Shah, Ajit
2006-04-01
The elderly prison population is increasing and there is a significant amount of unidentified psychiatric morbidity among elderly prisoners. A sizeable number of elderly subjects are referred to regional forensic units. These units are able to provide advice but are reluctant to admit frail, physically ill and vulnerable elderly into their unit because the ward environment is considered inappropriate for them. A sizeable number of inpatients in medium and high secure units are elderly. This paper is an exploratory audit of referrals from a medium and high secure forensic psychiatry unit to a specialist consultation-only liaison old age psychiatry service, which was specifically developed to service the forensic unit. The demographic and clinical characteristics of the patients seen by this specialist service were similar to elderly inpatients in medium and high secure units. All referrals were judged to be appropriate and new management advice was provided in all cases. Main reasons for referral included diagnostic advice, placement advice and treatment advice. Establishing a diagnosis of dementia was considered important because Alzheimer's disease and Lewy body dementia can be treated with cholinesterase inhibitors. Placement advice was the most difficult to provide because of paucity of residential and nursing homes able and willing to accept patients with a forensic history. There is a need for a comprehensive model of specialist forensic old age psychiatry service at a regional or supraregional level. A consensus needs to be reached on the exact configuration of such a service.
Discharges to prison from medium secure psychiatric units in England and Wales.
Doyle, Michael; Coid, Jeremy; Archer-Power, Laura; Dewa, Lindsay; Hunter-Didrichsen, Alice; Stevenson, Rachel; Wainwright, Verity; Kallis, Costas; Ullrich, Simone; Shaw, Jenny
2014-09-01
Early findings from a national study of discharges from 32 National Health Service medium secure units revealed that nearly twice as many patients than expected were discharged back to prison. To compare the characteristics of those discharged back to prison with those discharged to the community, and consider the implications for ongoing care and risk. Prospective cohort follow-up design. All forensic patients discharged from 32 medium secure units across England and Wales over a 12-month period were identified. Those discharged to prison were compared with those who were discharged to the community. Nearly half of the individuals discharged to prison were diagnosed with a serious mental illness and over a third with schizophrenia. They were a higher risk, more likely to have a personality disorder, more symptomatic and less motivated than those discharged to the community. Findings suggest that alternative models of prison mental healthcare should be considered to reduce risks to the patient and the public. Royal College of Psychiatrists.
ERIC Educational Resources Information Center
Dolan, Mairead; Whitworth, Helen
2013-01-01
There is little literature on childhood sexual abuse in women seen by forensic services. A cohort of 225 cases of women seen by forensic services in a medium secure unit in the UK were examined, and childhood sexual abuse and non-childhood sexual abuse cases were compared. Over half the sample had a history of childhood sexual abuse, and 5.6% of…
20 CFR 655.731 - What is the first LCA requirement, regarding wages?
Code of Federal Regulations, 2014 CFR
2014-04-01
..., or other similar medium, within the 24-month period immediately preceding the filing of the employer... an agreement as authorized by section 233 of the Social Security Act, 42 U.S.C. 433 (i.e., an agreement establishing a totalization arrangement between the social security system of the United States...
20 CFR 655.731 - What is the first LCA requirement, regarding wages?
Code of Federal Regulations, 2012 CFR
2012-04-01
..., or other similar medium, within the 24-month period immediately preceding the filing of the employer... an agreement as authorized by section 233 of the Social Security Act, 42 U.S.C. 433 (i.e., an agreement establishing a totalization arrangement between the social security system of the United States...
20 CFR 655.731 - What is the first LCA requirement, regarding wages?
Code of Federal Regulations, 2011 CFR
2011-04-01
..., or other similar medium, within the 24-month period immediately preceding the filing of the employer... an agreement as authorized by section 233 of the Social Security Act, 42 U.S.C. 433 (i.e., an agreement establishing a totalization arrangement between the social security system of the United States...
20 CFR 655.731 - What is the first LCA requirement, regarding wages?
Code of Federal Regulations, 2013 CFR
2013-04-01
..., or other similar medium, within the 24-month period immediately preceding the filing of the employer... an agreement as authorized by section 233 of the Social Security Act, 42 U.S.C. 433 (i.e., an agreement establishing a totalization arrangement between the social security system of the United States...
