all of its reactive sources. But in case of different scenarios of restructured power systems, one may consider a fixed amount of exchange of reactive power through tie lines. Reviewed literature suggests a need for optimal scheduling of reactive power generation for fixed inter area reactive power exchange. The present work proposed a novel approach for reactive power source placement and a novel approach for its scheduling. The VAr source placement technique was based on the property of system connectivity. This is followed by development of optimal reactive power dispatch formulation which facilitated fixed inter area tie line reactive power exchange. This formulation used a Line Flow-Based (LFB) model of power flow analysis. The formulation determined the generation schedule for fixed inter area tie line reactive power exchange. Different operating scenarios were studied to analyze the impact of VAr management approach for vertically operated and restructured power systems. The system loadability, losses, generation and the cost of generation were the performance measures to study the impact of VAr management strategy. The novel approach was demonstrated on IEEE 30 bus system.

  7. Feasibility Study of Economics and Performance of Solar Photovoltaics at Johnson County Landfill

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Salasovich, J.; Mosey, G.

    2012-01-01

    The U.S. Environmental Protection Agency (EPA), in accordance with the RE-Powering America's Land initiative, selected the Johnson County Landfill in Shawnee, Kansas, for a feasibility study of renewable energy production. Citizens of Shawnee, city planners, and site managers are interested in redevelopment uses for landfills in Kansas that are particularly well suited for grid-tied solar photovoltaic (PV) installation. This report assesses the Johnson County Landfill for possible grid-tied PV installations and estimates the cost, performance, and site impacts of three different PV options: crystalline silicon (fixed tilt), crystalline silicon (single-axis tracking), and thin film (fixed tilt). Each option represents amore » standalone system that can be sized to use an entire available site area. In addition, the report outlines financing options that could assist in the implementation of a system. The feasibility of PV systems installed on landfills is highly impacted by the available area for an array, solar resource, operating status, landfill cap status, distance to transmission lines, and distance to major roads. The report findings are applicable to other landfills in the surrounding area.« less

  8. 47 CFR 101.1325 - Construction requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Construction requirements. 101.1325 Section 101... FIXED MICROWAVE SERVICES Multiple Address Systems System Requirements § 101.1325 Construction requirements. (a) Incumbent and site-based licenses are subject to the construction requirements set forth in...

  9. 47 CFR 101.1325 - Construction requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Construction requirements. 101.1325 Section 101... FIXED MICROWAVE SERVICES Multiple Address Systems System Requirements § 101.1325 Construction requirements. (a) Incumbent and site-based licenses are subject to the construction requirements set forth in...

  10. Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care.

    PubMed

    Xie, Qi; Liu, Wenhao; Wang, Shengbao; Han, Lidong; Hu, Bin; Wu, Ting

    2014-09-01

    Patient's privacy-preserving, security and mutual authentication between patient and the medical server are the important mechanism in connected health care applications, such as telecare medical information systems and personally controlled health records systems. In 2013, Wen showed that Das et al.'s scheme is vulnerable to the replay attack, user impersonation attacks and off-line guessing attacks, and then proposed an improved scheme using biometrics, password and smart card to overcome these weaknesses. However, we show that Wen's scheme is still vulnerable to off-line password guessing attacks, does not provide user's anonymity and perfect forward secrecy. Further, we propose an improved scheme to fix these weaknesses, and use the applied pi calculus based formal verification tool ProVerif to prove the security and authentication.

  11. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    PubMed

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  12. Positive Selection during the Evolution of the Blood Coagulation Factors in the Context of Their Disease-Causing Mutations

    PubMed Central

    Rallapalli, Pavithra M.; Orengo, Christine A.; Studer, Romain A.; Perkins, Stephen J.

    2014-01-01

    Blood coagulation occurs through a cascade of enzymes and cofactors that produces a fibrin clot, while otherwise maintaining hemostasis. The 11 human coagulation factors (FG, FII–FXIII) have been identified across all vertebrates, suggesting that they emerged with the first vertebrates around 500 Ma. Human FVIII, FIX, and FXI are associated with thousands of disease-causing mutations. Here, we evaluated the strength of selective pressures on the 14 genes coding for the 11 factors during vertebrate evolution, and compared these with human mutations in FVIII, FIX, and FXI. Positive selection was identified for fibrinogen (FG), FIII, FVIII, FIX, and FX in the mammalian Primates and Laurasiatheria and the Sauropsida (reptiles and birds). This showed that the coagulation system in vertebrates was under strong selective pressures, perhaps to adapt against blood-invading pathogens. The comparison of these results with disease-causing mutations reported in FVIII, FIX, and FXI showed that the number of disease-causing mutations, and the probability of positive selection were inversely related to each other. It was concluded that when a site was under positive selection, it was less likely to be associated with disease-causing mutations. In contrast, sites under negative selection were more likely to be associated with disease-causing mutations and be destabilizing. A residue-by-residue comparison of the FVIII, FIX, and FXI sequence alignments confirmed this. This improved understanding of evolutionary changes in FVIII, FIX, and FXI provided greater insight into disease-causing mutations, and better assessments of the codon sites that may be mutated in applications of gene therapy. PMID:25158795

  13. Information Security Controls against Cross-Site Request Forgery Attacks on Software Applications of Automated Systems

    NASA Astrophysics Data System (ADS)

    Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.

    2018-05-01

    This paper presents statistical results and their consolidation, which were received in the study into security of various web-application against cross-site request forgery attacks. Some of the results were received in the study carried out within the framework of certification for compliance with information security requirements. The paper provides the results of consolidating information about the attack and protection measures, which are currently used by the developers of web-applications. It specifies results of the study, which demonstrate various distribution types: distribution of identified vulnerabilities as per the developer type (Russian and foreign), distribution of the security measures used in web-applications, distribution of the identified vulnerabilities as per the programming languages, data on the number of security measures that are used in the studied web-applications. The results of the study show that in most cases the developers of web-applications do not pay due attention to protection against cross-site request forgery attacks. The authors give recommendations to the developers that are planning to undergo a certification process for their software applications.

  14. 20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... REGULATIONS Authorization of Self-Insurers § 703.304 Filing of Agreement and Undertaking; deposit of security...) granting its application to self-insure and fixing the required security deposit amount (see § 703.303... laws of the United States and the rules and regulations governing bonding companies may act as sureties...

  15. 7 CFR 771.9 - Interest rates, terms, security requirements, and repayment.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Interest rates, terms, security requirements, and... Interest rates, terms, security requirements, and repayment. (a) Interest rate. The interest rate will be fixed for the term of the loan. The rate will be established by FSA, based upon the cost of Government...

  16. 77 FR 3520 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-24

    ... as derivative instruments collateralized by Money Market Securities as described below. Quasi..., denominated in U.S. dollars or local currencies. Fixed income securities include Money Market Securities as...., Investment Company Act Release No. 9011 (Oct. 30, 1975), 40 FR 54241 (November 21, 1975). Money Market...

  17. 20 CFR 703.207 - Kinds of negotiable securities that may be deposited; conditions of deposit; acceptance of deposits.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... amount fixed by the Office under the regulations in this part shall deposit any negotiable securities... deposited; conditions of deposit; acceptance of deposits. 703.207 Section 703.207 Employees' Benefits... AND RELATED STATUTES INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.207...

  18. 77 FR 63380 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-16

    ... purchase fixed income securities issued by U.S. or foreign corporations \\6\\ or financial institutions... also may purchase securities issued or guaranteed by the U.S. Government or foreign governments... (``CMOs'').\\8\\ The Fund may purchase or sell securities on a when issued, delayed delivery or forward...

  19. 77 FR 48572 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Order Approving Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-14

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67621; File No. SR-FICC-2012-05] Self... Corporation (``FICC'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change SR-FICC-2012-05 pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'').\\1...

  20. 76 FR 17782 - Security Zone: Passenger Vessels, Sector Southeastern New England Captain of the Port Zone

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-31

    ...-AA87 Security Zone: Passenger Vessels, Sector Southeastern New England Captain of the Port Zone AGENCY... extending the effective period for temporary fixed and moving security zones around certain passenger vessels in the Sector Southeastern New England Captain of the Port Zone through October 1, 2011. Temporary...

  1. 29 CFR 1918.24 - Fixed and portable ladders.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., and be positively secured or held against shifting or slipping. When conditions are such that a... strength shall be furnished and positively secured or held against shifting or slipping while in use. Steps... securely positioned on a level and firm base. (2) Ladders shall be fitted with slip-resistant bases and/or...

  2. 29 CFR 1918.24 - Fixed and portable ladders.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., and be positively secured or held against shifting or slipping. When conditions are such that a... strength shall be furnished and positively secured or held against shifting or slipping while in use. Steps... securely positioned on a level and firm base. (2) Ladders shall be fitted with slip-resistant bases and/or...

  3. 29 CFR 1918.24 - Fixed and portable ladders.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., and be positively secured or held against shifting or slipping. When conditions are such that a... strength shall be furnished and positively secured or held against shifting or slipping while in use. Steps... securely positioned on a level and firm base. (2) Ladders shall be fitted with slip-resistant bases and/or...

  4. 29 CFR 1918.24 - Fixed and portable ladders.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., and be positively secured or held against shifting or slipping. When conditions are such that a... strength shall be furnished and positively secured or held against shifting or slipping while in use. Steps... securely positioned on a level and firm base. (2) Ladders shall be fitted with slip-resistant bases and/or...

  5. 29 CFR 1918.24 - Fixed and portable ladders.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., and be positively secured or held against shifting or slipping. When conditions are such that a... strength shall be furnished and positively secured or held against shifting or slipping while in use. Steps... securely positioned on a level and firm base. (2) Ladders shall be fitted with slip-resistant bases and/or...

  6. 75 FR 38019 - Safety Zone; Fixed Mooring Balls, South of Barbers Pt. Harbor Channel, Oahu, HI

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-01

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0457] RIN 1625-AA00 Safety Zone; Fixed Mooring Balls, South of Barbers Pt. Harbor Channel, Oahu, HI AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: Due to the placement of six fixed mooring balls in an...

  7. Delivering Summer Electronic Benefit Transfers for Children through the Supplemental Nutrition Assistance Program or the Special Supplemental Nutrition Program for Women, Infants, and Children: Benefit Use and Impacts on Food Security and Foods Consumed.

    PubMed

    Gordon, Anne R; Briefel, Ronette R; Collins, Ann M; Rowe, Gretchen M; Klerman, Jacob A

    2017-03-01

    The Summer Electronic Benefit Transfers for Children (SEBTC) demonstration piloted summer food assistance through electronic benefit transfers (EBTs), providing benefits either through the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) or the Supplemental Nutrition Assistance Program (SNAP) EBT. To inform food assistance policy and describe how demonstrations using WIC and SNAP models differed in benefit take-up and impacts on food security and children's food consumption. Sites chose to deliver SEBTC using the SNAP or WIC EBT system. Within each site, in 2012, households were randomly assigned to a benefit group or a no-benefit control group. Grantees (eight states and two Indian Tribal Organizations) selected school districts serving many low-income children. Schoolchildren were eligible in cases where they had been certified for free or reduced-price meals during the school year. Before the demonstration, households in the demonstration sample had lower incomes and lower food security, on average, than households with eligible children nationally. Grantees provided selected households with benefits worth $60 per child per summer month using SNAP or WIC EBT systems. SNAP-model benefits covered most foods. WIC-model benefits could only be used for a specific package of foods. Key outcomes were children's food security (assessed using the US Department of Agriculture food security scale) and food consumption (assessed using food frequency questions). Differences in mean outcomes between the benefit and control groups measured impact, after adjusting for household characteristics. In WIC sites, benefit-group households redeemed a lower percentage of SEBTC benefits than in SNAP sites. Nonetheless, the benefit groups in both sets of sites had similar large reductions in very low food security among children, relative to no-benefit controls. Children receiving benefits consumed more healthful foods, and these impacts were larger in WIC sites. Results suggest the WIC SEBTC model deserves strong consideration. Copyright © 2017 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.

  8. WASTE TREATMENT BUILDING SYSTEM DESCRIPTION DOCUMENT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    F. Habashi

    2000-06-22

    The Waste Treatment Building System provides the space, layout, structures, and embedded subsystems that support the processing of low-level liquid and solid radioactive waste generated within the Monitored Geologic Repository (MGR). The activities conducted in the Waste Treatment Building include sorting, volume reduction, and packaging of dry waste, and collecting, processing, solidification, and packaging of liquid waste. The Waste Treatment Building System is located on the surface within the protected area of the MGR. The Waste Treatment Building System helps maintain a suitable environment for the waste processing and protects the systems within the Waste Treatment Building (WTB) from mostmore » of the natural and induced environments. The WTB also confines contaminants and provides radiological protection to personnel. In addition to the waste processing operations, the Waste Treatment Building System provides space and layout for staging of packaged waste for shipment, industrial and radiological safety systems, control and monitoring of operations, safeguards and security systems, and fire protection, ventilation and utilities systems. The Waste Treatment Building System also provides the required space and layout for maintenance activities, tool storage, and administrative facilities. The Waste Treatment Building System integrates waste processing systems within its protective structure to support the throughput rates established for the MGR. The Waste Treatment Building System also provides shielding, layout, and other design features to help limit personnel radiation exposures to levels which are as low as is reasonably achievable (ALARA). The Waste Treatment Building System interfaces with the Site Generated Radiological Waste Handling System, and with other MGR systems that support the waste processing operations. The Waste Treatment Building System interfaces with the General Site Transportation System, Site Communications System, Site Water System, MGR Site Layout, Safeguards and Security System, Site Radiological Monitoring System, Site Electrical Power System, Site Compressed Air System, and Waste Treatment Building Ventilation System.« less

  9. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.

    PubMed

    Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng

    2018-04-01

     With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated.  Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks.  The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS.  We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features for privacy preservation and effectively cope with cloud-assisted TMIS with better efficiency. Copyright © 2018 Elsevier B.V. All rights reserved.

  10. Department of Defense Intelligence Information System (DoDIIS). Instructions 2000

    DTIC Science & Technology

    2000-02-01

    DIA, November 1993, DoDIIS Site Certifier’s Guide, SC-2610-143-93. e) DIA, June 1995, DoDIIS Security Architecture Guidance and Directions ( SAGD ), Draft...Plan S&T Scientific & Technical SAGD Security Architecture Guidance and Directions SBU Sensitive But Unclassified SCI Sensitive Compartmented

  11. Very low cost real time histogram-based contrast enhancer utilizing fixed-point DSP processing

    NASA Astrophysics Data System (ADS)

    McCaffrey, Nathaniel J.; Pantuso, Francis P.

    1998-03-01

    A real time contrast enhancement system utilizing histogram- based algorithms has been developed to operate on standard composite video signals. This low-cost DSP based system is designed with fixed-point algorithms and an off-chip look up table (LUT) to reduce the cost considerably over other contemporary approaches. This paper describes several real- time contrast enhancing systems advanced at the Sarnoff Corporation for high-speed visible and infrared cameras. The fixed-point enhancer was derived from these high performance cameras. The enhancer digitizes analog video and spatially subsamples the stream to qualify the scene's luminance. Simultaneously, the video is streamed through a LUT that has been programmed with the previous calculation. Reducing division operations by subsampling reduces calculation- cycles and also allows the processor to be used with cameras of nominal resolutions. All values are written to the LUT during blanking so no frames are lost. The enhancer measures 13 cm X 6.4 cm X 3.2 cm, operates off 9 VAC and consumes 12 W. This processor is small and inexpensive enough to be mounted with field deployed security cameras and can be used for surveillance, video forensics and real- time medical imaging.

  12. 78 FR 26814 - Millington Exchange Traded MAVINS Fund, LLC and Millington Securities, Inc.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-08

    ... size, experience and potentially stronger relationships in the fixed income markets. Purchases of... into, and receive securities from, the series in connection with the purchase and redemption of...

  13. Investigation and Implementation of Commercially Available Optically Stimulated Luminescence Dosimeters for Use in Fixed Nuclear Accident Dosimeter Systems.

    PubMed

    Georgeson, David L; Christiansen, Byron H

    2018-06-01

    Idaho National Laboratory transitioned from an external dosimetry system reliant on thermoluminescent dosimeters to one that uses optically stimulated luminescence dosimeters in 2010. This change not only affected the dosimeters worn by personnel, but those found in the nuclear-accident dosimeters used across Idaho National Laboratory. The elimination of on-site use and processing of thermoluminescent dosimeters impacted Idaho National Laboratory's ability to process nuclear-accident dosimeters in a timely manner. This change in processes drove Idaho National Laboratory to develop an alternative method for fixed nuclear-accident dosimeter gamma-dose analyses. This new method was driven by the need to establish a simple, cost-effective, and rapid-turnaround alternative to the thermoluminescent-dosimeter-based fixed nuclear-accident dosimeter system. An adaptation of existing technologies proved to be the most efficient path to this end. The purpose of this article is to delineate the technical basis for replacing the thermoluminescent dosimeter contained within the Idaho National Laboratory fixed nuclear-accident dosimeter system with optically stimulated luminescence-based Landauer, Inc., nanoDot dosimeters.

  14. 6 CFR 27.245 - Review and approval of site security plans.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  15. 6 CFR 27.245 - Review and approval of site security plans.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  16. 6 CFR 27.245 - Review and approval of site security plans.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  17. 6 CFR 27.245 - Review and approval of site security plans.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  18. 6 CFR 27.245 - Review and approval of site security plans.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  19. [Cost at the first level of care].

    PubMed

    Villarreal-Ríos, E; Montalvo-Almaguer, G; Salinas-Martínez, M; Guzmán-Padilla, J E; Tovar-Castillo, N H; Garza-Elizondo, M E

    1996-01-01

    To estimate the unit cost of 15 causes of demand for primary care per health clinic in an institutional (social security) health care system, and to determine the average cost at the state level. The cost of 80% of clinic visits was estimated in 35 of 40 clinics in the social security health care system in the state of Nuevo Leon, Mexico. The methodology for fixed costs consisted of: departmentalization, inputs, cost, weights and construction of matrices. Variable costs were estimated for standard patients by type of health care sought and with the consensus of experts; the sum of fixed and variable costs gave the unit cost. A computerized model was employed for data processing. A large variation in unit cost was observed between health clinics studied for all causes of demand, in both metropolitan and non-metropolitan areas. Prenatal care ($92.26) and diarrhea ($93.76) were the least expensive while diabetes ($240.42) and hypertension ($312.54) were the most expensive. Non-metropolitan costs were higher than metropolitan costs (p < 0.05); controlling for number of physician's offices showed that this was determined by medical units with only one physician's office. Knowledge of unit costs is a tool that, when used by medical administrators, allows adequate health care planning and efficient allocation of health resources.

  20. DOE`s nation-wide system for access control can solve problems for the federal government

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Callahan, S.; Tomes, D.; Davis, G.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less

  1. Scanning Cloud Radar Observations at the ARM sites

    NASA Astrophysics Data System (ADS)

    Kollias, P.; Clothiaux, E. E.; Shupe, M.; Widener, K.; Bharadwaj, N.; Miller, M. A.; Verlinde, H.; Luke, E. P.; Johnson, K. L.; Jo, I.; Tatarevic, A.; Lamer, K.