Mezey, Gillian; Durkin, Catherine; Dodge, Liam; White, Sarah
2015-12-01
Absconds and escapes by psychiatric patients from secure forensic psychiatric settings create public anxiety and are poorly understood. To describe secure hospital patients who escape from within the secure perimeter or abscond, and test for differences between these groups. Escapes and absconds between 2008 and 2012 from the medium and low secure forensic psychiatric inpatient units of two London National Health Service Trusts were identified through the Trusts' databases. Demographic, offending, mental health and incident data were extracted from records for each. Seventy-seven incidents, involving 54 patients, were identified over the five years. These were 13 escapes involving 12 patients, representing a rate of 0.04 per 1000 bed days, and 64 absconds involving 42 patients, a rate of 0.26 per 1000 bed days; 15 (28%) patients were absent without leave more than once. Over half of the patients came back voluntarily within 24 hours of leaving. Over 50% of them had drunk alcohol or taken drugs while away from the unit. Escapees were more likely to be transferred prisoners and to have planned their escape, less likely to return to the unit voluntarily and away longer than patients who absconded. Offending was rare during unauthorised leave--just three offences among the 77 incidents; self-harm was more likely. Motives for absconding included: wanting freedom or drink or drugs, family worries and/or dissatisfaction with aspects of treatment. Escapes or absconding from secure healthcare units have different characteristics, but may best be prevented by convergent strategies. Relational security is likely to be as important for foiling plans for the former as it is for reducing boredom, building strong family support and managing substance misuse in the latter. Copyright © 2015 John Wiley & Sons, Ltd.
The Use of Clozapine in Adults with Intellectual Disability
ERIC Educational Resources Information Center
Thalayasingam, S.; Alexander, R. T.; Singh, I.
2004-01-01
There are not many studies on the use of clozapine in patients with intellectual disability (ID). The authors describe a case series of patients treated with clozapine, drawn from a medium secure unit, a low secure assessment and treatment service and a community team in the London region. A retrospective file-review of patients treated in these…
ERIC Educational Resources Information Center
Mansell, Jim; Ritchie, Fiona; Dyer, Ricinda
2010-01-01
Background: As institutions for people with intellectual disabilities have been replaced with community services, health care provision has developed to provide assessment and treatment, low and medium secure units for people with challenging behaviour or mental health problems. These include both public and private sector provision. Little is…
Survey of staff attitudes to the smoking ban in a medium secure unit.
Garg, Shruti; Shenoy, Suraj; Badee, May; Varghese, Joe; Quinn, Patrick; Kent, John
2009-10-01
The aim of this survey was to explore staff attitudes to the indoor smoking ban in a medium secure unit and to ascertain if they had experienced any difficulties in imposing the ban in the four months after its introduction. All staff members available on duty who agreed to participate in the survey were interviewed using a semi-structured questionnaire. The response rate was 65%. Sixty-four percent of the staff supported the smoking ban. Forty-three percent reported experiencing patient management problems with the majority complaining of increased patient aggression, increased use of staff time in supervising patients smoking. Additionally, supervising staff were still being exposed to passive smoking. Sixty-five percent reported positive effects due to the ban with the majority reporting that patients were sleeping at night due to the smoking area being closed at night. A significant proportion of the staff is still opposed to the smoking ban. Changing staff attitudes through educational programmes will be important in ensuring success of a possible future total ban in psychiatric units. 2009 Elsevier Ltd and Faculty of Forensic and Legal Medicine.
Walker, T; Edge, D; Shaw, J; Wilson, H; McNair, L; Mitchell, H; Gutridge, K; Senior, J; Sutton, M; Meacock, R; Abel, K
2017-11-01
WHAT IS KNOWN ON THE SUBJECT?: Three pilot UK-only Women's Enhanced Medium Secure Services (WEMSS) was opened in 2007 to support women's movement from high secure care and provide a bespoke, women-only service. Evidence suggests that women's secure services are particularly challenging environments to work in and staffing issues (e.g., high turnover) can cause difficulties in establishing a therapeutic environment. Research in this area has focused on the experiences of service users. Studies which have examined staff views have focused on their feelings towards women in their care and the emotional burden of working in women's secure services. No papers have made a direct comparison between staff working in different services. WHAT DOES THIS STUDY ADD TO EXISTING KNOWLEDGE?: This is the first study to explore the views and experiences of staff in the three UK WEMSS pilot services and contrast them with staff from women's medium secure services. Drawing upon data from eighteen semi-structured interviews (nine WEMSS, nine non-WEMSS), key themes cover staff perceptions of factors important for women's recovery and their views on operational aspects of services. This study extends our understanding of the experiences of staff working with women in secure care and bears relevance for staff working internationally, as well as in UK services. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: The study reveals the importance of induction and training for bank and agency staff working in women's secure services. Further, regular clinical supervision should be mandatory for all staff so they are adequately supported. Introduction Women's Enhanced Medium Secure Services (WEMSS) is bespoke, gender-sensitive services which opened in the UK in 2007 at three pilot sites. This study is the first of its kind to explore the experiences of WEMSS staff, directly comparing them to staff in a standard medium secure service for women. The literature to date has focused on the experiences of service users or staff views on working with women in secure care. Aim This qualitative study, embedded in a multimethod evaluation of WEMSS, aimed to explore the views and experiences of staff in WEMSS and comparator medium secure services. Methods Qualitative interviews took place with nine WEMSS staff and nine comparator medium secure staff. Interviews focused on factors important for recovery, barriers to facilitating recovery and operational aspects of the service. Discussion This study provides a rare insight into the perspectives of staff working in UK women's secure services, an under-researched area in the UK and internationally. Findings suggest that the success of services, including WEMSS, is compromised by operational factors such as the use of bank staff. Implications for practice Comprehensive training and supervision should be mandatory for all staff, so best practice is met and staff adequately supported. © 2017 John Wiley & Sons Ltd.