    2012-12-01

    Recently, the DOE Atmospheric Radiation Measurement (ARM) program upgraded its fixed and mobile facilities with the acquisition of state-of-the-art scanning, dual-wavelength, polarimetric, Doppler cloud radars. The scanning ARM cloud radars (SACR's) are the most expensive and significant radar systems at all ARM sites and eight SACR systems will be operational at ARM sites by the end of 2013. The SACR's are the primary instruments for the detection of 3D cloud properties (boundaries, volume cloud fractional coverage, liquid water content, dynamics, etc.) beyond the soda-straw (profiling) limited view. Having scanning capabilities with two frequencies and polarization allows more accurate probing of a variety of cloud systems (e.g., drizzle and shallow, warm rain), better correction for attenuation, use of attenuation for liquid water content retrievals, and polarimetric and dual-wavelength ratio characterization of non-spherical particles for improved ice crystal habit identification. Examples of SACR observations from four ARM sites are presented here: the fixed sites at Southern Great Plains (SGP) and North Slope of Alaska (NSA), and the mobile facility deployments at Graciosa Island, Azores and Cape Cod, Massachusetts. The 3D cloud structure is investigated both at the macro-scale (20-50 km) and cloud-scale (100-500 m). Doppler velocity measurements are corrected for velocity folding and are used either to describe the in-cloud horizontal wind profile or the 3D vertical air motions.

  2. 10 CFR 73.45 - Performance capabilities for fixed site physical protection systems.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... authorization schedules and entry criteria before permitting entry and to initiate response measures to deny... movement of strategic special nuclear material within material access areas. To achieve this capability the physical protection system shall: (1) Detect unauthorized placement and movement of strategic special...

  3. 12 CFR 9.14 - Deposit of securities with state authorities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... than assets (e.g., a requirement to deposit a fixed amount or an amount equal to a percentage of... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Deposit of securities with state authorities. 9... ACTIVITIES OF NATIONAL BANKS Regulations § 9.14 Deposit of securities with state authorities. (a) In general...

  4. 78 FR 37631 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Request To...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-21

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69774; File No. SR-FICC-2013-06] Self... Program for Certain Government Securities Division Rules Relating to the GCF Repo[supreg] Service June 17, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ notice is...

  5. 78 FR 68496 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-14

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70831; File No. SR-FICC-2013-09] Self...[supreg] at FICC's Government Securities Division November 7, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that, on...

  6. 77 FR 38108 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-26

    ... securities substitutions begin to be permitted, FICC will announce this to members by important notice. Other... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67227; File No. SR-FICC-2012-05] Self... Infrastructure Reform Task Force June 20, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of...

  7. Patients' experiences of an open access follow up arrangement in managing inflammatory bowel disease

    PubMed Central

    Rogers, A; Kennedy, A; Nelson, E; Robinson, A

    2004-01-01

    Background: Improving access is a key policy issue in improving quality of care and extending patient choice and participation. People's experience of changing from fixed outpatient appointments to more flexible direct access arrangements for chronic disease has been underexplored. Objectives: To examine patients' views on using an open system of access compared with fixed outpatient appointments as part of a guided self-management intervention for inflammatory bowel disease (IBD). Design: Embedded qualitative study undertaken alongside a randomised controlled trial. Semi-structured interviews were undertaken to obtain an in depth understanding of patients' experience of the change in access arrangements. Participants: A purposive sample (n = 30) was drawn from the intervention group (n = 700) according to a range of responses to the trial baseline and follow up quantitative measures. Results: 28 interviews were included in the analysis. Compared with the previous system of fixed appointments, preference for the new open access system was based on enhanced personal control in contacting services and the view that it fitted better with everyday routine management and the requirement for urgent medical contact when symptoms fail to respond to medication. Preference for retaining fixed appointments was based on a sense of security from gaining access which did not require the individual to initiate the request for medical help. Conclusions: Open access may fit better with patients' self-management of their condition and everyday routines, roles and responsibilities. Ensuring that outpatient organisational arrangements and personnel are responsive to patient initiated requests for appointments is likely to impact on the acceptability of this type of access arrangement. Some people may continue to prefer the fixed appointment system which should be retained if patient choice is to be respected. PMID:15465941

  8. Strengthening National, Homeland, and Economic Security. Networking and Information Technology Research and Development Supplement to the President’s FY 2003 Budget

    DTIC Science & Technology

    2002-07-01

    Knowledge From Data .................................................. 25 HIGH-CONFIDENCE SOFTWARE AND SYSTEMS Reliability, Security, and Safety for...NOAA’s Cessna Citation flew over the 16-acre World Trade Center site, scanning with an Optech ALSM unit. The system recorded data points from 33,000...provide the data storage and compute power for intelligence analysis, high-performance national defense systems , and critical scientific research • Large

  9. Feasibility Study of Economics and Performance of Solar Photovoltaics in the Commonwealth of Puerto Rico

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Salasovich, J.; Mosey, G.

    2011-03-01

    This report presents the results of an assessment of the technical and economic feasibility of deploying a photovoltaics (PV) system on brownfield sites in the Commonwealth of Puerto Rico. All of the assessed sites are landfills. The sites were assessed for possible PV installations. The cost, performance, and site impacts of different PV options were estimated. The economics of the potential systems were analyzed using an electric rate of $0.119/kWh and incentives offered by Puerto Rico and by the serving utility, PREPA. According to the site production calculations, the most cost-effective system in terms of return on investment is themore » thin-film fixed-tilt technology. The report recommends financing options that could assist in the implementation of such a system.« less

  10. EPIC Calibration/Validation Experiment Field Campaign Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Koch, Steven E; Chilson, Phillip; Argrow, Brian

    A field exercise involving several different kinds of Unmanned Aerial Systems (UAS) and supporting instrumentation systems provided by DOE/ARM and NOAA/NSSL was conducted at the ARM SGP site in Lamont, Oklahoma on 29-30 October 2016. This campaign was part of a larger National Oceanic and Atmospheric Administration (NOAA) UAS Program Office program awarded to the National Severe Storms Laboratory (NSSL). named Environmental Profiling and Initiation of Convection (EPIC). The EPIC Field Campaign (Test and Calibration/Validation) proposed to ARM was a test or “dry-run” for a follow-up campaign to be requested for spring/summer 2017. The EPIC project addresses NOAA’s objective tomore » “evaluate options for UAS profiling of the lower atmosphere with applications for severe weather.” The project goal is to demonstrate that fixed-wing and rotary-wing small UAS have the combined potential to provide a unique observing system capable of providing detailed profiles of temperature, moisture, and winds within the atmospheric boundary layer (ABL) to help determine the potential for severe weather development. Specific project objectives are: 1) to develop small UAS capable of acquiring needed wind and thermodynamic profiles and transects of the ABL using one fixed-wing UAS operating in tandem with two different fixed rotary-wing UAS pairs; 2) adapt and test miniaturized, high-precision, and fast-response atmospheric sensors with high accuracy in strong winds characteristic of the pre-convective ABL in Oklahoma; 3) conduct targeted short-duration experiments at the ARM Southern Great Plains site in northern Oklahoma concurrently with a second site to be chosen in “real-time” from the Oklahoma Mesonet in coordination with the (National Weather Service (NWS)-Norman Forecast Office; and 4) gain valuable experience in pursuit of NOAA’s goals for determining the value of airborne, mobile observing systems for monitoring rapidly evolving high-impact severe weather conditions not observed with current operational systems. OU operated three UAS at the Lamont SGP site – the OU CopterSonde, the OU Iris, and the Meteomatics Meteodrone – under a blanket Federal Aviation Administration (FAA) Certificate of Authorization (COA) allowing flights up to 400 feet above ground level (AGL). The mission for the rotary-wing UAS involved four aircraft, three from the ARM Lamont site and one from an Oklahoma Mesonet site located at Medford, involving a vertical ascent to an altitude of 400 ft (130 m) AGL at ~ 30 minute intervals for ~ 5 hours duration on each of the two experiment days. This operation was conducted in close coordination with NSSL-launched rawinsonde balloons at the two sites, and operation of a fixed-wing UAS from the University of Colorado called the TTwistor that flew mission flight legs between the Lamont site and Medford. The NSSL operation at Medford (outside of ARM) also involved use of their Collaborative Lower Atmosphere Mobile Profiling System (CLAMPS) ground-based remote-sensing system for measuring atmospheric profiles of temperature, moisture, and winds with atmospheric emitted radiance interferometer (AERI), microwave radiometer, and Doppler wind lidar systems. The ARM Facility supported the project by providing access to their instrumented tower data at Lamont (at three levels), as well as AERI and Doppler wind lidar data obtained from systems quite similar to those used by CLAMPS. These non-UAS data from both ARM and NSSL provided the observations used to validate the experimental UAS observations.« less

  11. Final Report, Next-Generation Mega-Voltage Cargo-Imaging System for Cargo Conainer Inspection, March 2007

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dr. James Clayton, Ph.D., Varian Medical Systems-Security & Inspection Products; Dr. Emma Regentova, Ph.D, University of Nevada Las Vegas; Dr. Evangelos Yfantis, Ph.D., University of Nevada, Las Vegas

    The UNLV Research Foundation, as the primary award recipient, teamed with Varian Medical Systems-Security & Inspection Products and the University of Nevada Las Vegas (UNLV) for the purpose of conducting research and engineering related to a "next-generation" mega-voltage imaging (MVCI) system for inspection of cargo in large containers. The procurement and build-out of hardware for the MVCI project has been completed. The K-9 linear accelerator and an optimized X-ray detection system capable of efficiently detecting X-rays emitted from the accelerator after they have passed through the device is under test. The Office of Science financial assistance award has made possiblemore » the development of a system utilizing a technology which will have a profound positive impact on the security of U.S. seaports. The proposed project will ultimately result in critical research and development advances for the "next-generation" Linatron X-ray accelerator technology, thereby providing a safe, reliable and efficient fixed and mobile cargo inspection system, which will very significantly increase the fraction of cargo containers undergoing reliable inspection as the enter U.S. ports. Both NNSA/NA-22 and the Department of Homeland Security's Domestic Nuclear Detection Office are collaborating with UNLV and its team to make this technology available as soon as possible.« less

  12. Experience and results of the 1991 MTLRS-1 USSR campaign

    NASA Technical Reports Server (NTRS)

    Sperber, Peter; Hauck, H.

    1993-01-01

    The year 1991 was a special year for the mobile laser ranging systems. Due to the scheduled upgrades of the Modular Transportable Laser Ranging Systems, MTLRS#1 and MTLRS#2, neither a WEGENER MEDLAS nor a Crustal Dynamics Project campaign was carried out in 1991. After the successful upgrade of MTLRS#1 in the first half of 1991 the system departed from Wettzell in August to make measurements at two sites in the USSR. In Riga/Latvia, we operated close to the fixed SLR system. In Simeiz/Ucrainea, the place for MTLRS#1 pad was choosen to collocate the two fixed SLR stations in Simeiz (300 m distance to MTLRS#1) and Kazivelli (about 3 km distance).

  13. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 5

    DTIC Science & Technology

    2006-05-01

    Coming Events Web Sites Call for Articles Visit CrossTalk at the SSTC BackTalk Transforming: Business , Security ,Warfighting CrossTalk 76 SMXG CO-SPONSOR...theme “Transforming: Business , Security , Warfighting.” Transformation is not just the current buzzword: Many industries and the military have...systems. Transforming: Business , Security ,Warfighting Characteristic edocfosenilnoillim001-01eziS Number of external interfaces 30-300 Number of

  14. Integrated homeland security system with passive thermal imaging and advanced video analytics

    NASA Astrophysics Data System (ADS)

    Francisco, Glen; Tillman, Jennifer; Hanna, Keith; Heubusch, Jeff; Ayers, Robert

    2007-04-01

    A complete detection, management, and control security system is absolutely essential to preempting criminal and terrorist assaults on key assets and critical infrastructure. According to Tom Ridge, former Secretary of the US Department of Homeland Security, "Voluntary efforts alone are not sufficient to provide the level of assurance Americans deserve and they must take steps to improve security." Further, it is expected that Congress will mandate private sector investment of over $20 billion in infrastructure protection between 2007 and 2015, which is incremental to funds currently being allocated to key sites by the department of Homeland Security. Nearly 500,000 individual sites have been identified by the US Department of Homeland Security as critical infrastructure sites that would suffer severe and extensive damage if a security breach should occur. In fact, one major breach in any of 7,000 critical infrastructure facilities threatens more than 10,000 people. And one major breach in any of 123 facilities-identified as "most critical" among the 500,000-threatens more than 1,000,000 people. Current visible, nightvision or near infrared imaging technology alone has limited foul-weather viewing capability, poor nighttime performance, and limited nighttime range. And many systems today yield excessive false alarms, are managed by fatigued operators, are unable to manage the voluminous data captured, or lack the ability to pinpoint where an intrusion occurred. In our 2006 paper, "Critical Infrastructure Security Confidence Through Automated Thermal Imaging", we showed how a highly effective security solution can be developed by integrating what are now available "next-generation technologies" which include: Thermal imaging for the highly effective detection of intruders in the dark of night and in challenging weather conditions at the sensor imaging level - we refer to this as the passive thermal sensor level detection building block Automated software detection for creating initial alerts - we refer to this as software level detection, the next level building block Immersive 3D visual assessment for situational awareness and to manage the reaction process - we refer to this as automated intelligent situational awareness, a third building block Wide area command and control capabilities to allow control from a remote location - we refer to this as the management and process control building block integrating together the lower level building elements. In addition, this paper describes three live installations of complete, total systems that incorporate visible and thermal cameras as well as advanced video analytics. Discussion of both system elements and design is extensive.

  15. Multiple-Feature Extracting Modules Based Leak Mining System Design

    PubMed Central

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing. PMID:24453892

  16. Multiple-feature extracting modules based leak mining system design.

    PubMed

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing.

  17. Six-dimensional quantum dynamics study for the dissociative adsorption of HCl on Au(111) surface

    NASA Astrophysics Data System (ADS)

    Liu, Tianhui; Fu, Bina; Zhang, Dong H.

    2013-11-01

    The six-dimensional quantum dynamics calculations for the dissociative chemisorption of HCl on Au(111) are carried out using the time-dependent wave-packet approach, based on an accurate PES which was recently developed by neural network fitting to density functional theory energy points. The influence of vibrational excitation and rotational orientation of HCl on the reactivity is investigated by calculating the exact six-dimensional dissociation probabilities, as well as the four-dimensional fixed-site dissociation probabilities. The vibrational excitation of HCl enhances the reactivity and the helicopter orientation yields higher dissociation probability than the cartwheel orientation. A new interesting site-averaged effect is found for the title molecule-surface system that one can essentially reproduce the six-dimensional dissociation probability by averaging the four-dimensional dissociation probabilities over 25 fixed sites.

  18. 75 FR 66295 - Fixed Assets, Member Business Loans, and Regulatory Flexibility Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-28

    ... assets, member business loans (MBL), stress testing of investments, and discretionary control of...) discretionary control of investments; (6) stress testing of investments; (7) zero-coupon securities; (8... fixed assets, MBL, stress testing of investments, and discretionary control of investments provisions of...

  19. 33 CFR 164.41 - Electronic position fixing devices.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Electronic position fixing devices. 164.41 Section 164.41 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY NAVIGATION SAFETY REGULATIONS § 164.41 Electronic position...

  20. 33 CFR 164.41 - Electronic position fixing devices.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Electronic position fixing devices. 164.41 Section 164.41 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY NAVIGATION SAFETY REGULATIONS § 164.41 Electronic position...

  1. 33 CFR 164.41 - Electronic position fixing devices.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Electronic position fixing devices. 164.41 Section 164.41 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY NAVIGATION SAFETY REGULATIONS § 164.41 Electronic position...

  2. 33 CFR 164.41 - Electronic position fixing devices.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Electronic position fixing devices. 164.41 Section 164.41 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY NAVIGATION SAFETY REGULATIONS § 164.41 Electronic position...

  3. 33 CFR 164.41 - Electronic position fixing devices.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Electronic position fixing devices. 164.41 Section 164.41 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY NAVIGATION SAFETY REGULATIONS § 164.41 Electronic position...

  4. 46 CFR 153.1502 - Fixed ballast relocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 5 2012-10-01 2012-10-01 false Fixed ballast relocation. 153.1502 Section 153.1502 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Maintenance § 153...

  5. 46 CFR 153.1502 - Fixed ballast relocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 5 2013-10-01 2013-10-01 false Fixed ballast relocation. 153.1502 Section 153.1502 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Maintenance § 153...

  6. 46 CFR 153.1502 - Fixed ballast relocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 5 2014-10-01 2014-10-01 false Fixed ballast relocation. 153.1502 Section 153.1502 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Maintenance § 153...

  7. 46 CFR 153.1502 - Fixed ballast relocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Fixed ballast relocation. 153.1502 Section 153.1502 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Maintenance § 153...

  8. 46 CFR 153.1502 - Fixed ballast relocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 5 2011-10-01 2011-10-01 false Fixed ballast relocation. 153.1502 Section 153.1502 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Maintenance § 153...

  9. 33 CFR 165.819 - Security Zone; Sabine Bank Channel, Sabine Pass Channel and Sabine-Neches Waterway, TX.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Broadcast Notice to Mariners and the presence of escort vessels displaying flashing blue law enforcement lights. (b) Regulations. (1) Entry into or remaining in a fixed security zone described in paragraph (a...

  10. 33 CFR 165.819 - Security Zone; Sabine Bank Channel, Sabine Pass Channel and Sabine-Neches Waterway, TX.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Broadcast Notice to Mariners and the presence of escort vessels displaying flashing blue law enforcement lights. (b) Regulations. (1) Entry into or remaining in a fixed security zone described in paragraph (a...

  11. 33 CFR 165.819 - Security Zone; Sabine Bank Channel, Sabine Pass Channel and Sabine-Neches Waterway, TX.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Broadcast Notice to Mariners and the presence of escort vessels displaying flashing blue law enforcement lights. (b) Regulations. (1) Entry into or remaining in a fixed security zone described in paragraph (a...

  12. 33 CFR 165.819 - Security Zone; Sabine Bank Channel, Sabine Pass Channel and Sabine-Neches Waterway, TX.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Broadcast Notice to Mariners and the presence of escort vessels displaying flashing blue law enforcement lights. (b) Regulations. (1) Entry into or remaining in a fixed security zone described in paragraph (a...

  13. State Cancer Profiles

    MedlinePlus

    ... the site again. The following web browsers and operating systems are sufficiently secure and advanced. These version numbers ... also acceptable. Microsoft Internet Explorer 7, if your operating system is Windows Vista or later. No version of ...

  14. Test Design Document for the Technology Demonstration of the Joint Network Defence and Management System (JNDMS) Project

    DTIC Science & Technology

    2006-10-25

    at this site: Timestamp IP Address Description Severity 2003 Sep 03 14:52:28 150.24.11.1 Security-Trojan- Sub7 18 2003 Sep 03 14:52:33...150.24.11.2 Security-Trojan- Sub7 18 2003 Sep 03 14:52:38 150.24.11.3 Security-Trojan- Sub7 18 4. The Security Analyst clicks on one of the lines in this...table: Severity Parameter Name Value Descriptive Details Location 3 HMCS Iroquois Type of Incident 2 Security-Trojan- Sub7 Asset Type 1 Workstation

  15. The hobbyist phenomenon in physical security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Michaud, E. C.

    Pro-Ams (professional amateurs) are groups of people who work on a problem as amateurs or unpaid persons in a given field at professional levels of competence. Astronomy is a good example of Pro-Am activity. At Galaxy Zoo, Pro-Ams evaluate data generated by professional observatories and are able to evaluate the millions of galaxies that have been observed but not classified, and report their findings at professional levels for fun. To allow the archiving of millions of galaxies that have been observed but not classified, the website has been engineered so that the public can view and classify galaxies even ifmore » they are not professional astronomers. In this endeavor, it has been found that amateurs can easily outperform automated vision systems. Today in the world of physical security, Pro-Ams are playing an ever-increasing role. Traditionally, locksmiths, corporations, and government organizations have been largely responsible for developing standards, uncovering vulnerabilities, and devising best security practices. Increasingly, however, nonprofit sporting organizations and clubs are doing this. They can be found all over the world, from Europe to the US and now South East Asia. Examples include TOOOL (The Open Organization of Lockpickers), the Longhorn Lockpicking Club, Sportsfreunde der Sperrtechnik - Deustcheland e.V., though there are many others. Members of these groups have been getting together weekly to discuss many elements of security, with some groups specializing in specific areas of security. When members are asked why they participate in these hobbyist groups, they usually reply (with gusto) that they do it for fun, and that they view defeating locks and other security devices as an interesting and entertaining puzzle. A lot of what happens at these clubs would not be possible if it weren't for 'Super Abundance', the ability to easily acquire (at little or no cost) the products, security tools, technologies, and intellectual resources traditionally limited to corporations, government organizations, or wealthy individuals. With this new access comes new discoveries. For example, hobbyist sport lockpicking groups discovered - and publicized - a number of new vulnerabilities between 2004 and 2009 that resulted in the majority of high-security lock manufacturers having to make changes and improvements to their products. A decade ago, amateur physical security discoveries were rare, at least those discussed publicly. In the interim, Internet sites such as lockpicking.org, lockpicking101.com and others have provided an online meeting place for people to trade tips, find friends with similar interests, and develop tools. The open, public discussion of software vulnerabilities, in contrast, has been going on for a long time. These two industries, physical security and software, have very different upgrade mechanisms. With software, a patch can typically be deployed quickly to fix a serious vulnerability, whereas a hardware fix for a physical security device or system can take upwards of months to implement in the field, especially if (as is often the case) hardware integrators are involved. Even when responding to publicly announced security vulnerabilities, manufacturers of physical security devices such as locks, intrusion detectors, or access control devices rarely view hobbyists as a positive resource. This is most unfortunate. In the field of software, it is common to speak of Open Source versus Closed Source. An Open Source software company may choose to distribute their software with a particular license, and give it away openly, with full details and all the lines of source code made available. Linux is a very popular example of this. A Close Source company, in contrast, chooses not to reveal its source code and will license its software products in a restrictive manor. Slowly, the idea of Open Source is now coming to the world of physical security. In the case of locks, it provides an alternative to the traditional Closed Source world of locksmiths. Now locks are physical objects, and can therefore be disassembled. As such, they have always been Open Source in a limited sense. Secrecy, in fact, is very difficult to maintain for a lock that is widely distributed. Having direct access to the lock design provides the hobbyist with a very open environment for finding security flaws, even if the lock manufacturer attempts to follow a Close Source model. It is clear that the field of physical security is going the digital route with companies such as Medeco, Mul-T-Lock, and Abloy manufacturing electromechanical locks. Various companies have already begun to add microcontrollers, cryptographic chip sets, solid-state sensors, and a number of other high-tech improvements to their product lineup in an effort to thwart people from defeating their security products.« less

  16. Utilizing Regional Centers in Sustaining Upgraded Russian Federation Ministry of Defense Sites

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kaldenbach, Karen Yvonne; Chainikov, General Vladimir; Fedorov, General Victor

    2010-01-01

    Since the mid-1990s the governments of the United States (U.S.) and the Russian Federation (RF) have been collaborating on nonproliferation projects, particularly in the protection of nuclear material through the Department of Energy's (DOE) National Nuclear Security Administration (NNSA). To date, this collaboration has resulted in upgrades to more than 72 RF Ministry of Defense (MOD) sensitive sites and facilities. These upgrades include physical protection systems (PPS), facilities to ensure material remains secure in various configurations, and infrastructure to support, maintain, and sustain upgraded sites. Significant effort on the part of both governments has also been expended to ensure thatmore » personnel obtain the necessary skills and training to both operate and maintain the security systems, thereby ensuring long term sustainability. To accomplish this, initial vendor training on physical protection systems was provided to key personnel, and an approved training curriculum was developed to teach the skills of operating, managing, administering, and maintaining the installed physical protection systems. This approach also included documentation of the processes and procedures to support infrastructure, requisite levels of maintenance and testing of systems and equipment, lifecycle management support, inventory systems and spare parts caches. One of the core components in the U.S. exit strategy and full transition to the RF MOD is the development and utilization of regional centers to facilitate centralized training and technical support to upgraded MOD sites in five regions of the RF. To date, two regional centers and one regional classroom facility are functional, and two additional regional centers are currently under construction. This paper will address the process and logistics of regional center establishment and the future vision for integrated regional center support by the RF MOD.« less

  17. Microscopic models for uphill diffusion

    NASA Astrophysics Data System (ADS)

    Colangeli, Matteo; De Masi, Anna; Presutti, Errico

    2017-10-01

    We study a system of particles which jump on the sites of the interval [1, L] of { Z} . The density at the boundaries is kept fixed to simulate the action of mass reservoirs. The evolution depends on two parameters \

  18. 10 CFR 73.46 - Fixed site physical protection systems, subsystems, components, and procedures.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... week, maintaining an intensity of approximately 75 percent of maximum heart rate for 20 minutes; (B... television or by other suitable means which limit exposure of responding personnel to possible attack. (7...

  19. 29 CFR 1910.212 - General requirements for all machines.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF LABOR OCCUPATIONAL SAFETY AND HEALTH STANDARDS Machinery and Machine Guarding § 1910.212...) Alligator shears. (d) Power presses. (e) Milling machines. (f) Power saws. (g) Jointers. (h) Portable power...) Anchoring fixed machinery. Machines designed for a fixed location shall be securely anchored to prevent...

  20. 29 CFR 1910.212 - General requirements for all machines.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., DEPARTMENT OF LABOR OCCUPATIONAL SAFETY AND HEALTH STANDARDS Machinery and Machine Guarding § 1910.212...) Alligator shears. (d) Power presses. (e) Milling machines. (f) Power saws. (g) Jointers. (h) Portable power...) Anchoring fixed machinery. Machines designed for a fixed location shall be securely anchored to prevent...

  1. 29 CFR 1910.212 - General requirements for all machines.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., DEPARTMENT OF LABOR OCCUPATIONAL SAFETY AND HEALTH STANDARDS Machinery and Machine Guarding § 1910.212...) Alligator shears. (d) Power presses. (e) Milling machines. (f) Power saws. (g) Jointers. (h) Portable power...) Anchoring fixed machinery. Machines designed for a fixed location shall be securely anchored to prevent...

  2. 77 FR 74249 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-13

    ... System (``FINRA ADDS'') is a secure Web site that provides a firm, by market participant identifier... generates a separate report for each data archive (Asset-Backed Securities or Corporate/Agency Debt..., 2013. For the Commission, by the Division of Trading and Markets, pursuant to delegated authority.\\11...

  3. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    PubMed

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security verification of our scheme using the widely accepted AVISPA tool. High security and extra functionality features allow our proposed scheme to be applicable for telecare medicine information systems which is used for e-health care medical applications. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  4. 'You fix my community, you have fixed my life': the disruption and rebuilding of ontological security in New Orleans.

    PubMed

    Hawkins, Robert L; Maurer, Katherine

    2011-01-01

    Using the concept of ontological security, this paper examines the physical and psychological loss of home and community following Hurricane Katrina. This qualitative longitudinal study includes 40 heads of households with school-age children who lived in New Orleans during Hurricane Katrina. Participants describe a breakdown in their social fabric at the individual and structural/community levels that contributes to a sense of community loss and social displacement, disrupting their ontological security--their notion of safety, routine and trust in a stable environment. Three interrelated reactions were common: 1) experiencing nostalgia for their old neighbourhoods specifically and New Orleans in general; 2) experiencing a sense of loss of people and things that represented a level of security or constancy; 3) initiation of a process for re-establishing ontological security whether or not they returned to New Orleans. The paper concludes that intangible losses have an important psychological effect on community redevelopment and recovery from trauma. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.

  5. 49 CFR 1562.21 - Scope, general requirements, and definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... to aircraft operations into or out of Ronald Reagan Washington National Airport (DCA), fixed base... not include an armed security officer. DCA means Ronald Reagan Washington National Airport. DASSP...

  6. 49 CFR 1562.21 - Scope, general requirements, and definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... to aircraft operations into or out of Ronald Reagan Washington National Airport (DCA), fixed base... not include an armed security officer. DCA means Ronald Reagan Washington National Airport. DASSP...

  7. On-Site Renewable Energy and Green Buildings: A System-Level Analysis.

    PubMed

    Al-Ghamdi, Sami G; Bilec, Melissa M

    2016-05-03

    Adopting a green building rating system (GBRSs) that strongly considers use of renewable energy can have important environmental consequences, particularly in developing countries. In this paper, we studied on-site renewable energy and GBRSs at the system level to explore potential benefits and challenges. While we have focused on GBRSs, the findings can offer additional insight for renewable incentives across sectors. An energy model was built for 25 sites to compute the potential solar and wind power production on-site and available within the building footprint and regional climate. A life-cycle approach and cost analysis were then completed to analyze the environmental and economic impacts. Environmental impacts of renewable energy varied dramatically between sites, in some cases, the environmental benefits were limited despite the significant economic burden of those renewable systems on-site and vice versa. Our recommendation for GBRSs, and broader policies and regulations, is to require buildings with higher environmental impacts to achieve higher levels of energy performance and on-site renewable energy utilization, instead of fixed percentages.

  8. Airborne and Ground-Based Optical Characterization of Legacy Underground Nuclear Test Sites

    NASA Astrophysics Data System (ADS)

    Vigil, S.; Craven, J.; Anderson, D.; Dzur, R.; Schultz-Fellenz, E. S.; Sussman, A. J.

    2015-12-01

    Detecting, locating, and characterizing suspected underground nuclear test sites is a U.S. security priority. Currently, global underground nuclear explosion monitoring relies on seismic and infrasound sensor networks to provide rapid initial detection of potential underground nuclear tests. While seismic and infrasound might be able to generally locate potential underground nuclear tests, additional sensing methods might be required to further pinpoint test site locations. Optical remote sensing is a robust approach for site location and characterization due to the ability it provides to search large areas relatively quickly, resolve surface features in fine detail, and perform these tasks non-intrusively. Optical remote sensing provides both cultural and surface geological information about a site, for example, operational infrastructure, surface fractures. Surface geological information, when combined with known or estimated subsurface geologic information, could provide clues concerning test parameters. We have characterized two legacy nuclear test sites on the Nevada National Security Site (NNSS), U20ak and U20az using helicopter-, ground- and unmanned aerial system-based RGB imagery and light detection and ranging (lidar) systems. The multi-faceted information garnered from these different sensing modalities has allowed us to build a knowledge base of how a nuclear test site might look when sensed remotely, and the standoff distances required to resolve important site characteristics.

  9. Safe-haven locking device

    DOEpatents

    Williams, J.V.

    1984-04-26

    Disclosed is a locking device for eliminating external control of a secured space formed by fixed and movable barriers. The locking device uses externally and internally controlled locksets and a movable strike, operable from the secured side of the movable barrier, to selectively engage either lockset. A disengagement device, for preventing forces from being applied to the lock bolts is also disclosed. In this manner, a secured space can be controlled from the secured side as a safe-haven. 4 figures.

  10. 32 CFR 310.32 - System notices.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... identified. (5) If the social security number is being collected and maintained, E.O. 9397 (“Numbering... public Web site (http://www.defenselink.mil/privacy/cfr-rules.html). (3) The individual may also be... to a public Web site (see http://www.defenselink.mil/privacy/notices). ...

  11. 32 CFR 310.32 - System notices.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... identified. (5) If the social security number is being collected and maintained, E.O. 9397 (“Numbering... public Web site (http://www.defenselink.mil/privacy/cfr-rules.html). (3) The individual may also be... to a public Web site (see http://www.defenselink.mil/privacy/notices). ...

  12. 77 FR 30032 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Order Approving Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-21

    ... Professionals'' May 15, 2012. I. Introduction On March 20, 2012, the Fixed Income Clearing Corporation (``FICC... Members and NYPC Clearing Members for certain ``market professionals.'' \\6\\ \\5\\ See Securities Exchange... professional'' cross-margining program aims to closely replicate the Options Clearing Corporation (``OCC...

  13. Kentucky commercial vehicle safety applications evaluation : technical report.

    DOT National Transportation Integrated Search

    2008-01-31

    An advanced-technology Integrated Safety and Security Enforcement System (ISSES), now deployed at three commercial vehicle inspection sites along interstate highways in Kentucky, was evaluated from the point of view of system performance, potential e...

  14. Six-dimensional quantum dynamics study for the dissociative adsorption of HCl on Au(111) surface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liu, Tianhui; Fu, Bina; Zhang, Dong H., E-mail: zhangdh@dicp.ac.cn

    The six-dimensional quantum dynamics calculations for the dissociative chemisorption of HCl on Au(111) are carried out using the time-dependent wave-packet approach, based on an accurate PES which was recently developed by neural network fitting to density functional theory energy points. The influence of vibrational excitation and rotational orientation of HCl on the reactivity is investigated by calculating the exact six-dimensional dissociation probabilities, as well as the four-dimensional fixed-site dissociation probabilities. The vibrational excitation of HCl enhances the reactivity and the helicopter orientation yields higher dissociation probability than the cartwheel orientation. A new interesting site-averaged effect is found for the titlemore » molecule-surface system that one can essentially reproduce the six-dimensional dissociation probability by averaging the four-dimensional dissociation probabilities over 25 fixed sites.« less

  15. A benthic-macroinvertebrate index of biotic integrity and assessment of conditions in selected streams in Chester County, Pennsylvania, 1998-2009

    USGS Publications Warehouse

    Reif, Andrew G.

    2012-01-01

    The Stream Conditions of Chester County Biological Monitoring Network (Network) was established by the U.S. Geological Survey and the Chester County Water Resources Authority in 1969. Chester County encompasses 760 square miles in southeastern Pennsylvania and has a rapidly expanding population. Land-use change has occurred in response to this continual growth, as open space, agricultural lands, and wooded lands have been converted to residential and commercial lands. In 1998, the Network was modified to include 18 fixed-location sites and 9 flexible-location sites. Sites were sampled annually in the fall (October-November) during base-flow conditions for water chemistry, instream habitat, and benthic macroinvertebrates. A new set of 9 flexible-location sites was selected each year. From 1998 to 2009, 213 samples were collected from the 18 fixed-location sites and 107 samples were collected from the 84 flexible-location sites. Eighteen flexible-location sites were sampled more than once over the 12-year period; 66 sites were sampled only once. Benthic-macroinvertebrate data from samples collected during 1998-2009 were used to establish the Chester County Index of Biotic Integrity (CC-IBI). The CC-IBI was based on the methods and metrics outlined in the Pennsylvania Department of Environmental Protection's "A Benthic Index of Biotic Integrity for Wadeable Freestone Streams in Pennsylvania." The resulting CC-IBI consists of scores for benthic-macroinvertebrate samples collected from sites in the Network that related to reference conditions in Chester County. Mean CC-IBI scores for 18 fixed-location sites ranged from 37.21 to 88.92. Thirty-nine percent of the 213 samples collected at the 18 fixed-location sites had a CC-IBI score less than 50; 33 percent, 50 to 70; 28 percent, greater than 70. CC-IBI scores from the 107 flexible-location samples ranged from 23.48 to 99.96. Twenty-five percent of the 107 samples collected at the flexible-location sites had a CC-IBI score less than 50; 33 percent, 50 to 70; and 42 percent, greater than 70. Factors that were found to affect CC-IBI scores are nutrient concentrations, habitat conditions, and percent of wooded and urban land use. A positive relation was determined between mean CC-IBI scores and mean total habitat scores for the 18 fixed-location sites. CC-IBI scores were most strongly affected by stream bank vegetative protection, embeddedness, riparian zone width, and sediment deposition. The highest CC-IBI scores were associated with sites that had greater than 28 percent wooded-wetland-water land use, less than 5 percent urban land use, and no municipal wastewater discharges within 10 miles upstream from the sampling site. The lowest CC-IBI scores were associated with sites where urban land use was greater than 15 percent or a municipal wastewater discharge was within 10 miles upstream from the sampling reach. The Mann Kendall test for trends was used to determine trends in CC-IBI scores and concentrations of nitrate, orthophosphate, and chloride for the 18 fixed-location sites. A positive trend in CC-IBI was determined for six sites, and a negative trend was determined for one site. Positive trends in nitrate concentrations were determined for 4 of the 18 fixed-location sites, and a negative trend in orthophosphate concentrations was determined for 1 of the 18 fixed-location sites. Positive trends in chloride concentrations were determined for 16 of the 18 fixed-location sites.

  16. Detecting submerged features in water: modeling, sensors, and measurements

    NASA Astrophysics Data System (ADS)

    Bostater, Charles R., Jr.; Bassetti, Luce

    2004-11-01

    It is becoming more important to understand the remote sensing systems and associated autonomous or semi-autonomous methodologies (robotic & mechatronics) that may be utilized in freshwater and marine aquatic environments. This need comes from several issues related not only to advances in our scientific understanding and technological capabilities, but also from the desire to insure that the risk associated with UXO (unexploded ordnance), related submerged mines, as well as submerged targets (such as submerged aquatic vegetation) and debris left from previous human activities are remotely sensed and identified followed by reduced risks through detection and removal. This paper will describe (a) remote sensing systems, (b) platforms (fixed and mobile, as well as to demonstrate (c) the value of thinking in terms of scalability as well as modularity in the design and application of new systems now being constructed within our laboratory and other laboratories, as well as future systems. New remote sensing systems - moving or fixed sensing systems, as well as autonomous or semi-autonomous robotic and mechatronic systems will be essential to secure domestic preparedness for humanitarian reasons. These remote sensing systems hold tremendous value, if thoughtfully designed for other applications which include environmental monitoring in ambient environments.

  17. Feasibility Study of Economics and Performance of Solar Photovoltaics at the Former St. Marks Refinery in St. Marks, Florida

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lisell, L.; Mosey, G.

    2010-09-01

    This report presents the results of an assessment of the technical and economic feasibility of deploying a photovoltaics (PV) system on a brownfield site in St. Marks, Florida. The site was assessed for possible PV installations. The cost, performance, and site impacts of different PV options were estimated. The economics of the potential systems were analyzed using an electric rate of $0.08/kWh and incentives offered in the State of Florida and from the two accessible utilities, Progress Energy and the City of Tallahassee. According to the site production calculations, the most cost-effective system in terms of return on investment ismore » the fixed-tilt thin film technology. The report recommends financing options that could assist in the implementation of such a system.« less

  18. Determining Home Range and Preferred Habitat of Feral Horses on the Nevada National Security Site Using Geographic Information Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Burns, Ashley V.

    2014-05-30

    Feral horses (Equus caballus) are free-roaming descendants of domesticated horses and legally protected by the Wild and Free-Roaming Horses and Burros Act of 1971, which mandates how feral horses and burros should be managed and protected on federal lands. Using a geographic information system to determine the home range and suitable habitat of feral horses on the federally managed Nevada National Security Site can enable wildlife biologists in making best management practice recommendations. Home range was estimated at 88.1 square kilometers. Site suitability was calculated for elevation, forage, slope, water presence and horse observations. These variables were combined in successivemore » iterations into one polygon. Suitability rankings established that 85 square kilometers are most suitable habitat, with 2,052 square kilometers of good habitat 1,252 square kilometers of fair habitat and 122 square kilometers of least suitable habitat.« less

  19. PWR integral tie plate and locking mechanism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Flora, B.S.; Osborne, J.L.