Dolan, Mairead; Blattner, Regine
2010-09-29
Structured Professional Judgment (SPJ) approaches to violence risk assessment are increasingly being adopted into clinical practice in international forensic settings. The aim of this study was to examine the predictive validity of the Historical Clinical Risk -20 (HCR-20) violence risk assessment scale for outcome following transfers from high to medium security in a United Kingdom setting. The sample was predominately male and mentally ill and the majority of cases were detained under the criminal section of the Mental Health Act (1986). The HCR-20 was rated based on detailed case file information on 72 cases transferred from high to medium security. Outcomes were examined, independent of risk score, and cases were classed as "success or failure" based on established criteria. The mean length of follow up was 6 years. The total HCR-20 score was a robust predictor of failure at lower levels of security and return to high security. The Clinical and Risk management items contributed most to predictive accuracy. Although the HCR-20 was designed as a violence risk prediction tool our findings suggest it has potential utility in decisions to transfer patients from high to lower levels of security.
Zhang, Li; Chen, Ying; Wang, Shu-tao; Men, Ming-xin; Xu, Hao
2015-08-01
Assessment and early warning of land ecological security (LES) in rapidly urbanizing coastal area is an important issue to ensure sustainable land use and effective maintenance of land ecological security. In this study, an index system for the land ecological security of Caofeidian new district was established based on the Pressure-State-Response (P-S-R) model. Initial assessment units of 1 km x 1 km created with the remote sensing data and GIS methods were spatially interpolated to a fine pixel size of 30 m x 30 m, which were combined with the early warning method (using classification tree method) to evaluate the land ecological security of Caofeidian in 2005 and 2013. The early warning level was classed into four categories: security with degradation potential, sub-security with slow degradation, sub-security with rapid degradation, and insecurity. Result indicated that, from 2005 to 2013, the average LES of Caofeidian dropped from 0.55 to 0.52, indicating a degradation of land ecological security from medium security level to medium-low security level. The areas at the levels of insecurity with rapid degradation were mainly located in the rapid urbanization areas, illustrating that rapid expansion of urban construction land was the key factor to the deterioration of the regional land ecological security. Industrial District, Shilihai town and Nanpu saltern, in which the lands at the levels of insecurity and sub-security with rapid degradation or slow degradation accounted for 58.3%, 98.9% and 81.2% of their respective districts, were at the stage of high early warning. Thus, land ecological security regulation for these districts should be strengthened in near future. The study could provide a reference for land use planning and ecological protection of Caofeidian new district.
Using safety crosses for patient self-reflection.
Silverton, Sarah
The Productive Mental Health Ward programme has been developed to improve efficiency and safety in the NHS. Patients in a medium-secure mental health unit used patient safety crosses as a tool for self-reflection as part of their recovery journey. This article describes how the project was set up as well as initial findings.