    1980-08-26

    A locking mechanism for securing an upper tie plate to the tie rods of a nuclear fuel bundle is described. The mechanism includes an upper tie plate assembly and locking sleeves fixed to the ends of the tie rods. The tie plate is part of the upper tie plate assembly and is secured to the fuel bundle by securing the entire upper tie plate assembly to the locking sleeves fixed to the tie rods. The assembly includes, in addition to the tie plate, locking nuts for engaging the locking sleeves, retaining sleeves to operably connect the locking nuts to themore » assembly, a spring biased reaction plate to restrain the locking nuts in the locked position and a means to facilitate the removal of the entire assembly as a unit from the fuel bundle.« less

  20. Acupoint injection of onabotulinumtoxin A for migraines.

    PubMed

    Hou, Min; Xie, Jun-Fan; Kong, Xiang-Pan; Zhang, Yi; Shao, Yu-Feng; Wang, Can; Ren, Wen-Ting; Cui, Guang-Fu; Xin, Le; Hou, Yi-Ping

    2015-10-30

    Onabotulinumtoxin A (BoNTA) has been reported to be effective in the therapy for migraines. Acupuncture has been used worldwide for the treatment of migraine attacks. Injection of a small amount of drug at acupuncture points is an innovation as compared to traditional acupuncture. The purpose of this study was to evaluate and compare the effectiveness of fixed (muscle)-site and acupoint-site injections of BoNTA for migraine therapy in a randomized, double-blinded, placebo-controlled clinical trial extending over four months. Subjects with both episodic and chronic migraines respectively received a placebo (n = 19) or BoNTA (2.5 U each site, 25 U per subject) injection at fixed-sites (n = 41) including occipitofrontalis, corrugator supercilii, temporalis and trapeziue, or at acupoint-sites (n = 42) including Yintang (EX-HN3), Taiyang (EX-HN5), Baihui (GV20), Shuaigu (GB8), Fengchi (GB20) and Tianzhu (BL10). The variations between baseline and BoNTA post-injection for four months were calculated monthly as outcome measures. BoNTA injections at fixed-sites and acupoint-sites significantly reduced the migraine attack frequency, intensity, duration and associated symptoms for four months compared with placebo (p < 0.01). The efficacy of BoNTA for migraines in the acupoint-site group (93% improvement) was more significant than that in the fixed-site group (85% improvement) (p < 0.01). BoNTA administration for migraines is effective, and at acupoint-sites shows more efficacy than at fixed-sites. Further blinded studies are necessary to establish the efficacy of a low dose toxin (25 U) introduced with this methodology in chronic and episodic migraines.

  1. Acupoint Injection of Onabotulinumtoxin A for Migraines

    PubMed Central

    Hou, Min; Xie, Jun-Fan; Kong, Xiang-Pan; Zhang, Yi; Shao, Yu-Feng; Wang, Can; Ren, Wen-Ting; Cui, Guang-Fu; Xin, Le; Hou, Yi-Ping

    2015-01-01

    Onabotulinumtoxin A (BoNTA) has been reported to be effective in the therapy for migraines. Acupuncture has been used worldwide for the treatment of migraine attacks. Injection of a small amount of drug at acupuncture points is an innovation as compared to traditional acupuncture. The purpose of this study was to evaluate and compare the effectiveness of fixed (muscle)-site and acupoint-site injections of BoNTA for migraine therapy in a randomized, double-blinded, placebo-controlled clinical trial extending over four months. Subjects with both episodic and chronic migraines respectively received a placebo (n = 19) or BoNTA (2.5 U each site, 25 U per subject) injection at fixed-sites (n = 41) including occipitofrontalis, corrugator supercilii, temporalis and trapeziue, or at acupoint-sites (n = 42) including Yintang (EX-HN3), Taiyang (EX-HN5), Baihui (GV20), Shuaigu (GB8), Fengchi (GB20) and Tianzhu (BL10). The variations between baseline and BoNTA post-injection for four months were calculated monthly as outcome measures. BoNTA injections at fixed-sites and acupoint-sites significantly reduced the migraine attack frequency, intensity, duration and associated symptoms for four months compared with placebo (p < 0.01). The efficacy of BoNTA for migraines in the acupoint-site group (93% improvement) was more significant than that in the fixed-site group (85% improvement) (p < 0.01). BoNTA administration for migraines is effective, and at acupoint-sites shows more efficacy than at fixed-sites. Further blinded studies are necessary to establish the efficacy of a low dose toxin (25 U) introduced with this methodology in chronic and episodic migraines. PMID:26529014

  2. Feasibility Study of Economics and Performance of Solar Photovoltaics at the Refuse Hideaway Landfill in Middleton, Wisconsin

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Salasovich, J.; Mosey, G.

    2011-08-01

    This report presents the results of an assessment of the technical and economic feasibility of deploying a photovoltaics (PV) system on a brownfield site at the Refuse Hideaway Landfill in Middleton, Wisconsin. The site currently has a PV system in place and was assessed for further PV installations. The cost, performance, and site impacts of different PV options were estimated. The economics of the potential systems were analyzed using an electric rate of $0.1333/kWh and incentives offered by the State of Wisconsin and by the serving utility, Madison Gas and Electric. According to the site production calculations, the most cost-effectivemore » system in terms of return on investment is the thin-film fixed-tilt technology. The report recommends financing options that could assist in the implementation of such a system.« less

  3. KSC-08pd1111

    NASA Image and Video Library

    2008-05-03

    CAPE CANAVERAL, Fla. -- At NASA's Kennedy Space Center, access arms from the fixed service structure at Launch Pad 39A are in place against space shuttle Discovery, secured atop the mobile launch platform below, as final prelaunch processing for the STS-124 mission begins at the pad. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder

  4. 31 CFR Appendix B to Part 356 - Formulas and Tables

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... be sufficient to obtain the same final results. However, in the case of any discrepancies, our... Securities 1. Regular Half-Year Payment Period. We pay interest on marketable Treasury fixed-principal... pay interest on marketable Treasury inflation-protected securities on a semiannual basis. We issue...

  5. The Design of Data Disaster Recovery of National Fundamental Geographic Information System

    NASA Astrophysics Data System (ADS)

    Zhai, Y.; Chen, J.; Liu, L.; Liu, J.

    2014-04-01

    With the development of information technology, data security of information system is facing more and more challenges. The geographic information of surveying and mapping is fundamental and strategic resource, which is applied in all areas of national economic, defence and social development. It is especially vital to national and social interests when such classified geographic information is directly concerning Chinese sovereignty. Several urgent problems that needs to be resolved for surveying and mapping are how to do well in mass data storage and backup, establishing and improving the disaster backup system especially after sudden natural calamity accident, and ensuring all sectors rapidly restored on information system will operate correctly. For overcoming various disaster risks, protect the security of data and reduce the impact of the disaster, it's no doubt the effective way is to analysis and research on the features of storage and management and security requirements, as well as to ensure that the design of data disaster recovery system suitable for the surveying and mapping. This article analyses the features of fundamental geographic information data and the requirements of storage management, three site disaster recovery system of DBMS plan based on the popular network, storage and backup, data replication and remote switch of application technologies. In LAN that synchronous replication between database management servers and the local storage of backup management systems, simultaneously, remote asynchronous data replication between local storage backup management systems and remote database management servers. The core of the system is resolving local disaster in the remote site, ensuring data security and business continuity of local site. This article focuses on the following points: background, the necessity of disaster recovery system, the analysis of the data achievements and data disaster recovery plan. Features of this program is to use a hardware-based data hot backup, and remote online disaster recovery support for Oracle database system. The achievement of this paper is in summarizing and analysing the common characteristics of disaster of surveying and mapping business system requirements, while based on the actual situation of the industry, designed the basic GIS disaster recovery solutions, and we also give the conclusions about key technologies of RTO and RPO.

  6. Rotatable electric cable connecting system

    NASA Technical Reports Server (NTRS)

    Manges, D. R. (Inventor)

    1985-01-01

    A cable reel assembly is described which is particularly adapted for, but not limited to, a system for providing electrical connection of power and data signals between an orbiter vehicle, such as a space shuttle, and a recovered satellite. The assembly is comprised of two mutually opposing ring type structures having 180 deg relative rotation with one of the structures being held in fixed position while the other structure is rotatable. Motor controlled berthing latches and umbilical cable connectors for the satellite are located on the rim of the rotatable ring structure. The electrical cable assembly is fed in two sections from the orbiter vehicle into the outer rim portion of the fixed ring structure where they are directed inwardly and attached to two concentrically coiled metal bands whose respective ends are secured to inner and outer post members of circular sets of guide pins located on opposing circular plate members, one rotatable and one fixed. The cable sections are fed out as three output cable sections through openings in the central portion of the circular plate of the rotatable ring structure where they are directed to the latches and connectors located on its rim.

  7. Risk-based management of guardrails : site selection and upgrade.

    DOT National Transportation Integrated Search

    2001-01-01

    This effort addresses the need for a logic-driven process that the Virginia Department of Transportation can use to allocate resources to run-off-road and fixed-object hazards on diverse secondary road systems. In Virginia, there are approximately 60...

  8. Capital financing options for group practices.

    PubMed

    Galtney, B

    2000-05-01

    Group practices that are looking for capital partners need to demonstrate that they have the necessary management capability to operate a successful business capable of repaying the debt. Two basic types of debt financing are available to group practices: fixed-rate financing and variable-rate financing. Fixed-rate financing, the more common method, involves borrowing a specific amount of money and then paying off the debt in principal-and-interest payments, much like a fixed-rate mortgage. Variable-rate financing, on the other hand, involves obtaining a letter of credit from the lender itself or independent guarantor to secure a loan. The variable-rate method is more efficient and flexible, because the notes secured by the letter of credit can be rated independently and sold into public capital markets like short-term, variable-rate paper. Both types of financing can require the personal guarantee of all physicians in the group practice.

  9. Market turbulence creates financing opportunity.

    PubMed

    Cooper, James H

    2012-03-01

    The flight to high-quality assets resulting from Standard & Poor's downgrade of the U.S. government's credit rating has dropped the yield on U.S. Treasury securities as investors have sought refuge amid uncertain market conditions. Consequently, hospitals can now obtain mortgage insurance from the U.S. government to finance expansions and refinance their debt with GNMA securities at taxable interest rates that are often more favorable than tax-exempt bond fixed rates. Because GNMA certificates can be sold in a forward purchase transaction that locks in a fixed interest rate while avoiding payment of interest until construction funds are disbursed, they can help avoid the effects of negative arbitrage.

  10. 76 FR 65508 - Extension of the Public Comment Period for the Draft Site-Wide Environmental Impact Statement for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-21

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Comment... Department of Energy/National Nuclear Security Administration Nevada National Security Site and Off-Site Locations in the State of Nevada AGENCY: National Nuclear Security Administration, U.S. Department of Energy...

  11. The myth of secure computing.

    PubMed

    Austin, Robert D; Darby, Christopher A

    2003-06-01

    Few senior executives pay a whole lot of attention to computer security. They either hand off responsibility to their technical people or bring in consultants. But given the stakes involved, an arm's-length approach is extremely unwise. According to industry estimates, security breaches affect 90% of all businesses every year and cost some $17 billion. Fortunately, the authors say, senior executives don't need to learn about the more arcane aspects of their company's IT systems in order to take a hands-on approach. Instead, they should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that those assets will be compromised, and then tailor a set of risk abatement processes to their company's particular vulnerabilities. This approach, which views computer security as an operational rather than a technical challenge, is akin to a classic quality assurance program in that it attempts to avoid problems rather than fix them and involves all employees, not just IT staffers. The goal is not to make computer systems completely secure--that's impossible--but to reduce the business risk to an acceptable level. This article looks at the types of threats a company is apt to face. It also examines the processes a general manager should spearhead to lessen the likelihood of a successful attack. The authors recommend eight processes in all, ranging from deciding how much protection each digital asset deserves to insisting on secure software to rehearsing a response to a security breach. The important thing to realize, they emphasize, is that decisions about digital security are not much different from other cost-benefit decisions. The tools general managers bring to bear on other areas of the business are good models for what they need to do in this technical space.

  12. 75 FR 62899 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Order Approving Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-13

    ... criteria specified in the Financial Accounting Standards Board's Interpretation No. 39, Offsetting of... Clarity With Respect to the Close Out Netting of the Government Securities Division in the Event of the Fixed Income Clearing Corporation's Default or Insolvency October 5, 2010. I. Introduction On August 12...

  13. 78 FR 970 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-07

    ...-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing and Immediate Effectiveness of... Structure of the Government Securities Division December 31, 2012. Pursuant to Section 19(b)(1) of the... Organization's Statement of the Terms of Substance of the Proposed Rule Change FICC proposes to remove the fee...

  14. Stepping motor controller

    DOEpatents

    Bourret, S.C.; Swansen, J.E.

    1982-07-02

    A stepping motor is microprocessor controlled by digital circuitry which monitors the output of a shaft encoder adjustably secured to the stepping motor and generates a subsequent stepping pulse only after the preceding step has occurred and a fixed delay has expired. The fixed delay is variable on a real-time basis to provide for smooth and controlled deceleration.

  15. Regulation of the Carnitine Pathway in Escherichia coli: Investigation of the cai-fix Divergent Promoter Region

    PubMed Central

    Buchet, Anne; Eichler, Knut; Mandrand-Berthelot, Marie-Andrée

    1998-01-01

    The divergent structural operons caiTABCDE and fixABCX of Escherichia coli are required for anaerobic carnitine metabolism. Transcriptional monocopy lacZ fusion studies showed that both operons are coexpressed during anaerobic growth in the presence of carnitine, respond to common environmental stimuli (like glucose and nitrate), and are modulated positively by the same general regulators, CRP and FNR, and negatively by H-NS. Overproduction of the CaiF specific regulatory protein mediating the carnitine signal restored induction in an fnr mutant, corresponding to its role as the primary target for anaerobiosis. Transcript analysis identified two divergent transcription start points initiating 289 bp apart. DNase I footprinting revealed three sites with various affinities for the binding of the cAMP-CRP complex inside this regulatory region. Site-directed mutagenesis experiments indicated that previously reported perfect CRP motif 1, centered at −41.5 of the cai transcriptional start site, plays a direct role in the sole cai activation. In contrast, mutation in CRP site 2, positioned at −69.5 of the fix promoter, caused only a threefold reduction in fix expression. Thus, the role of the third CRP site, located at −126.5 of fix, might be to reinforce the action of site 2. A critical 50-bp cis-acting sequence overlapping the fix mRNA start site was found, by deletion analysis, to be necessary for cai transcription. This region is thought to be involved in transduction of the signal mediated by the CaiF regulator. PMID:9573142

  16. Worklife expectancies of fixed-term Finnish employees in 1997-2006.

    PubMed

    Nurminen, Markku

    2008-04-01

    Fixed-term employment is prevalent in the Finnish labor force. This form of employment contract is marked by fragmentary work periods, demands for flexibility in workhours, and concern for multiple insecurities. A nonpermanent employee may also incur adverse health consequences. Yet there exist no exact statistics on the duration of fixed-term employment. This paper estimated the future duration of the time that a Finn is expected to be engaged in irregular work. Multistate regression modeling and stochastic analysis were applied to aggregated data from surveys conducted among the labor force by Statistics Finland in 1997-2006. In 2006, a Finnish male was expected to work a total of 3.8 years in fixed-term employment, combined over consecutive or separate time spans; this time amounts to 8% of his remaining work career from entry into the work force until final retirement. For a woman the expectancy was greater, 6.5 years or 13%. For the age interval 20-29 years, the total was 16% for men and 23% for women. The type and duration of employment is influenced by security factors and economic cycles, both of which affect men and women differently. Over the past decade, fixed-term employment increased consistently in the female labor contingent, and it was more pronounced during economic slowdowns. This labor market development calls for standards for flexibility and guarantees for security in the fragmented future worklives of fixed-term employees.

  17. 76 FR 67519 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-01

    ... Expand the Applicability of the Fails Charge to Agency Debt Securities Transactions October 26, 2011... the fails charge to Agency debt securities transactions. II. Self-Regulatory Organization's Statement... Federal Reserve Bank of New York (the ``FRBNY''), has been addressing the persistent settlement fails in...

  18. 78 FR 42115 - NGAM Advisors, LP, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-15

    ... size, experience and potentially stronger relationships in the fixed income markets. Purchases of... to deposit securities into, and receive securities from, the series in connection with the purchase... anticipate that the price of a Share will range from $20 to $200. All orders to purchase Creation Units must...

  19. Using Multisite Experiments to Study Cross-Site Variation in Treatment Effects: A Hybrid Approach with Fixed Intercepts and A Random Treatment Coefficient

    ERIC Educational Resources Information Center

    Bloom, Howard S.; Raudenbush, Stephen W.; Weiss, Michael J.; Porter, Kristin

    2017-01-01

    The present article considers a fundamental question in evaluation research: "By how much do program effects vary across sites?" The article first presents a theoretical model of cross-site impact variation and a related estimation model with a random treatment coefficient and fixed site-specific intercepts. This approach eliminates…

  20. A Weakest Precondition Approach to Robustness

    NASA Astrophysics Data System (ADS)

    Balliu, Musard; Mastroeni, Isabella

    With the increasing complexity of information management computer systems, security becomes a real concern. E-government, web-based financial transactions or military and health care information systems are only a few examples where large amount of information can reside on different hosts distributed worldwide. It is clear that any disclosure or corruption of confidential information in these contexts can result fatal. Information flow controls constitute an appealing and promising technology to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in the area of language-based security. Robustness asserts that an active attacker, who can modify program code in some fixed points (holes), is unable to disclose more private information than a passive attacker, who merely observes unclassified data. In this paper, we extend a method recently proposed for checking declassified non-interference in presence of passive attackers only, in order to check robustness by means of weakest precondition semantics. In particular, this semantics simulates the kind of analysis that can be performed by an attacker, i.e., from public output towards private input. The choice of semantics allows us to distinguish between different attacks models and to characterize the security of applications in different scenarios.

  1. Security and Vulnerability Assessment of Social Media Sites: An Exploratory Study

    ERIC Educational Resources Information Center

    Zhao, Jensen; Zhao, Sherry Y.

    2015-01-01

    While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…

  2. Qualification of a select one-stage activated partial thromboplastin time-based clotting assay and two chromogenic assays for the post-administration monitoring of nonacog beta pegol.

    PubMed

    Tiefenbacher, S; Bohra, R; Amiral, J; Bowyer, A; Kitchen, S; Lochu, A; Rosén, S; Ezban, M

    2017-10-01

    Essentials Nonacog beta pegol (N9-GP) is an extended half-life, recombinant human factor IX (FIX). One-stage clotting (OSC) and chromogenic FIX activity assays were assessed for N9-GP recovery. OSC STA ® -Cephascreen ® , ROX FIX and BIOPHEN FIX chromogenic assays were qualified for N9-GP. Other extended half-life factor products should be assessed in a similar way prior to approval. Background Nonacog beta pegol (N9-GP) is an extended half-life, glycoPEGylated recombinant human factor IX that is under development for the prophylaxis and treatment of bleeding episodes in hemophilia B patients. Considerable reagent-dependent variability has been observed when one-stage clotting assays are used to measure the recovery of recombinant FIX products, including N9-GP. Objective To qualify select one-stage clotting and chromogenic FIX activity assays for measuring N9-GP recovery. Methods The accuracy and precision of the one-stage clotting assay (with the STA-Cephascreen activated partial thromboplastin [APTT] reagent) and the ROX Factor IX and BIOPHEN Factor IX chromogenic assays for measuring N9-GP recovery were assessed in N9-GP-spiked hemophilia B plasma samples in a systematic manner at three independent sites, with manufacturer-recommended protocols and/or site-specific assay setups, including different instruments. Results For each of the three FIX activity assays qualified on five different reagent-instrument systems, acceptable intra-assay and interassay accuracy and precision, dilution integrity, reagent robustness and freeze-thaw and short-term sample stabilities were demonstrated. The STA-Cephascreen assay showed a limited reportable range at one of the three qualification sites, and the BIOPHEN Factor IX assay showed suspect low-end sensitivity at one of the three qualification sites. An individual laboratory would account for these limitations by adjusting the assay's reportable range; thus, these findings are not considered to impact the respective assay qualifications. Conclusion The one-stage clotting assay with the STA-Cephascreen APTT reagent, the ROX Factor IX chromogenic assay and the BIOPHEN Factor IX chromogenic assay are considered to be qualified for the measurement of N9-GP in 3.2% (0.109 m) citrated human plasma. © 2017 International Society on Thrombosis and Haemostasis.

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robertson, F. Russell; Carroll, J. Ritchie; Sanders, William

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Designmore » Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.« less

  4. The ethics of socio-ecohydrological catchment management: towards hydrosolidarity

    NASA Astrophysics Data System (ADS)

    Falkenmark, M.; Folke, Carl

    This paper attempts to clarify key biophysical issues and the problems involved in the ethics of socio-ecohydrological catchment management. The issue in managing complex systems is to live with unavoidable change while securing the capacity of the ecohydrological system of the catchment to sustain vital ecological goods and services, aquatic as well as terrestrial, on which humanity depends ultimately. Catchment management oriented to sustainability has to be based on ethical principles: human rights, international conventions, sustaining crucial ecological goods and services, and protecting ecosystem resilience, all of which have water linkages. Many weaknesses have to be identified, assessed and mitigated to improve the tools by which the ethical issues can be addressed and solved:

    • a heritage of constraining tunnel vision in both science and management;
    • inadequate shortcuts made in modern scientific system analyses (e.g. science addressing sustainability issues);
    • simplistic technical-fix approaches to water and ecosystems in land/water/ecosystem management;
    • conventional tools for evaluation of scientific quality with its focus on "doing the thing right" rather than "doing the right thing".

    The new ethics have to incorporate principles that, on a catchment basis, allow for proper attention to the hungry and poor, upstream and downstream, to descendants, and to sites and habitats that need to be protected.

  5. Implementing Patient Access to Electronic Health Records Under HIPAA: Lessons Learned

    PubMed Central

    Wang, Tiffany; Pizziferri, Lisa; Volk, Lynn A; Mikels, Debra A; Grant, Karen G; Wald, Jonathan S; Bates, David W

    2004-01-01

    In 2001, the Institute of Medicine (IOM) and the Health Insurance Portability and Accountability Act (HIPAA) emphasized the need for patients to have greater control over their health information. We describe a Boston healthcare system's approach to providing patients access to their electronic health records (EHRs) via Patient Gateway, a secure, Web-based portal. Implemented in 19 clinic sites to date, Patient Gateway allows patients to access information from their medical charts via the Internet in a secure manner. Since 2002, over 19,000 patients have enrolled in Patient Gateway, more than 125,000 patients have logged into the system, and over 37,000 messages have been sent by patients to their practices. There have been no major security concerns. By providing access to EHR data, secure systems like Patient Gateway allow patients a greater role in their healthcare process, as envisioned by the IOM and HIPAA. PMID:18066391

  6. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  7. Fixed site neutralization model programmer's manual. Volume II

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Engi, D.; Chapman, L.D.; Judnick, W.

    This report relates to protection of nuclear materials at nuclear facilities. This volume presents the source listings for the Fixed Site Neutralization Model and its supporting modules, the Plex Preprocessor and the Data Preprocessor. (DLC)

  8. Measurement of spatial and temporal variation in volatile hazardous air pollutants in Tacoma, Washington, using a mobile membrane introduction mass spectrometry (MIMS) system.

    PubMed

    Davey, Nicholas G; Fitzpatrick, Cole T E; Etzkorn, Jacob M; Martinsen, Morten; Crampton, Robert S; Onstad, Gretchen D; Larson, Timothy V; Yost, Michael G; Krogh, Erik T; Gilroy, Michael; Himes, Kathy H; Saganić, Erik T; Simpson, Christopher D; Gill, Christopher G

    2014-09-19

    The objective of this study was to use membrane introduction mass spectrometry (MIMS), implemented on a mobile platform, in order to provide real-time, fine-scale, temporally and spatially resolved measurements of several hazardous air pollutants. This work is important because there is now substantial evidence that fine-scale spatial and temporal variations of air pollutant concentrations are important determinants of exposure to air pollution and adverse health outcomes. The study took place in Tacoma, WA during periods of impaired air quality in the winter and summer of 2008 and 2009. Levels of fine particles were higher in winter compared to summer, and were spatially uniform across the study area. Concentrations of vapor phase pollutants measured by membrane introduction mass spectrometry (MIMS), notably benzene and toluene, had relatively uniform spatial distributions at night, but exhibited substantial spatial variation during the day-daytime levels were up to 3-fold higher at traffic-impacted locations compared to a reference site. Although no direct side-by-side comparison was made between the MIMS system and traditional fixed site monitors, the MIMS system typically reported higher concentrations of specific VOCs, particularly benzene, ethylbenzene and naphthalene, compared to annual average concentrations obtained from SUMA canisters and gas chromatographic analysis at the fixed sites.

  9. Demonstration of variable speed permanent magnet generator at small, low-head hydro site

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brown Kinloch, David

    Small hydro developers face a limited set of bad choices when choosing a generator for a small low-head hydro site. Direct drive synchronous generators are expensive and technically complex to install. Simpler induction generators are higher speed, requiring a speed increaser, which results in inefficiencies and maintenance problems. In addition, both induction and synchronous generators turn at a fixed speed, causing the turbine to run off its peak efficiency curve whenever the available head is different than the designed optimum head.The solution to these problems is the variable speed Permanent Magnet Generators (PMG). At the Weisenberger Mill in Midway, KY,more » a variable speed Permanent Magnet Generator has been installed and demonstrated. This new PMG system replaced an existing induction generator that had a HTD belt drive speed increaser system. Data was taken from the old generator before it was removed and compared to data collected after the PMG system was installed. The new variable speed PMG system is calculated to produce over 96% more energy than the old induction generator system during an average year. This significant increase was primarily due to the PMG generator operating at the correct speed at the maximum head, and the ability for the PMG generator to reduce its speed to lower optimum speeds as the stream flow increased and the net head decreased.This demonstration showed the importance of being able to adjust the speed of fixed blade turbines. All fixed blade turbines with varying net heads could achieve higher efficiencies if the speed can be matched to the optimum speed as the head changes. In addition, this demonstration showed that there are many potential efficiencies that could be realized with variable speed technology at hydro sites where mismatched turbine and generator speeds result in lower power output, even at maximum head. Funding for this project came from the US Dept. of Energy, through Award Number DE-EE0005429.« less

  10. Development and operations of the astrophysics data system

    NASA Technical Reports Server (NTRS)

    Murray, Stephen S.; Oliversen, Ronald (Technical Monitor)

    2005-01-01

    Abstract service - Continued regular updates of abstracts in the databases, both at SA0 and at all mirror sites. - Modified loading scripts to accommodate changes in data format (PhyS) - Discussed data deliveries with providers to clear up problems with format or other errors (EGU) - Continued inclusion of large numbers of historical literature volumes and physics conference volumes xeroxed from the library. - Performed systematic fixes on some data sets in the database to account for changes in article numbering (AGU journals) - Implemented linking of ADS bibliographic records with multimedia files - Debugged and fixed obscure connection problems with the ADS Korean mirror site which were preventing successful updates of the data holdings. - Wrote procedure to parse citation data and characterize an ADS record based on its citation ratios within each database.

  11. Federal Logistics Information System (FLIS) Procedures Manual. Volume 8. Document Identifier Code Input/Output Formats (Fixed Length)

    DTIC Science & Technology

    1994-07-01

    REQUIRED MIX OF SEGMENTS OR INDIVIDUAL DATA ELEMENTS TO BE EXTRACTED. IN SEGMENT R ON AN INTERROGATION TRANSACTION (LTI), DATA RECORD NUMBER (DRN 0950) ONLY...and zation and Marketing input DICs. insert the Continuation Indicator Code (DRN 8555) in position 80 of this record. Maximum of OF The assigned NSN...for Procurement KFR, File Data Minus Security Classified Characteristics Data KFC 8.5-2 DoD 4100.39-M Volume 8 CHAPTER 5 ALPHABETIC INDEX OF DIC

  12. KSC-2009-4759

    NASA Image and Video Library

    2009-08-17

    VANDENBERG AIR FORCE BASE, Calif. -- At Vandenberg Air Force Base's Astrotech processing facility in California, workers secure NASA's Wide-field Infrared Survey Explorer, or WISE, spacecraft onto a work stand. At right is seen the fixed panel solar array. The satellite will survey the entire sky at infrared wavelengths, creating a cosmic clearinghouse of hundreds of millions of objects, which will be catalogued, providing a vast storehouse of knowledge about the solar system, the Milky Way, and the universe. Launch is scheduled no earlier than Dec. 10. Photo credit: NASA/Moore, VAFB

  13. 9 CFR 121.14 - Incident response. 11

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... (including information systems); severe weather and other natural disasters; workplace violence; bomb threats... protective and emergency equipment, and their locations; (10) Site security and control; (11) Procedures for...

  14. Evaluation of Acquisition Strategies for Image-Based Construction Site Monitoring

    NASA Astrophysics Data System (ADS)

    Tuttas, S.; Braun, A.; Borrmann, A.; Stilla, U.

    2016-06-01

    Construction site monitoring is an essential task for keeping track of the ongoing construction work and providing up-to-date information for a Building Information Model (BIM). The BIM contains the as-planned states (geometry, schedule, costs, ...) of a construction project. For updating, the as-built state has to be acquired repeatedly and compared to the as-planned state. In the approach presented here, a 3D representation of the as-built state is calculated from photogrammetric images using multi-view stereo reconstruction. On construction sites one has to cope with several difficulties like security aspects, limited accessibility, occlusions or construction activity. Different acquisition strategies and techniques, namely (i) terrestrial acquisition with a hand-held camera, (ii) aerial acquisition using a Unmanned Aerial Vehicle (UAV) and (iii) acquisition using a fixed stereo camera pair at the boom of the crane, are tested on three test sites. They are assessed considering the special needs for the monitoring tasks and limitations on construction sites. The three scenarios are evaluated based on the ability of automation, the required effort for acquisition, the necessary equipment and its maintaining, disturbance of the construction works, and on the accuracy and completeness of the resulting point clouds. Based on the experiences during the test cases the following conclusions can be drawn: Terrestrial acquisition has the lowest requirements on the device setup but lacks on automation and coverage. The crane camera shows the lowest flexibility but the highest grade of automation. The UAV approach can provide the best coverage by combining nadir and oblique views, but can be limited by obstacles and security aspects. The accuracy of the point clouds is evaluated based on plane fitting of selected building parts. The RMS errors of the fitted parts range from 1 to a few cm for the UAV and the hand-held scenario. First results show that the crane camera approach has the potential to reach the same accuracy level.

  15. 31 CFR 363.36 - What securities can I purchase and hold in my TreasuryDirect ® account?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... are available for purchase through the TreasuryDirect Web site. In addition, you can hold converted... Treasury Direct system or the commercial book-entry system. [70 FR 57443, Sept. 30, 2005] ...

  16. 17 CFR 229.503 - (Item 503) Prospectus summary, risk factors, and ratio of earnings to fixed charges.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., risk factors, and ratio of earnings to fixed charges. 229.503 Section 229.503 Commodity and Securities... Registration Statement and Prospectus Provisions § 229.503 (Item 503) Prospectus summary, risk factors, and... executive offices. (c) Risk factors. Where appropriate, provide under the caption “Risk Factors” a...

  17. 17 CFR 229.503 - (Item 503) Prospectus summary, risk factors, and ratio of earnings to fixed charges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., risk factors, and ratio of earnings to fixed charges. 229.503 Section 229.503 Commodity and Securities... Registration Statement and Prospectus Provisions § 229.503 (Item 503) Prospectus summary, risk factors, and... executive offices. (c) Risk factors. Where appropriate, provide under the caption “Risk Factors” a...

  18. Wireless local area network security.

    PubMed

    Bergeron, Bryan P

    2004-01-01

    Wireless local area networks (WLANs) are increasingly popular in clinical settings because they facilitate the use of wireless PDAs, laptops, and other pervasive computing devices at the point of care. However, because of the relative immaturity of wireless network technology and evolving standards, WLANs, if improperly configured, can present significant security risks. Understanding the security limitations of the technology and available fixes can help minimize the risks of clinical data loss and maintain compliance with HIPAA guidelines.

  19. Fermilab Security Site Access Request Database

    Science.gov Websites

    Fermilab Security Site Access Request Database Use of the online version of the Fermilab Security Site Access Request Database requires that you login into the ESH&Q Web Site. Note: Only Fermilab generated from the ESH&Q Section's Oracle database on May 27, 2018 05:48 AM. If you have a question

  20. IPv6 Security

    NASA Astrophysics Data System (ADS)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  1. 17 CFR 240.15c2-12 - Municipal securities disclosure.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Municipal securities...

  2. 17 CFR 240.15c2-12 - Municipal securities disclosure.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Municipal securities...

  3. 17 CFR 240.15c2-12 - Municipal securities disclosure.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Municipal securities...

  4. 17 CFR 240.15c2-12 - Municipal securities disclosure.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Municipal securities...

  5. 76 FR 13667 - Chrysler Group LLC; Formerly Known as Chrysler LLC; Kenosha Engine Plant; Including On-Site...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-14

    ...; Formerly Known as Chrysler LLC; Kenosha Engine Plant; Including On-Site Leased Workers From Caravan Knight..., K+S Services, Inc., G4S Secure Solutions, Crassociates, Inc., CES, INC., Evans Distribution Systems... of Chrysler Group, LLC, formerly known as Chrysler, LLC, Kenosha Engine Plant, Kenosha, Wisconsin...

  6. Cloud-Based Data Storage

    ERIC Educational Resources Information Center

    Waters, John K.

    2011-01-01

    The vulnerability and inefficiency of backing up data on-site is prompting school districts to switch to more secure, less troublesome cloud-based options. District auditors are pushing for a better way to back up their data than the on-site, tape-based system that had been used for years. About three years ago, Hendrick School District in…

  7. 75 FR 71475 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-23

    ... the Exchange's Web site http://www.ise.com , at the principal office of the Exchange, and at the...'') and various forms of alternative trading systems (``ATSs''), including dark pools and electronic..., please use only one method. The Commission will post all comments on the Commissions Internet Web site...

  8. 78 FR 25115 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-29

    ... Amending the Mortgage-Backed Securities Division Fails Charge Rule To Reflect Recommendation of the... change is to amend the existing fails charge rule in FICC's Mortgage-Backed Securities Division (``MBSD... (``TMPG'') relating to the removal of the resolution period for fails charges.\\3\\ \\3\\ The text of the...

  9. Rx for low cash yields.

    PubMed

    Tobe, Chris

    2003-10-01

    Certain strategies can offer not-for-profit hospitals potentially greater investment yields while maintaining stability and principal safety. Treasury inflation-indexed securities can offer good returns, low volatility, and inflation protection. "Enhanced cash" strategies offer liquidity and help to preserve capital. Stable value "wrappers" allow hospitals to pursue higher-yielding fixed-income securities without an increase in volatility.

  10. 75 FR 54675 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-08

    ... waive FICC's rules, procedures, and regulations of the Mortgage-Backed Securities Division. II. Self... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62796; File No. SR-FICC-2010-06] Self... Proposed Rule Change To Amend Rules Relating to Authority To Waive Rules, Procedures, and Regulations of...

  11. 77 FR 34117 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-08

    ... other high credit quality, short-term fixed-income or similar securities (including shares of money market funds, bank deposits, bank money market accounts, certain variable rate-demand notes, and...- income or similar securities (including shares of money market funds, bank deposits, bank money market...

  12. 78 FR 60002 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Order Approving Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-30

    ...-balance order, destined to- be announced (``TBA'') transactions; (ii) trade-for-trade TBA transactions... safeguarding of securities and funds which are in the custody or control of the clearing agency, or for which... helps protect the securities and funds in FICC's control, not only by encouraging members' timely...

  13. On Delay and Security in Network Coding

    ERIC Educational Resources Information Center

    Dikaliotis, Theodoros K.

    2013-01-01

    In this thesis, delay and security issues in network coding are considered. First, we study the delay incurred in the transmission of a fixed number of packets through acyclic networks comprised of erasure links. The two transmission schemes studied are routing with hop-by-hop retransmissions, where every node in the network simply stores and…

  14. PDA-phone-based instant transmission of radiological images over a CDMA network by combining the PACS screen with a Bluetooth-interfaced local wireless link.

    PubMed

    Kim, Dong Keun; Yoo, Sun K; Park, Jeong Jin; Kim, Sun Ho

    2007-06-01

    Remote teleconsultation by specialists is important for timely, correct, and specialized emergency surgical and medical decision making. In this paper, we designed a new personal digital assistant (PDA)-phone-based emergency teleradiology system by combining cellular communication with Bluetooth-interfaced local wireless links. The mobility and portability resulting from the use of PDAs and wireless communication can provide a more effective means of emergency teleconsultation without requiring the user to be limited to a fixed location. Moreover, it enables synchronized radiological image sharing between the attending physician in the emergency room and the remote specialist on picture archiving and communication system terminals without distorted image acquisition. To enable rapid and fine-quality radiological image transmission over a cellular network in a secure manner, progressive compression and security mechanisms have been incorporated. The proposed system is tested over a code division Multiple Access 1x-Evolution Data-Only network to evaluate the performance and to demonstrate the feasibility of this system in a real-world setting.

  15. 24 CFR 902.60 - Data collection.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... financial information through the FASS-PH Secure Systems Web site. HUD shall forward its determination.... Late points and late presumptive failure will only be applied to the financial condition indicator...

  16. 24 CFR 902.60 - Data collection.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... financial information through the FASS-PH Secure Systems Web site. HUD shall forward its determination.... Late points and late presumptive failure will only be applied to the financial condition indicator...

  17. 24 CFR 902.60 - Data collection.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... financial information through the FASS-PH Secure Systems Web site. HUD shall forward its determination.... Late points and late presumptive failure will only be applied to the financial condition indicator...

  18. Atmospheric Radiation Measurement program climate research facility operations quarterly report October 1 - December 31, 2006.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sisterson, D. L.