Milsom, Sophia A; Freestone, Mark; Duller, Rachel; Bouman, Marisa; Taylor, Celia
2014-04-01
Social climate has an influence on a number of treatment-related factors, including service users' behaviour, staff morale and treatment outcomes. Reliable assessment of social climate is, therefore, beneficial within forensic mental health settings. The Essen Climate Evaluation Schema (EssenCES) has been validated in forensic mental health services in the UK and Germany. Preliminary normative data have been produced for UK high-security national health services and German medium-security and high-security services. We aim to validate the use of the EssenCES scale (English version) and provide preliminary normative data in UK medium-security hospital settings. The EssenCES scale was completed in a medium-security mental health service as part of a service-wide audit. A total of 89 patients and 112 staff completed the EssenCES. The three-factor structure of the EssenCES and its internal construct validity were maintained within the sample. Scores from this medium-security hospital sample were significantly higher than those from earlier high-security hospital data, with three exceptions--'patient cohesion' according to the patients and 'therapeutic hold' according to staff and patients. Our data support the use of the EssenCES scale as a valid measure for assessing social climate within medium-security hospital settings. Significant differences between the means of high-security and medium-security service samples imply that degree of security is a relevant factor affecting the ward climate and that in monitoring quality of secure services, it is likely to be important to apply different scores to reflect standards. Copyright © 2013 John Wiley & Sons, Ltd.
ERIC Educational Resources Information Center
Ingalls, Lawrence; Hammond, Helen; Trussell, Robert P.
2011-01-01
This study investigated the past special education programs and services provided to children and youth who later became incarcerated. Participants in this study were inmates from a medium security state correctional facility in the southwest region of the United States. All inmates involved in this study were identified as having a disability and…
2011-01-01
Background The assessment of those presenting to prison in-reach and court diversion services and those referred for admission to mental health services is a triage decision, allocating the patient to the appropriate level of therapeutic security. This is a critical clinical decision. We set out to improve on unstructured clinical judgement. We collated qualitative information and devised an 11 item structured professional judgment instrument for this purpose then tested for validity. Methods All those assessed following screening over a three month period at a busy remand committals prison (n = 246) were rated in a retrospective cohort design blind to outcome. Similarly, all those admitted to a mental health service from the same prison in-reach service over an overlapping two year period were rated blind to outcome (n = 100). Results The 11 item scale had good internal consistency (Cronbach's alpha = 0.95) and inter-rater reliability. The scale score did not correlate with the HCR-20 'historical' score. For the three month sample, the receiver operating characteristic area under the curve (AUC) for those admitted to hospital was 0.893 (95% confidence interval 0.843 to 0.943). For the two year sample, AUC distinguished at each level between those admitted to open wards, low secure units or a medium/high secure service. Open wards v low secure units AUC = 0.805 (95% CI 0.680 to 0.930); low secure v medium/high secure AUC = 0.866, (95% CI 0.784 to 0.949). Item to outcome correlations were significant for all 11 items. Conclusions The DUNDRUM-1 triage security scale and its items performed to criterion levels when tested against the real world outcome. This instrument can be used to ensure consistency in decision making when deciding who to admit to secure forensic hospitals. It can also be used to benchmark admission thresholds between services and jurisdictions. In this study we found some divergence between assessed need and actual placement. This provides fertile ground for future research as well as practical assistance in assessing unmet need, auditing case mix and planning care pathways. PMID:21410967
ERIC Educational Resources Information Center
Duperouzel, Helen; Fish, Rebecca
2010-01-01
Background: This paper details the experiences of nine people with mild/moderate intellectual disability who self injure; looking beyond the clinical presentations in an attempt to capture the perceptions these people have of their care in a medium secure unit. Methods: A phenomenological approach was used, and during in-depth interviews, the…
Völlm, Birgit A; Edworthy, Rachel; Huband, Nick; Talbot, Emily; Majid, Shazmin; Holley, Jessica; Furtado, Vivek; Weaver, Tim; McDonald, Ruth; Duggan, Conor
2018-01-01
Background: Many patients experience extended stays within forensic care, but the characteristics of long-stay patients are poorly understood. Aims: To describe the characteristics of long-stay patients in high and medium secure settings in England. Method: Detailed file reviews provided clinical, offending and risk data for a large representative sample of 401 forensic patients from 2 of the 3 high secure settings and from 23 of the 57 medium secure settings in England on 1 April 2013. The threshold for long-stay status was defined as 5 years in medium secure care or 10 years in high secure care, or 15 years in a combination of high and medium secure settings. Results: 22% of patients in high security and 18% in medium security met the definition for "long-stay," with 20% staying longer than 20 years. Of the long-stay sample, 58% were violent offenders (22% both sexual and violent), 27% had been convicted for violent or sexual offences whilst in an institutional setting, and 26% had committed a serious assault on staff in the last 5 years. The most prevalent diagnosis was schizophrenia (60%) followed by personality disorder (47%, predominantly antisocial and borderline types); 16% were categorised as having an intellectual disability. Overall, 7% of the long-stay sample had never been convicted of any offence, and 16.5% had no index offence prompting admission. Although some significant differences were found between the high and medium secure samples, there were more similarities than contrasts between these two levels of security. The treatment pathways of these long-stay patients involved multiple moves between settings. An unsuccessful referral to a setting of lower security was recorded over the last 5 years for 33% of the sample. Conclusions: Long-stay patients accounted for one fifth of the forensic inpatient population in England in this representative sample. A significant proportion of this group remain unsettled. High levels of personality pathology and the risk of assaults on staff and others within the care setting are likely to impact on treatment and management. Further research into the treatment pathways of longer stay patients is warranted to understand the complex trajectories of this group.