    2007-03-14

    Individual raw data streams from instrumentation at the Atmospheric Radiation Measurement (ARM) Program Climate Research Facility (ACRF) fixed and mobile sites are collected and sent to the Data Management Facility (DMF) at Pacific Northwest National Laboratory (PNNL) for processing in near real time. Raw and processed data are then sent daily to the ACRF Archive, where they are made available to users. For each instrument, we calculate the ratio of the actual number of data records received daily at the Archive to the expected number of data records. The results are tabulated by (1) individual data stream, site, and monthmore » for the current year and (2) site and fiscal year dating back to 1998. Table 1 shows the accumulated maximum operation time (planned uptime), the actual hours of operation, and the variance (unplanned downtime) for the period October 1 through December 31, 2006, for the fixed and mobile sites. Although the AMF is currently up and running in Niamey, Niger, Africa, the AMF statistics are reported separately and not included in the aggregate average with the fixed sites. The first quarter comprises a total of 2,208 hours. For all fixed sites, the actual data availability (and therefore actual hours of operation) exceeded the individual (and well as aggregate average of the fixed sites) operational goal for the first quarter of fiscal year (FY) 2007. The Site Access Request System is a web-based database used to track visitors to the fixed sites, all of which have facilities that can be visited. The NSA locale has the Barrow and Atqasuk sites. The SGP site has a Central Facility, 23 extended facilities, 4 boundary facilities, and 3 intermediate facilities. The TWP locale has the Manus, Nauru, and Darwin sites. NIM represents the AMF statistics for the current deployment in Niamey, Niger, Africa. PYE represents the AMF statistics for the Point Reyes, California, past deployment in 2005. In addition, users who do not want to wait for data to be provided through the ACRF Archive can request an account on the local site data system. The eight research computers are located at the Barrow and Atqasuk sites; the SGP Central Facility; the TWP Manus, Nauru, and Darwin sites; the DMF at PNNL; and the AMF in Niger. This report provides the cumulative numbers of visitors and user accounts by site for the period January 1, 2006 - December 31, 2006. The U.S. Department of Energy requires national user facilities to report facility use by total visitor days-broken down by institution type, gender, race, citizenship, visitor role, visit purpose, and facility-for actual visitors and for active user research computer accounts. During this reporting period, the ACRF Archive did not collect data on user characteristics in this way. Work is under way to collect and report these data. Table 2 shows the summary of cumulative users for the period January 1, 2006 - December 31, 2006. For the first quarter of FY 2007, the overall number of users is up from the last reporting period. The historical data show that there is an apparent relationship between the total number of users and the 'size' of field campaigns, called Intensive Operation Periods (IOPs): larger IOPs draw more of the site facility resources, which are reflected by the number of site visits and site visit days, research accounts, and device accounts. These types of users typically collect and analyze data in near-real time for a site-specific IOP that is in progress. However, the Archive accounts represent persistent (year-to-year) ACRF data users that often mine from the entire collection of ACRF data, which mostly includes routine data from the fixed and mobile sites, as well as cumulative IOP data sets. Archive data users continue to show a steady growth, which is independent of the size of IOPs. For this quarter, the number of Archive data user accounts was 961, the highest since record-keeping began. For reporting purposes, the three ACRF sites and the AMF operate 24 hours per day, 7 days per week, and 52 weeks per year. Although the AMF is not officially collecting data this quarter, personnel are regularly involved with teardown, packing, hipping, unpacking, setup, and maintenance activities, so they are included in the safety statistics. Time is reported in days instead of hours. If any lost work time is incurred by any employee, it is counted as a workday loss. Table 3 reports the consecutive days since the last recordable or reportable injury or incident causing damage to property, equipment, or vehicle for the period October 1 - December 31, 2006. There were no recordable or lost workdays or incidents for the first quarter of FY 2007.« less

  19. 32 CFR 701.100 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... accessible DON Web sites and unclassified non-national security information systems. (a) Scope. Governs the... systems of records. (b) Guidance. Provides guidance on how to respond to individuals who seek access to information in a PA system of records that is retrieved by their name and/or personal identifier. (c) Verify...

  20. KSC-08pd1107

    NASA Image and Video Library

    2008-05-03

    CAPE CANAVERAL, Fla. -- At NASA's Kennedy Space Center, access arms from the fixed service structure at Launch Pad 39A are extended toward space shuttle Discovery, secured atop the mobile launch platform below, as final prelaunch processing for the STS-124 mission gets under way at the pad. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder

  1. A provisional fixed partial denture that simulates gingival tissue at the pontic-site defect.

    PubMed

    Haj-Ali, Reem; Walker, Mary P

    2002-03-01

    A technique is presented for the fabrication of an esthetic, provisional fixed partial denture that compensates for a pontic-site ridge defect. This provisional restoration enables both the dentist and the patient to evaluate whether this prosthetic approach will adequately camouflage the pontic-site defect or whether surgical correction of the pontic site should also be considered. Copyright 2002 by The American College of Prosthodontists.

  2. A secure biometrics-based authentication scheme for telecare medicine information systems.

    PubMed

    Yan, Xiaopeng; Li, Weiheng; Li, Ping; Wang, Jiantao; Hao, Xinhong; Gong, Peng

    2013-10-01

    The telecare medicine information system (TMIS) allows patients and doctors to access medical services or medical information at remote sites. Therefore, it could bring us very big convenient. To safeguard patients' privacy, authentication schemes for the TMIS attracted wide attention. Recently, Tan proposed an efficient biometrics-based authentication scheme for the TMIS and claimed their scheme could withstand various attacks. However, in this paper, we point out that Tan's scheme is vulnerable to the Denial-of-Service attack. To enhance security, we also propose an improved scheme based on Tan's work. Security and performance analysis shows our scheme not only could overcome weakness in Tan's scheme but also has better performance.

  3. MyHealtheVet (VA's personal health record)

    MedlinePlus

    ... Overview Site Map Help & User Guides FAQ Privacy & Security Terms and Conditions Policies Privacy Policy Web Policies FOIA Accessibility System Use Important Links VA Home White House USA.gov Inspector ...

  4. [Risk management in the operating room in cardiovascular and thoracic surgery; from the nursing point of view].

    PubMed

    Nakano, Yaemi

    2008-08-01

    The primary risk management, on the side of a nurse, in the operating room includes prevention of misidentificatin of both the patient and the site of operation. Leaving of a foreign body in the patient, falling of the patient from the operating table, incidence of deep venous thrombosis and mismatch of blood transfusion should also be prevented with utmost care. The long operating time in cardiovascular surgery and the lateral position of the patient on the operating table in chest or esophageal surgery require additional risk management. Risks of pressure sore as well as nervous injury can be prevented by fixing the patient securely with soft pads to maintain comfortable posture. Above all, careful watching of the patient's condition is most important.

  5. System Transversal Equalizer.

    DTIC Science & Technology

    The report describes the implementation, theory of operation, and performance of an adjustable, 48 tap, surface wave transversal equalizer designed...for the Rome Air Development Center, Floyd Site Radar. The transversal equalizer achieves equalization of system distortion by an array of fixed taps...which provide leading and lagging echoes of the main signal. Equalization is achieved by the introduction of an equal but oppositely phased echo of

  6. Method and apparatus for animal positioning in imaging systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hadjioannou, Arion-Xenofon; Stout, David B.; Silverman, Robert W.

    An apparatus for imaging an animal includes a first mounting surface, a bed sized to support the animal and releasably secured to or integral with the first mounting surface. The apparatus also includes a plurality of straps, each having a first end in a fixed position relative to the bed and a second end for tightening around a limb of the animal. A method for in-vivo imaging of an animal includes providing an animal that has limbs, providing a first mounting surface, and providing a bed removably secured to or integral with the mounting surface and sized to support themore » animal as well as being coupled to a plurality of straps. The method also includes placing the animal on the bed between the plurality of straps and tightening at least two of the plurality of straps around at least two of the limbs such that the animal is substantially secured in place relative to the bed.« less

  7. 30 CFR 250.1634 - Site security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 2 2011-07-01 2011-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, REGULATION, AND ENFORCEMENT, DEPARTMENT OF THE... § 250.1634 Site security. (a) All locations where sulphur is produced, measured, or stored shall be...

  8. Setup and Operation of the TeleEngineering Communications Equipment - Fixed Site (TCE-F), Version II

    DTIC Science & Technology

    2004-10-01

    Overview ......................................................................... 3 A D T R A N IM U X ...the interconnections of the components. ADTRAN The ADTRAN provided with the continental United States systems is typi- cally a 2 x 64 version and...34FDX." After the FDX message appears and the system remains in the FDX mode, the Online button will flash , indicating the system is ready for a

  9. Safety and Security Interface Technology Initiative

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme)more » includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ‘tool box’ of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems’ essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.« less

  10. Extensively Parameterized Mutation-Selection Models Reliably Capture Site-Specific Selective Constraint.

    PubMed

    Spielman, Stephanie J; Wilke, Claus O

    2016-11-01

    The mutation-selection model of coding sequence evolution has received renewed attention for its use in estimating site-specific amino acid propensities and selection coefficient distributions. Two computationally tractable mutation-selection inference frameworks have been introduced: One framework employs a fixed-effects, highly parameterized maximum likelihood approach, whereas the other employs a random-effects Bayesian Dirichlet Process approach. While both implementations follow the same model, they appear to make distinct predictions about the distribution of selection coefficients. The fixed-effects framework estimates a large proportion of highly deleterious substitutions, whereas the random-effects framework estimates that all substitutions are either nearly neutral or weakly deleterious. It remains unknown, however, how accurately each method infers evolutionary constraints at individual sites. Indeed, selection coefficient distributions pool all site-specific inferences, thereby obscuring a precise assessment of site-specific estimates. Therefore, in this study, we use a simulation-based strategy to determine how accurately each approach recapitulates the selective constraint at individual sites. We find that the fixed-effects approach, despite its extensive parameterization, consistently and accurately estimates site-specific evolutionary constraint. By contrast, the random-effects Bayesian approach systematically underestimates the strength of natural selection, particularly for slowly evolving sites. We also find that, despite the strong differences between their inferred selection coefficient distributions, the fixed- and random-effects approaches yield surprisingly similar inferences of site-specific selective constraint. We conclude that the fixed-effects mutation-selection framework provides the more reliable software platform for model application and future development. © The Author 2016. Published by Oxford University Press on behalf of the Society for Molecular Biology and Evolution. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  11. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system

    NASA Astrophysics Data System (ADS)

    Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay

    2015-12-01

    In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where a private key is shared between a user and a verifier. In the THRIVE system, only encrypted binary biometric templates are stored in a database and verification is performed via homomorphically randomized templates, thus, original templates are never revealed during authentication. Due to the underlying threshold homomorphic encryption scheme, a malicious database owner cannot perform full decryption on encrypted templates of the users in the database. In addition, security of the THRIVE system is enhanced using a two-factor authentication scheme involving user's private key and biometric data. Using simulation-based techniques, the proposed system is proven secure in the malicious model. The proposed system is suitable for applications where the user does not want to reveal her biometrics to the verifier in plain form, but needs to prove her identity by using biometrics. The system can be used with any biometric modality where a feature extraction method yields a fixed size binary template and a query template is verified when its Hamming distance to the database template is less than a threshold. The overall connection time for the proposed THRIVE system is estimated to be 336 ms on average for 256-bit biometric templates on a desktop PC running with quad core 3.2 GHz CPUs at 10 Mbit/s up/down link connection speed. Consequently, the proposed system can be efficiently used in real-life applications.

  12. DEVELOPMENT OF AN RH -DENUDED MIE ACTIVE SAMPLING SYSTEM AND TARGETED AEROSOL CALIBRATION

    EPA Science Inventory

    The MIE pDR 1200 nephelometer provides time resolved aerosol concentrations during personal and fixed-site sampling. Active (pumped) operation allows defining an upper PM2.5 particle size, however, this dramatically increases the aerosol mass passing through the phot...

  13. 10 CFR 73.46 - Fixed site physical protection systems, subsystems, components, and procedures.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ..., components, and procedures. 73.46 Section 73.46 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL... Energy couriers engaged in the transport of special nuclear material. The search function for detection... of Energy vehicles engaged in transporting special nuclear material and emergency vehicles under...

  14. 10 CFR 73.46 - Fixed site physical protection systems, subsystems, components, and procedures.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., components, and procedures. 73.46 Section 73.46 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL... Energy couriers engaged in the transport of special nuclear material. The search function for detection... of Energy vehicles engaged in transporting special nuclear material and emergency vehicles under...

  15. Smart sensing surveillance video system

    NASA Astrophysics Data System (ADS)

    Hsu, Charles; Szu, Harold

    2016-05-01

    An intelligent video surveillance system is able to detect and identify abnormal and alarming situations by analyzing object movement. The Smart Sensing Surveillance Video (S3V) System is proposed to minimize video processing and transmission, thus allowing a fixed number of cameras to be connected on the system, and making it suitable for its applications in remote battlefield, tactical, and civilian applications including border surveillance, special force operations, airfield protection, perimeter and building protection, and etc. The S3V System would be more effective if equipped with visual understanding capabilities to detect, analyze, and recognize objects, track motions, and predict intentions. In addition, alarm detection is performed on the basis of parameters of the moving objects and their trajectories, and is performed using semantic reasoning and ontologies. The S3V System capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded environments. It would be directly applicable to solutions for emergency response personnel, law enforcement, and other homeland security missions, as well as in applications requiring the interoperation of sensor networks with handheld or body-worn interface devices.

  16. OCGen Module Mooring Project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McEntee, Jarlath

    Ocean Renewable Power Company's OCGen Module Mooring Project provided an extensive research, design, development, testing and data collection effort and analysis conducted with respect to a positively buoyant, submerged MHK device secured to the seabed using a tensioned mooring system. Different analytic tools were evaluated for their utility in the design of submerged systems and their moorings. Deployment and testing of a prototype OCGen® system provided significant data related to mooring line loads and system attitude and station keeping. Mooring line loads were measured in situ and reported against flow speeds. The Project made a significant step in the developmentmore » of designs, methodologies and practices related to floating and mooring of marine hydrokinetic (MHK) devices. Importantly for Ocean Renewable Power Company, the Project provided a sound basis for advancing a technically and commercially viable OCGen® Power System. The OCGen® Power System is unique in the MHK industry and, in itself, offers distinct advantages of MHK devices that are secured to the seabed using fixed structural frames. Foremost among these advantages are capital and operating cost reductions and increased power extraction by allowing the device to be placed at the most energetic level of the water column.« less

  17. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... by a launch operator, through the use of security personnel, surveillance systems, physical barriers... the launch site of safety rules and emergency and evacuation procedures prior to that person's entry...

  18. An enhanced mobile-healthcare emergency system based on extended chaotic maps.

    PubMed

    Lee, Cheng-Chi; Hsu, Che-Wei; Lai, Yan-Ming; Vasilakos, Athanasios

    2013-10-01

    Mobile Healthcare (m-Healthcare) systems, namely smartphone applications of pervasive computing that utilize wireless body sensor networks (BSNs), have recently been proposed to provide smartphone users with health monitoring services and received great attentions. An m-Healthcare system with flaws, however, may leak out the smartphone user's personal information and cause security, privacy preservation, or user anonymity problems. In 2012, Lu et al. proposed a secure and privacy-preserving opportunistic computing (SPOC) framework for mobile-Healthcare emergency. The brilliant SPOC framework can opportunistically gather resources on the smartphone such as computing power and energy to process the computing-intensive personal health information (PHI) in case of an m-Healthcare emergency with minimal privacy disclosure. To balance between the hazard of PHI privacy disclosure and the necessity of PHI processing and transmission in m-Healthcare emergency, in their SPOC framework, Lu et al. introduced an efficient user-centric privacy access control system which they built on the basis of an attribute-based access control mechanism and a new privacy-preserving scalar product computation (PPSPC) technique. However, we found out that Lu et al.'s protocol still has some secure flaws such as user anonymity and mutual authentication. To fix those problems and further enhance the computation efficiency of Lu et al.'s protocol, in this article, the authors will present an improved mobile-Healthcare emergency system based on extended chaotic maps. The new system is capable of not only providing flawless user anonymity and mutual authentication but also reducing the computation cost.

  19. 17 CFR 19.01 - Reports on stocks and fixed price purchases and sales pertaining to futures positions in wheat...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., soybean meal or cotton. 19.01 Section 19.01 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... MERCHANTS AND DEALERS IN COTTON § 19.01 Reports on stocks and fixed price purchases and sales pertaining to futures positions in wheat, corn, oats, soybeans, soybean oil, soybean meal or cotton. (a) Information...

  20. 17 CFR 19.01 - Reports on stocks and fixed price purchases and sales pertaining to futures positions in wheat...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., soybean meal or cotton. 19.01 Section 19.01 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... MERCHANTS AND DEALERS IN COTTON § 19.01 Reports on stocks and fixed price purchases and sales pertaining to futures positions in wheat, corn, oats, soybeans, soybean oil, soybean meal or cotton. (a) Information...

  1. 17 CFR 19.01 - Reports on stocks and fixed price purchases and sales pertaining to futures positions in wheat...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., soybean meal or cotton. 19.01 Section 19.01 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... MERCHANTS AND DEALERS IN COTTON § 19.01 Reports on stocks and fixed price purchases and sales pertaining to futures positions in wheat, corn, oats, soybeans, soybean oil, soybean meal or cotton. (a) Information...

  2. 17 CFR 19.01 - Reports on stocks and fixed price purchases and sales pertaining to futures positions in wheat...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., soybean meal or cotton. 19.01 Section 19.01 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... MERCHANTS AND DEALERS IN COTTON § 19.01 Reports on stocks and fixed price purchases and sales pertaining to futures positions in wheat, corn, oats, soybeans, soybean oil, soybean meal or cotton. (a) Information...

  3. 17 CFR 19.01 - Reports on stocks and fixed price purchases and sales pertaining to futures positions in wheat...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., soybean meal or cotton. 19.01 Section 19.01 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... MERCHANTS AND DEALERS IN COTTON § 19.01 Reports on stocks and fixed price purchases and sales pertaining to futures positions in wheat, corn, oats, soybeans, soybean oil, soybean meal or cotton. (a) Information...

  4. Multiline radar scan

    NASA Technical Reports Server (NTRS)

    Levinson, S.

    1977-01-01

    Scanning scheme is more efficient than conventional scanning. Originally designed for optical radar in space vehicles, scheme may also find uses in site-surveillance security systems and in other industrial applications. It should be particularly useful when system must run on battery energy, as would be case in power outages.

  5. 77 FR 52083 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change To List...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-28

    ... codes of ethics. This Rule requires investment advisers to adopt a code of ethics that reflects the... may purchase fixed income securities issued by U.S. or foreign corporations \\8\\ or financial... stocks. The Fund also may purchase securities issued or guaranteed by the U.S. Government or foreign...

  6. 77 FR 60165 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Order Approving Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-02

    ... Time at Which the Mortgage-Backed Securities Division Runs Its Daily Morning Pass September 26, 2012. I... FICC proposes to move the time at which its Mortgage-Backed Securities Division (``MBSD'') runs its... processing passes. MBSD currently runs its first processing pass of the day (historically referred to as the...

  7. 20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...), the employer must: (a) Execute and file with the Branch an Agreement and Undertaking, in a form... amount; (4) Authorize the Branch, at its discretion, to bring suit under any deposited indemnity bond or...) Give security in the amount fixed in the Office's decision: (1) In the form of an indemnity bond with...

  8. 20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...), the employer must: (a) Execute and file with the Branch an Agreement and Undertaking, in a form... amount; (4) Authorize the Branch, at its discretion, to bring suit under any deposited indemnity bond or...) Give security in the amount fixed in the Office's decision: (1) In the form of an indemnity bond with...

  9. 20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...), the employer must: (a) Execute and file with the Branch an Agreement and Undertaking, in a form... amount; (4) Authorize the Branch, at its discretion, to bring suit under any deposited indemnity bond or...) Give security in the amount fixed in the Office's decision: (1) In the form of an indemnity bond with...

  10. 20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...), the employer must: (a) Execute and file with the Branch an Agreement and Undertaking, in a form... amount; (4) Authorize the Branch, at its discretion, to bring suit under any deposited indemnity bond or...) Give security in the amount fixed in the Office's decision: (1) In the form of an indemnity bond with...

  11. Six-dimensional quantum dynamics study for the dissociative adsorption of DCl on Au(111) surface

    NASA Astrophysics Data System (ADS)

    Liu, Tianhui; Fu, Bina; Zhang, Dong H.

    2014-04-01

    We carried out six-dimensional quantum dynamics calculations for the dissociative adsorption of deuterium chloride (DCl) on Au(111) surface using the initial state-selected time-dependent wave packet approach. The four-dimensional dissociation probabilities are also obtained with the center of mass of DCl fixed at various sites. These calculations were all performed based on an accurate potential energy surface recently constructed by neural network fitting to density function theory energy points. The origin of the extremely small dissociation probability for DCl/HCl (v = 0, j = 0) fixed at the top site compared to other fixed sites is elucidated in this study. The influence of vibrational excitation and rotational orientation of DCl on the reactivity was investigated by calculating six-dimensional dissociation probabilities. The vibrational excitation of DCl enhances the reactivity substantially and the helicopter orientation yields higher dissociation probability than the cartwheel orientation. The site-averaged dissociation probability over 25 fixed sites obtained from four-dimensional quantum dynamics calculations can accurately reproduce the six-dimensional dissociation probability.

  12. Six-dimensional quantum dynamics study for the dissociative adsorption of DCl on Au(111) surface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liu, Tianhui; Fu, Bina, E-mail: bina@dicp.ac.cn, E-mail: zhangdh@dicp.ac.cn; Zhang, Dong H., E-mail: bina@dicp.ac.cn, E-mail: zhangdh@dicp.ac.cn

    We carried out six-dimensional quantum dynamics calculations for the dissociative adsorption of deuterium chloride (DCl) on Au(111) surface using the initial state-selected time-dependent wave packet approach. The four-dimensional dissociation probabilities are also obtained with the center of mass of DCl fixed at various sites. These calculations were all performed based on an accurate potential energy surface recently constructed by neural network fitting to density function theory energy points. The origin of the extremely small dissociation probability for DCl/HCl (v = 0, j = 0) fixed at the top site compared to other fixed sites is elucidated in this study. The influence of vibrational excitationmore » and rotational orientation of DCl on the reactivity was investigated by calculating six-dimensional dissociation probabilities. The vibrational excitation of DCl enhances the reactivity substantially and the helicopter orientation yields higher dissociation probability than the cartwheel orientation. The site-averaged dissociation probability over 25 fixed sites obtained from four-dimensional quantum dynamics calculations can accurately reproduce the six-dimensional dissociation probability.« less

  13. 75 FR 76041 - Chrysler Group LLC Formerly Known as Chrysler LLC Kenosha Engine Plant Including On-Site Leased...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-07

    ... Formerly Known as Chrysler LLC Kenosha Engine Plant Including On-Site Leased Workers From Caravan Knight..., K+S Services, Inc., G4S Secure Solutions, Crassociates, Inc., CES, Inc., Evans Distribution Systems..., LLC, formerly known as Chrysler, LLC, Kenosha Engine Plant, Kenosha, Wisconsin (subject firm). The...

  14. Solution of the effective Hamiltonian of impurity hopping between two sites in a metal

    NASA Astrophysics Data System (ADS)

    Ye, Jinwu

    1997-07-01

    We analyze in detail all the possible fixed points of the effective Hamiltonian of a nonmagnetic impurity hopping between two sites in a metal obtained by Moustakas and Fisher (MF). We find a line of non-Fermi liquid fixed points which continuously interpolates between the two-channel Kondo fixed point (2CK) and the one-channel, two-impurity Kondo (2IK) fixed point. There is one relevant direction with scaling dimension 12 and one leading irrelevant operator with dimension 32. There is also one marginal operator in the spin sector moving along this line. The marginal operator, combined with the leading irrelevant operator, will generate the relevant operator. For the general position on this line, the leading low-temperature exponents of the specific heat, the hopping susceptibility and the electron conductivity Cimp,χhimp,σ(T) are the same as those of the 2CK, but the finite-size spectrum depends on the position on the line. No universal ratios can be formed from the amplitudes of the three quantities except at the 2CK point on this line where the universal ratios can be formed. At the 2IK point on this line, σ(T)~2σu(1+aT3/2), no universal ratio can be formed either. The additional non-Fermi-liquid fixed point found by MF has the same symmetry as the 2IK, it has two relevant directions with scaling dimension 12, and is therefore also unstable. The leading low-temperature behaviors are Cimp~T,χhimp~lnT,σ(T)~2σu(1+aT3/2) no universal ratios can be formed. The system is shown to flow to a line of Fermi-liquid fixed points which continuously interpolates between the noninteracting fixed point and the two-channel spin-flavor Kondo fixed point discussed by the author previously. The effect of particle-hole symmetry breaking is discussed. The effective Hamiltonian in the external magnetic field is analyzed. The scaling functions for the physical measurable quantities are derived in the different regimes; their predictions for the experiments are given. Finally the implications are given for a nonmagnetic impurity hopping around three sites with triangular symmetry discussed by MF.

  15. Is GPS telemetry location error screening beneficial?

    USGS Publications Warehouse

    Ironside, Kirsten E.; Mattson, David J.; Arundel, Terry; Hansen, Jered R.

    2017-01-01

    The accuracy of global positioning system (GPS) locations obtained from study animals tagged with GPS monitoring devices has been a concern as to the degree it influences assessments of movement patterns, space use, and resource selection estimates. Many methods have been proposed for screening data to retain the most accurate positions for analysis, based on dilution of precision (DOP) measures, and whether the position is a two dimensional or three dimensional fix. Here we further explore the utility of these measures, by testing a Telonics GEN3 GPS collar's positional accuracy across a wide range of environmental conditions. We found the relationship between location error and fix dimension and DOP metrics extremely weak (r2adj ∼ 0.01) in our study area. Environmental factors such as topographic exposure, canopy cover, and vegetation height explained more of the variance (r2adj = 15.08%). Our field testing covered sites where sky-view was so limited it affected GPS performance to the degree fix attempts failed frequently (fix success rates ranged 0.00–100.00% over 67 sites). Screening data using PDOP did not effectively reduce the location error in the remaining dataset. Removing two dimensional fixes reduced the mean location error by 10.95 meters, but also resulted in a 54.50% data reduction. Therefore screening data under the range of conditions sampled here would reduce information on animal movement with minor improvements in accuracy and potentially introduce bias towards more open terrain and vegetation.

  16. Benthic invertebrates of fixed sites in the western Lake Michigan drainages, Wisconsin and Michigan, 1993-95

    USGS Publications Warehouse

    Lenz, Bernard N.; Rheaume, S.J.

    2000-01-01

    This report describes the variability in family-level benthic-invertebrate population data and the reliability of the data as a water-quality indicator for 11 fixed surface-water sites in the Western Lake Michigan Drainages study area of the National Water-Quality Assessment Program. Benthic-invertebrate-community measures were computed for the following: number of individuals, Hilsenhoff’s Family-Level Biotic Index, number and percent EPT (Ephemeroptera, Plecoptera, and Tricoptera), Margalef’s Diversity Index, and mean tolerance value. Relations between these measures and environmental setting, habitat, and of chemical water quality are examined. Benthic-invertebrate communities varied greatly among fixed sites and within individual streams among multiple-reach and multiple-year sampling. The variations between multiple reaches and years were sometimes larger than those found between different fixed sites. Factors affecting benthic invertebrates included both habitat and chemical quality. Generally, fixed-site streams with the highest diversity, greatest number of benthic invertebrates, and those at which community measures indicated the best water quality also had the best habitat and chemical quality. Variations among reaches are most likely related to differences in habitat. Variations among years are most likely related to climatic changes, which create variations in flow and/or chemical quality. The variability in the data analyzed in this study shows how benthic invertebrates are affected by differences in both habitat and water quality, making them useful indicators of stream health; however, a single benthic-invertebrate sample alone cannot be relied upon to accurately describe water quality of the streams in this study. Benthic-invertebrate data contributed valuable information on the biological health of the 11 fixed sites when used as one of several data sources for assessing water quality.

  17. REAGENTLESS FIELD-USABLE FIXED-SITE AND PORTABLE ANALYZER FOR TRIHALOMETHANE (THM) CONCENTRATIONS IN DRINKING WATER - PHASE I

    EPA Science Inventory

    Environmental Protection Agency rules stipulate that corrective action be taken for drinking water distribution systems that exceed the maximum contaminant level (MCL) for total Trihalomethanes (TTHMs) 80μg/L.  Real-time, or even periodic, monitoring of drinking water i...

  18. Closed-Circuit Educational Television (ITFS) in Northeastern California: The 33,000 Square Mile Campus.

    ERIC Educational Resources Information Center

    Meuter, Ralph F.; And Others

    This paper describes the Instructional Television Fixed Service (ITFS) program, a closed-circuit educational television system in which classes originating on the California State University, Chico (CSUC) campus are simultaneously broadcast live to various ITFS sites within Northeastern California. Following an introduction, the first section…

  19. Arduino based radioactive tracking system

    NASA Astrophysics Data System (ADS)

    Rahman, Nur Aira Abd; Rashid, Mohd Fazlie Bin Abdul; Rahman, Anwar Bin Abdul; Ramlan, Atikah

    2017-01-01

    There is a clear need to strengthen security measures to prevent any malevolent use or accidental misuse of radioactive sources. Some of these radioactive sources are regularly transported outside of office or laboratory premises for work and consultation purposes. This paper present the initial development of radioactive source tracking system, which combined Arduino microcontroller, Global Positioning System (GPS) and Global System for Mobile communication (GSM) technologies. The tracking system will help the owner to monitor the movement of the radioactive sources. Currently, the system is capable of tracking the movement of radioactive source through the GPS satellite signals. The GPS co-ordinate could either be transmitted to headquarters at fixed interval via Short Messaging Service (SMS) to enable real time monitoring, or stored in a memory card for offline monitoring and data logging.

  20. Security Design Flaws That Affect Usability in Online Banking

    ERIC Educational Resources Information Center

    Gurlen, Stephanie

    2013-01-01

    As the popularity of online banking Websites has increased, the security of these sites has become increasingly critical as attacks against these sites are on the rise. However, the design decisions made during construction of the sites could make usability more difficult, where the user has difficulty making good security decisions. This study…

  1. Design, implementation and migration of security systems as an extreme project.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scharmer, Carol; Trujillo, David

    2010-08-01

    Decision Trees, algorithms, software code, risk management, reports, plans, drawings, change control, presentations, and analysis - all useful tools and efforts but time consuming, resource intensive, and potentially costly for projects that have absolute schedule and budget constraints. What are necessary and prudent efforts when a customer calls with a major security problem that needs to be fixed with a proven, off-the-approval-list, multi-layered integrated system with high visibility and limited funding and expires at the end of the Fiscal Year? Whether driven by budget cycles, safety, or by management decree, many such projects begin with generic scopes and funding allocatedmore » based on a rapid management 'guestimate.' Then a Project Manager (PM) is assigned a project with a predefined and potentially limited scope, compressed schedule, and potentially insufficient funding. The PM is tasked to rapidly and cost effectively coordinate a requirements-based design, implementation, test, and turnover of a fully operational system to the customer, all while the customer is operating and maintaining an existing security system. Many project management manuals call this an impossible project that should not be attempted. However, security is serious business and the reality is that rapid deployment of proven systems via an 'Extreme Project' is sometimes necessary. Extreme Projects can be wildly successful but require a dedicated team of security professionals lead by an experienced project manager using a highly-tailored and agile project management process with management support at all levels, all combined with significant interface with the customer. This paper does not advocate such projects or condone eliminating the valuable analysis and project management techniques. Indeed, having worked on a well-planned project provides the basis for experienced team members to complete Extreme Projects. This paper does, however, provide insight into what it takes for projects to be successfully implemented and accepted when completed under extreme conditions.« less

  2. Design implementation and migration of security systems as an extreme project.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scharmer, Carol

    2010-10-01

    Decision Trees, algorithms, software code, risk management, reports, plans, drawings, change control, presentations, and analysis - all useful tools and efforts but time consuming, resource intensive, and potentially costly for projects that have absolute schedule and budget constraints. What are necessary and prudent efforts when a customer calls with a major security problem that needs to be fixed with a proven, off-the-approval-list, multi-layered integrated system with high visibility and limited funding and expires at the end of the Fiscal Year? Whether driven by budget cycles, safety, or by management decree, many such projects begin with generic scopes and funding allocatedmore » based on a rapid management 'guestimate.' Then a Project Manager (PM) is assigned a project with a predefined and potentially limited scope, compressed schedule, and potentially insufficient funding. The PM is tasked to rapidly and cost effectively coordinate a requirements-based design, implementation, test, and turnover of a fully operational system to the customer, all while the customer is operating and maintaining an existing security system. Many project management manuals call this an impossible project that should not be attempted. However, security is serious business and the reality is that rapid deployment of proven systems via an 'Extreme Project' is sometimes necessary. Extreme Projects can be wildly successful but require a dedicated team of security professionals lead by an experienced project manager using a highly-tailored and agile project management process with management support at all levels, all combined with significant interface with the customer. This paper does not advocate such projects or condone eliminating the valuable analysis and project management techniques. Indeed, having worked on a well-planned project provides the basis for experienced team members to complete Extreme Projects. This paper does, however, provide insight into what it takes for projects to be successfully implemented and accepted when completed under extreme conditions.« less

  3. Nutrition Education Needs Pantry Clients

    ERIC Educational Resources Information Center

    Wood, Dolores K.; Shultz, Jill Armstrong; Edlefsen, Miriam; Butkus, Sue N.

    2007-01-01

    Two food pantries were surveyed for nutrition education (NE) interests and experiences. One site provided nutrition education classes; the comparison site was utilized to assess client interest in class topics. "Fixing low cost meals," "fixing quick and easy recipes," and "stretching food and food dollars" were topics…

  4. A Secure Communication Suite for Underwater Acoustic Sensor Networks

    PubMed Central

    Dini, Gianluca; Duca, Angelica Lo

    2012-01-01

    In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confidentiality and the integrity of underwater communication while taking into account the unique characteristics and constraints of the acoustic channel. By means of experiments and simulations based on real data, we show that the suite is suitable for an underwater networking environment as it introduces limited, and sometimes negligible, communication and power consumption overhead. PMID:23202204

  5. Seller Beware: US International Technology Transfer and Its Impact on National Security (Maxwell Paper, Number 16)

    DTIC Science & Technology

    1998-12-01

    be adjusted to fix it? Inside the Defense Department, the Defense Technology Security Agency ( DTSA ) handles export policy. For the past several years... DTSA has been working with the State, Commerce, and Defense Departments to strike a balance between national security and the economic needs of the...nation’s defense industry to export.46 DTSA reviews the export application (received from either from State or Com- merce) and forwards it to the

  6. A lightweight approach for biometric template protection

    NASA Astrophysics Data System (ADS)

    Al-Assam, Hisham; Sellahewa, Harin; Jassim, Sabah

    2009-05-01

    Privacy and security are vital concerns for practical biometric systems. The concept of cancelable or revocable biometrics has been proposed as a solution for biometric template security. Revocable biometric means that biometric templates are no longer fixed over time and could be revoked in the same way as lost or stolen credit cards are. In this paper, we describe a novel and an efficient approach to biometric template protection that meets the revocability property. This scheme can be incorporated into any biometric verification scheme while maintaining, if not improving, the accuracy of the original biometric system. However, we shall demonstrate the result of applying such transforms on face biometric templates and compare the efficiency of our approach with that of the well-known random projection techniques. We shall also present the results of experimental work on recognition accuracy before and after applying the proposed transform on feature vectors that are generated by wavelet transforms. These results are based on experiments conducted on a number of well-known face image databases, e.g. Yale and ORL databases.

  7. 30 CFR 56.6501 - Nonelectric initiation systems.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... shock tube— (1) Connections with other initiation devices shall be secured in a manner which provides... proceed; (5) Connections between blastholes shall not be made until immediately prior to clearing the... connected to the trunklines at the blast site. (c) When the nonelectric initiation system uses gas tube...

  8. 30 CFR 56.6501 - Nonelectric initiation systems.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... shock tube— (1) Connections with other initiation devices shall be secured in a manner which provides... proceed; (5) Connections between blastholes shall not be made until immediately prior to clearing the... connected to the trunklines at the blast site. (c) When the nonelectric initiation system uses gas tube...

  9. 30 CFR 56.6501 - Nonelectric initiation systems.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... shock tube— (1) Connections with other initiation devices shall be secured in a manner which provides... proceed; (5) Connections between blastholes shall not be made until immediately prior to clearing the... connected to the trunklines at the blast site. (c) When the nonelectric initiation system uses gas tube...

  10. 30 CFR 56.6501 - Nonelectric initiation systems.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... shock tube— (1) Connections with other initiation devices shall be secured in a manner which provides... proceed; (5) Connections between blastholes shall not be made until immediately prior to clearing the... connected to the trunklines at the blast site. (c) When the nonelectric initiation system uses gas tube...

  11. 30 CFR 56.6501 - Nonelectric initiation systems.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... shock tube— (1) Connections with other initiation devices shall be secured in a manner which provides... proceed; (5) Connections between blastholes shall not be made until immediately prior to clearing the... connected to the trunklines at the blast site. (c) When the nonelectric initiation system uses gas tube...

  12. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  13. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  14. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  15. Computer-Based Testing: Test Site Security.

    ERIC Educational Resources Information Center

    Rosen, Gerald A.

    Computer-based testing places great burdens on all involved parties to ensure test security. A task analysis of test site security might identify the areas of protecting the test, protecting the data, and protecting the environment as essential issues in test security. Protecting the test involves transmission of the examinations, identifying the…

  16. Creating a Clinical Video-Conferencing Facility in a Security-Constrained Environment Using Open-Source AccessGrid Software and Consumer Hardware

    PubMed Central

    Terrazas, Enrique; Hamill, Timothy R.; Wang, Ye; Channing Rodgers, R. P.

    2007-01-01

    The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components. PMID:18693930

  17. Creating a clinical video-conferencing facility in a security-constrained environment using open-source AccessGrid software and consumer hardware.

    PubMed

    Terrazas, Enrique; Hamill, Timothy R; Wang, Ye; Channing Rodgers, R P

    2007-10-11

    The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components.

  18. A Learning-Based Approach to Reactive Security

    NASA Astrophysics Data System (ADS)

    Barth, Adam; Rubinstein, Benjamin I. P.; Sundararajan, Mukund; Mitchell, John C.; Song, Dawn; Bartlett, Peter L.

    Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst-case assumptions about the attacker: we grant the attacker complete knowledge of the defender's strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker's incentives and knowledge.

  19. Prototype software model for designing intruder detection systems with simulation

    NASA Astrophysics Data System (ADS)

    Smith, Jeffrey S.; Peters, Brett A.; Curry, James C.; Gupta, Dinesh

    1998-08-01

    This article explores using discrete-event simulation for the design and control of defence oriented fixed-sensor- based detection system in a facility housing items of significant interest to enemy forces. The key issues discussed include software development, simulation-based optimization within a modeling framework, and the expansion of the framework to create real-time control tools and training simulations. The software discussed in this article is a flexible simulation environment where the data for the simulation are stored in an external database and the simulation logic is being implemented using a commercial simulation package. The simulation assesses the overall security level of a building against various intruder scenarios. A series of simulation runs with different inputs can determine the change in security level with changes in the sensor configuration, building layout, and intruder/guard strategies. In addition, the simulation model developed for the design stage of the project can be modified to produce a control tool for the testing, training, and real-time control of systems with humans and sensor hardware in the loop.

  20. Weird Project: E-Health Service Improvement Using WiMAX

    NASA Astrophysics Data System (ADS)

    Cimmino, Antonio; Casali, Fulvio; Mambretti, Cinzia

    Today the major obstacle to massive deployment of telemedicine applications are the security issues related to the exchange of real time information between different elements that are not at fixed locations. WiMAX, the new standard for wireless communications, is one of the most promising technologies for broadband access in a fixed and mobile environment and it is expected to overcome the above mentioned obstacle. The FP6-WEIRD [1] (WiMax Extension to Isolated Remote Data networks) project has: analysed how this technology can guarantee secure real time data transmission between mobile elements, built some successful demonstrations and paved the way to future commercial applications. This paper in particular describes: main promising e-health applications that WiMax would enable; the technological highlights and the main challenges that WiMax has to face in e-health applications such as accounting, privacy, security, data integrity; the way in which the WEIRD project 0 has studied the wireless access to medical communities and equipment in remote or impervious areas. 0 0; some envisaged implementations.

  1. Upgrade to the control system of the reflectometry diagnostic of ASDEX upgrade

    NASA Astrophysics Data System (ADS)

    Graça, S.; Santos, J.; Manso, M. E.