Völlm, Birgit A.; Edworthy, Rachel; Huband, Nick; Talbot, Emily; Majid, Shazmin; Holley, Jessica; Furtado, Vivek; Weaver, Tim; McDonald, Ruth; Duggan, Conor
2018-01-01
Background: Many patients experience extended stays within forensic care, but the characteristics of long-stay patients are poorly understood. Aims: To describe the characteristics of long-stay patients in high and medium secure settings in England. Method: Detailed file reviews provided clinical, offending and risk data for a large representative sample of 401 forensic patients from 2 of the 3 high secure settings and from 23 of the 57 medium secure settings in England on 1 April 2013. The threshold for long-stay status was defined as 5 years in medium secure care or 10 years in high secure care, or 15 years in a combination of high and medium secure settings. Results: 22% of patients in high security and 18% in medium security met the definition for “long-stay,” with 20% staying longer than 20 years. Of the long-stay sample, 58% were violent offenders (22% both sexual and violent), 27% had been convicted for violent or sexual offences whilst in an institutional setting, and 26% had committed a serious assault on staff in the last 5 years. The most prevalent diagnosis was schizophrenia (60%) followed by personality disorder (47%, predominantly antisocial and borderline types); 16% were categorised as having an intellectual disability. Overall, 7% of the long-stay sample had never been convicted of any offence, and 16.5% had no index offence prompting admission. Although some significant differences were found between the high and medium secure samples, there were more similarities than contrasts between these two levels of security. The treatment pathways of these long-stay patients involved multiple moves between settings. An unsuccessful referral to a setting of lower security was recorded over the last 5 years for 33% of the sample. Conclusions: Long-stay patients accounted for one fifth of the forensic inpatient population in England in this representative sample. A significant proportion of this group remain unsettled. High levels of personality pathology and the risk of assaults on staff and others within the care setting are likely to impact on treatment and management. Further research into the treatment pathways of longer stay patients is warranted to understand the complex trajectories of this group. PMID:29713294
Howard, Rick; Khalifa, Najat; Duggan, Conor; Lumsden, John
2012-02-01
In 1999, the UK government initiated a programme for the assessment and treatment of individuals deemed to have 'dangerous and severe personality disorder' (DSPD). After over 10 years of specialist service development, it is not clear whether DSPD patients represent a distinct group. The aim of this study was to establish whether people admitted to DSPD hospital units could be distinguished in presentation or personality traits from people with personality disorder admitted to standard secure hospital services. Thirty-eight men detained in high-security hospital DSPD units were compared with 62 men detained in conventional medium or high security hospital units, using the Psychopathy Checklist-Revised (PCL-R) and other standard personality disorder, clinical and offending measures. Compared with their counterparts in standard services, the DSPD group had higher scores on PCL-R psychopathy, significantly more convictions before age 18 years, greater severity of institutional violence and more prior crimes of sexual violence. Regression analysis confirmed that only PCL-R Factor 1, reflecting core interpersonal and affective features of psychopathy, predicted group membership. The DSPD group emerged as having higher psychopathy scores, but as there is currently no evidence that the core personality features of psychopathy are amenable to treatment, there is little justification for treating high-psychopathy forensic patients differently from those with other disorders of personality. Copyright © 2011 John Wiley & Sons, Ltd.