    2004-10-01

    The broadband frequency modulation-continuous wave microwave/millimeter wave reflectometer of ASDEX upgrade tokamak (Institut für Plasma Physik (IPP), Garching, Germany) developed by Centro de Fusão Nuclear (Lisboa, Portugal) with the collaboration of IPP, is a complex system with 13 channels (O and X modes) and two types of operation modes (swept and fixed frequency). The control system that ensures remote operation of the diagnostic incorporates VME and CAMAC bus based acquisition/timing systems. Microprocessor input/output boards are used to control and monitor the microwave circuitry and associated electronic devices. The implementation of the control system is based on an object-oriented client/server model: a centralized server manages the hardware and receives input from remote clients. Communication is handled through transmission control protocol/internet protocol sockets. Here we describe recent upgrades of the control system aiming to: (i) accommodate new channels; (ii) adapt to the heterogeneity of computing platforms and operating systems; and (iii) overcome remote access restrictions. Platform and operating system independence was achieved by redesigning the graphical user interface in JAVA. As secure shell is the standard remote access protocol adopted in major fusion laboratories, secure shell tunneling was implemented to allow remote operation of the diagnostic through the existing firewalls.

  2. Behavioral analysis of malicious code through network traffic and system call monitoring

    NASA Astrophysics Data System (ADS)

    Grégio, André R. A.; Fernandes Filho, Dario S.; Afonso, Vitor M.; Santos, Rafael D. C.; Jino, Mario; de Geus, Paulo L.

    2011-06-01

    Malicious code (malware) that spreads through the Internet-such as viruses, worms and trojans-is a major threat to information security nowadays and a profitable business for criminals. There are several approaches to analyze malware by monitoring its actions while it is running in a controlled environment, which helps to identify malicious behaviors. In this article we propose a tool to analyze malware behavior in a non-intrusive and effective way, extending the analysis possibilities to cover malware samples that bypass current approaches and also fixes some issues with these approaches.

  3. Integer programming applications: Bond trading, mortgage backed security financing, and FASB 115 accounting

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nauss, R.

    1994-12-31

    In this review we describe three integer programming applications involving fixed income securities. A bond trading model is presented that features a number of possible different objectives and collections of constraints including future interest rate scenarios. A mortgage backed security (MBS) financing model that accounts for potential defaults in the MBS is also presented. Finally we describe an approach to allocate collections of bank securities into three categories: hold to maturity, available for sale, or trading. Placement of securities in these categories affects the capital, net income, and liquidity of a bank according to new accounting rules promulgated by themore » Financial Accounting Standards Board.« less

  4. Cyberspace as a Theater of Conflict: Federal Law, National Strategy and the Departments of Defense and Homeland Security

    DTIC Science & Technology

    2007-06-01

    short period of time. When web search organizations canvas the web looking for sites to catalog, they will discover your systems and create registry... Fingerprint & DNA Databases, INTERPOL & National Law Enforcement Communication Systems, Firearms Registration Records, Drivers License, Birth

  5. 24 CFR 1710.111 - Utilities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... used (e.g., central system, comfort stations or individual on-site systems such as septic tanks, holding tanks, etc.) in the subdivision? Of the following items, only those which apply to the subdivision... similar storage tanks are to be used, state where water to fill them can be secured; the cost of the water...

  6. Seismic analysis of offshore wind turbines on bottom-fixed support structures.

    PubMed

    Alati, Natale; Failla, Giuseppe; Arena, Felice

    2015-02-28

    This study investigates the seismic response of a horizontal axis wind turbine on two bottom-fixed support structures for transitional water depths (30-60 m), a tripod and a jacket, both resting on pile foundations. Fully coupled, nonlinear time-domain simulations on full system models are carried out under combined wind-wave-earthquake loadings, for different load cases, considering fixed and flexible foundation models. It is shown that earthquake loading may cause a significant increase of stress resultant demands, even for moderate peak ground accelerations, and that fully coupled nonlinear time-domain simulations on full system models are essential to capture relevant information on the moment demand in the rotor blades, which cannot be predicted by analyses on simplified models allowed by existing standards. A comparison with some typical design load cases substantiates the need for an accurate seismic assessment in sites at risk from earthquakes. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  7. Interactive analysis of geographically distributed population imaging data collections over light-path data networks

    NASA Astrophysics Data System (ADS)

    van Lew, Baldur; Botha, Charl P.; Milles, Julien R.; Vrooman, Henri A.; van de Giessen, Martijn; Lelieveldt, Boudewijn P. F.

    2015-03-01

    The cohort size required in epidemiological imaging genetics studies often mandates the pooling of data from multiple hospitals. Patient data, however, is subject to strict privacy protection regimes, and physical data storage may be legally restricted to a hospital network. To enable biomarker discovery, fast data access and interactive data exploration must be combined with high-performance computing resources, while respecting privacy regulations. We present a system using fast and inherently secure light-paths to access distributed data, thereby obviating the need for a central data repository. A secure private cloud computing framework facilitates interactive, computationally intensive exploration of this geographically distributed, privacy sensitive data. As a proof of concept, MRI brain imaging data hosted at two remote sites were processed in response to a user command at a third site. The system was able to automatically start virtual machines, run a selected processing pipeline and write results to a user accessible database, while keeping data locally stored in the hospitals. Individual tasks took approximately 50% longer compared to a locally hosted blade server but the cloud infrastructure reduced the total elapsed time by a factor of 40 using 70 virtual machines in the cloud. We demonstrated that the combination light-path and private cloud is a viable means of building an analysis infrastructure for secure data analysis. The system requires further work in the areas of error handling, load balancing and secure support of multiple users.

  8. Hydrocarbon pollution fixed to combined sewer sediment: a case study in Paris.

    PubMed

    Rocher, Vincent; Garnaud, Stéphane; Moilleron, Régis; Chebbo, Ghassan

    2004-02-01

    Over a period of two years (2000-2001), sediment samples were extracted from 40 silt traps (STs) spread through the combined sewer system of Paris. All sediment samples were analysed for physico-chemical parameters (pH, organic matter content, grain size distribution), with total hydrocarbons (THs) and 16 polycyclic aromatic hydrocarbons (PAHs) selected from the priority list of the US-EPA. The two main objectives of the study were (1) to determine the hydrocarbon contamination levels in the sediments of the Paris combined sewer system and (2) to investigate the PAH fingerprints in order to assess their spatial variability and to elucidate the PAH origins. The results show that there is some important inter-site and intra-site variations in hydrocarbon contents. Despite this variability, TH and PAH contamination levels (50th percentile) in the Parisian sewer sediment are estimated at 530 and 18 microg g(-1), respectively. The investigation of the aromatic compound distributions in all of the 40 STs has underlined that there is, at the Paris sewer system scale, a homogeneous PAH background pollution. Moreover, the study of the PAH fingerprints, using specific ratios, suggests the predominance of a pyrolytic origin for those PAHs fixed to the sewer sediment.

  9. Surface-water quality at fixed sites in the Western Lake Michigan Drainages, Wisconsin and Michigan, and the effects of natural and human factors, 1993-95

    USGS Publications Warehouse

    Richards, K.D.; Sullivan, D.J.; Stewart, J.S.

    1998-01-01

    Streamwater samples were collected from April 1993 through July 1995 at 11 fixed sites in the Western Lake Michigan Drainages Study Unit of the U.S. Geological Survey's National Water-Quality Assessment Program. Water samples were collected monthly at all Fixed Sites, and an additional two to four samples were collected each year during periods of high flow. Streamflow was monitored continuously at the Fixed Sites for the duration of the study period. This report describes field techniques used to collect the water samples, and the analytical methods used for laboratory analyses, statistical analyses of the data, and an attempt to determine the effect of natural and anthropogenic factors on concentrations of nutrients and selected major ions and suspended solids. Locations of eight of the Fixed Sites were selected to represent areas with unique combinations of land use/land cover, surficial deposits, and bedrock geology and are referred to as 'indicator sites.' The remaining three sites were located near the mouths of major rivers and are referred to as 'integrator sites.' The integrator sites represent a large part of the total flow from the Study Unit to Green Bay and western Lake Michigan, and drain various combinations of land use, bedrock, and surficial deposits. These data indicate that land use and surficial deposits may be the primary factors affecting nitrate and total phosphorus concentrations in this Study Unit. Median concentrations of nitrate at the forested sites were less than the National Median Concentration (NMC), and those at urban fixed sites were similar to the NMC. Median nitrate concentrations at the Tomorrow River, North Branch Milwaukee River, and Duck Creek agricultural indicator sites were twice the NMC, but median concentrations at the remaining agricultural indicator sites were similar to the NMC. Nitrate concentrations at one agricultural indicator site exceeded the U. S. Environmental Protection Agency (USEPA) maximum contaminant level in three run-off samples in the growing seasons of 1994 and 1995. Median concentrations of total phosphorus at the forested indicator sites were below the NMC. Tomorrow River was the only agricultural indicator site where the median total-phosphorus concentration was less than the NMC; median concentrations at the remaining agricultural Fixed Sites were similar to the NMC and exceeded 0.1 mg/L, the USEPA suggested total-phosphorus concentration in flowing water. The USEPA recommends that total-phosphorus concentration not exceed this limit to discourage excessive aquatic plant growth in flowing waters. Median total-phosphorus concentration at the urban indicator site was less than the urban NMC. Median concentrations for both nitrate and total phosphorus at the mouth of the Fox River and the Milwaukee River integrator sites were similar to the NMC for the dominant land use, agriculture, within their basins, and were lower than that at the Menominee River integrator site with a dominant forest land use. During this study, potassium concentrations were generally highest in areas of clay-dominated surficial deposits, silica was generally highest in areas of sandy surficial deposits, iron generally highest in areas of igneous/metamorphic bedrock, and calcium generally highest in areas of carbonate bedrock. The highest median fluoride concentration occurred at an urban site that receives treated water.

  10. Tracing Sources of Organic Matter and Nitrate in the San Francisco Bay-Delta-River Ecosystem Using Isotopic Techniques: Comparison of Insights Gained from Fixed-site, Synoptic, and Diel Sampling Strategies

    NASA Astrophysics Data System (ADS)

    Kendall, C.; Silva, S. R.; Doctor, D. H.; Wankel, S. D.; Chang, C. C.; Bergamaschi, B. A.; Kratzer, C. R.; Dahlgren, R. A.; Fleenor, W. E.

    2005-12-01

    Understanding the sources and sinks for organics and nitrate is critical for devising effective strategies to reduce their loads in ecosystems and mitigate local problems of low dissolved oxygen levels and/or production of disinfection byproducts during water treatment. Since isotopic techniques are effective methods for quantifying the sources and sinks of organics and nutrients, we have analyzed particulate organic matter (POM), nitrate, dissolved inorganic and organic carbon (DIC, DOC), and water isotope samples from selected sites since 2000. Our studies indicate that isotope data are a useful adjunct to traditional methods for assessing and monitoring sources of organics and nutrients. The original sampling in 2000-2001 used the classical fixed-site and fixed-time interval sampling approach, where sites on the San Joaquin River and its major tributaries were sampled bimonthly from July to October for chemistry and isotopes (Kratzer et al., 2004: see URL below). Subsequently, samples were collected during 4 transects along the San Joaquin River (10/02, 3/03, 9/03, and 7/04); the first and last of these transects extended through the Delta to the Bay. Several sites were sampled during diel studies in 8/04 and 7/05. Although fixed-site sampling is the norm in watershed studies, we have found that isotope and chemical data collected during longitudinal transects of the river and diel sampling of several sites along short river reaches have been more useful in convincing colleagues that isotope measurements are extremely useful adjuncts to traditional methods for assessing and monitoring sources of organics and nutrients during ecosystem restoration programs. Furthermore, we have concluded that while the obvious value of isotopes for water resources management is to tell us things about water resources that we didn't know before, what convinces the skeptic is when the isotopes tell us things about water resources that contradict what we thought we knew before. This work will highlight these and other insights developed using varied sampling strategies, and suggest guidelines for how to approach future studies in biologically active and human impacted rivers like the San Joaquin River system.

  11. Nevada National Security Site Environmental Report 2016

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wills

    This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSERmore » summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple missions. The three major NNSS missions include National Security/Defense, Environmental Management, and Nondefense. The major programs that support these missions are Stockpile Stewardship and Management, Nonproliferation and Counterterrorism, Nuclear Emergency Response, Strategic Partnership Projects, Environmental Restoration, Waste Management, Conservation and Renewable Energy, Other Research and Development, and Infrastructure. The major facilities that support the programs include the U1a Facility, Big Explosives Experimental Facility (BEEF), Device Assembly Facility, Dense Plasma Focus Facility, Joint Actinide Shock Physics Experimental Research Facility, Radiological/Nuclear Countermeasures Test and Evaluation Complex, Nonproliferation Test and Evaluation Complex (NPTEC), Radiological/Nuclear Weapons of Mass Destruction Incident Exercise Site, the Area 5 Radioactive Waste Management Complex (RWMC), and the Area 3 Radioactive Waste Management Site (RWMS).« less

  12. 49 CFR 40.43 - What steps must operators of collection sites take to protect the security and integrity of urine...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... to protect the security and integrity of urine collections? 40.43 Section 40.43 Transportation Office... PROGRAMS Collection Sites, Forms, Equipment and Supplies Used in DOT Urine Collections § 40.43 What steps must operators of collection sites take to protect the security and integrity of urine collections? (a...

  13. 49 CFR 40.43 - What steps must operators of collection sites take to protect the security and integrity of urine...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... to protect the security and integrity of urine collections? 40.43 Section 40.43 Transportation Office... PROGRAMS Collection Sites, Forms, Equipment and Supplies Used in DOT Urine Collections § 40.43 What steps must operators of collection sites take to protect the security and integrity of urine collections? (a...

  14. 49 CFR 40.43 - What steps must operators of collection sites take to protect the security and integrity of urine...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... to protect the security and integrity of urine collections? 40.43 Section 40.43 Transportation Office... PROGRAMS Collection Sites, Forms, Equipment and Supplies Used in DOT Urine Collections § 40.43 What steps must operators of collection sites take to protect the security and integrity of urine collections? (a...

  15. 49 CFR 40.43 - What steps must operators of collection sites take to protect the security and integrity of urine...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... to protect the security and integrity of urine collections? 40.43 Section 40.43 Transportation Office... PROGRAMS Collection Sites, Forms, Equipment and Supplies Used in DOT Urine Collections § 40.43 What steps must operators of collection sites take to protect the security and integrity of urine collections? (a...

  16. 49 CFR 40.43 - What steps must operators of collection sites take to protect the security and integrity of urine...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... to protect the security and integrity of urine collections? 40.43 Section 40.43 Transportation Office... PROGRAMS Collection Sites, Forms, Equipment and Supplies Used in DOT Urine Collections § 40.43 What steps must operators of collection sites take to protect the security and integrity of urine collections? (a...

  17. Financial Management of a Large Multi-site Randomized Clinical Trial

    PubMed Central

    Sheffet, Alice J.; Flaxman, Linda; Tom, MeeLee; Hughes, Susan E.; Longbottom, Mary E.; Howard, Virginia J.; Marler, John R.; Brott, Thomas G.

    2014-01-01

    Background The Carotid Revascularization Endarterectomy versus Stenting Trial (CREST) received five years’ funding ($21,112,866) from the National Institutes of Health to compare carotid stenting to surgery for stroke prevention in 2,500 randomized participants at 40 sites. Aims Herein we evaluate the change in the CREST budget from a fixed to variable-cost model and recommend strategies for the financial management of large-scale clinical trials. Methods Projections of the original grant’s fixed-cost model were compared to the actual costs of the revised variable-cost model. The original grant’s fixed-cost budget included salaries, fringe benefits, and other direct and indirect costs. For the variable-cost model, the costs were actual payments to the clinical sites and core centers based upon actual trial enrollment. We compared annual direct and indirect costs and per-patient cost for both the fixed and variable models. Differences between clinical site and core center expenditures were also calculated. Results Using a variable-cost budget for clinical sites, funding was extended by no-cost extension from five to eight years. Randomizing sites tripled from 34 to 109. Of the 2,500 targeted sample size, 138 (5.5%) were randomized during the first five years and 1,387 (55.5%) during the no-cost extension. The actual per-patient costs of the variable model were 9% ($13,845) of the projected per-patient costs ($152,992) of the fixed model. Conclusions Performance-based budgets conserve funding, promote compliance, and allow for additional sites at modest additional cost. Costs of large-scale clinical trials can thus be reduced through effective management without compromising scientific integrity. PMID:24661748

  18. LANL continuity of operations plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Senutovitch, Diane M

    2010-12-22

    The Los Alamos National Laboratory (LANL) is a premier national security research institution, delivering scientific and engineering solutions for the nation's most crucial and complex problems. Our primary responsibility is to ensure the safety, security, and reliability of the nation's nuclear stockpile. LANL emphasizes worker safety, effective operational safeguards and security, and environmental stewardship, outstanding science remains the foundation of work at the Laboratory. In addition to supporting the Laboratory's core national security mission, our work advances bioscience, chemistry, computer science, earth and environmental sciences, materials science, and physics disciplines. To accomplish LANL's mission, we must ensure that the Laboratorymore » EFs continue to be performed during a continuity event, including localized acts of nature, accidents, technological or attack-related emergencies, and pandemic or epidemic events. The LANL Continuity of Operations (COOP) Plan documents the overall LANL COOP Program and provides the operational framework to implement continuity policies, requirements, and responsibilities at LANL, as required by DOE 0 150.1, Continuity Programs, May 2008. LANL must maintain its ability to perform the nation's PMEFs, which are: (1) maintain the safety and security of nuclear materials in the DOE Complex at fixed sites and in transit; (2) respond to a nuclear incident, both domestically and internationally, caused by terrorist activity, natural disaster, or accident, including mobilizing the resources to support these efforts; and (3) support the nation's energy infrastructure. This plan supports Continuity of Operations for Los Alamos National Laboratory (LANL). This plan issues LANL policy as directed by the DOE 0 150.1, Continuity Programs, and provides direction for the orderly continuation of LANL EFs for 30 days of closure or 60 days for a pandemic/epidemic event. Initiation of COOP operations may be required to support an allhazards event, including a national security emergency, major fire, catastrophic natural disaster, man-made disaster, terrorism event, or technological disaster by rendering LANL buildings, infrastructure, or Technical Areas unsafe, temporarily unusable, or inaccessible.« less

  19. Diffusion of a Concentrated Lattice Gas in a Regular Comb Structure

    NASA Astrophysics Data System (ADS)

    Garcia, Paul; Wentworth, Christopher

    2008-10-01

    Understanding diffusion in constrained geometries is of interest in a variety of contexts as varied as mass transport in disordered solids, such as a percolation cluster, or intercellular transport of water molecules in biological tissue. In this investigation we explore diffusion in a very simple constrained geometry: a comb-like structure involving a one-dimensional backbone of lattice sites with regularly spaced teeth of fixed length. The model considered assumes a fixed concentration of diffusing particles can hop to nearest-neighbor sites only, and they do not interact with each other except that double occupancy is not allowed. The system is simulated using a Monte Carlo simulation procedure. The mean-square displacement of a tagged particle is calculated from the simulation as a function of time. The simulation shows normal diffusive behavior after a period of anomalous diffusion that increases as the tooth size increases.

  20. Multipath Very-Simplified Estimate of Adversary Sequence Interruption v. 2.1

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Snell, Mark K.

    2017-10-10

    MP VEASI is a training tool that models physical protection systems for fixed sites using Adversary Sequence Diagrams (ASDs) and then uses the ASD to find most-vulnerable adversary paths through the ASD. The identified paths have the lowest Probability of Interruption among all the paths through the ASD.

Top