2011-01-01
Background Moving a forensic mental health patient from one level of therapeutic security to a lower level or to the community is influenced by more than risk assessment and risk management. We set out to construct and validate structured professional judgement instruments for consistency and transparency in decision making Methods Two instruments were developed, the seven-item DUNDRUM-3 programme completion instrument and the six item DUNDRUM-4 recovery instrument. These were assessed for all 95 forensic patients at Ireland's only forensic mental health hospital. Results The two instruments had good internal consistency (Cronbach's alpha 0.911 and 0.887). Scores distinguished those allowed no leave or accompanied leave from those with unaccompanied leave (ANOVA F = 38.1 and 50.3 respectively, p < 0.001). Scores also distinguished those in acute/high security units from those in medium or in low secure/pre-discharge units. Each individual item distinguished these levels of need significantly. The DUNDRUM-3 and DUNDRUM-4 correlated moderately with measures of dynamic risk and with the CANFOR staff rated unmet need (Spearman r = 0.5, p < 0.001). Conclusions The DUNDRUM-3 programme completion items distinguished significantly between levels of therapeutic security while the DUNDRUM-4 recovery items consistently distinguished those given unaccompanied leave outside the hospital and those in the lowest levels of therapeutic security. This data forms the basis for a prospective study of outcomes now underway. PMID:21722396
Long, C G; Anagnostakis, K; Fox, E; Silaule, P; Somers, J; West, R; Webster, A
2011-07-01
Social climate has been measured in a variety of therapeutic settings, but there is little information about it in secure mental health services, or how it may vary along a gender specific care pathway. To assess social climate in women's secure wards and its variation by level of security and ward type, therapeutic alliance, patient motivation, treatment engagement and disturbed behaviour. Three-quarters (80, 76%) of staff and nearly all (65, 92%) of patients in the two medium-security wards and two low-security wards that comprised the unit completed the Essen Climate Evaluation Schema (EssenCES) and the California Psychotherapy Alliance Scale (CALPAS); patients also completed the Patient Motivation Inventory (PMI). Pre-assessment levels of disturbed behaviour and treatment engagement were recorded. Social climate varied according to ward type and level of security. EssenCES ratings indicative of positive social climate were associated with lower levels of security; such ratings were also associated with lower behavioural disturbance and with higher levels of motivation, treatment engagement and therapeutic alliance. This serial cross-sectional survey indicated that use of the EssenCES alone might be a good practical measure of treatment progress/responsivity. A longitudinal study would be an important next step in establishing the extent to which it would be useful in this regard. Copyright © 2010 John Wiley & Sons, Ltd.
76 FR 18264 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-01
..., Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy... resumption of quotations in a quotation medium by a broker-dealer for over-the- counter (``OTC'') securities... quotation for publication, in a quotation medium unless they have reviewed specified information concerning...
76 FR 32381 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-06
..., Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy... regulate the initiation or resumption of quotations in a quotation medium by a broker-dealer for over-the... security, or submitting a quotation for publication, in a quotation medium unless they have reviewed...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
Long-Term Outcome from a Medium Secure Service for People with Intellectual Disability
ERIC Educational Resources Information Center
Alexander, R. T.; Crouch, K.; Halstead, S.; Piachaud, J.
2006-01-01
Background: The purpose of this paper is to describe long-term outcomes for patients discharged over a 12-year period from a medium secure service for people with intellectual disabilities (ID). Methods: A cohort study using case-notes analysis and a structured interview of current key informants. Results: Eleven per cent of the sample was…
NASA Astrophysics Data System (ADS)
Möller, Thomas; Bellin, Knut; Creutzburg, Reiner
2015-03-01
The aim of this paper is to show the recent progress in the design and prototypical development of a software suite Copra Breeder* for semi-automatic generation of test methodologies and security checklists for IT vulnerability assessment in small and medium-sized enterprises.
[Ecological security early-warning in Zhoushan Islands based on variable weight model].
Zhou, Bin; Zhong, Lin-sheng; Chen, Tian; Zhou, Rui
2015-06-01
Ecological security early warning, as an important content of ecological security research, is of indicating significance in maintaining regional ecological security. Based on driving force, pressure, state, impact and response (D-P-S-I-R) framework model, this paper took Zhoushan Islands in Zhejiang Province as an example to construct the ecological security early warning index system, test degrees of ecological security early warning of Zhoushan Islands from 2000 to 2012 by using the method of variable weight model, and forecast ecological security state of 2013-2018 by Markov prediction method. The results showed that the variable weight model could meet the study needs of ecological security early warning of Zhoushan Islands. There was a fluctuant rising ecological security early warning index from 0.286 to 0.484 in Zhoushan Islands between year 2000 and 2012, in which the security grade turned from "serious alert" into " medium alert" and the indicator light turned from "orange" to "yellow". The degree of ecological security warning was "medium alert" with the light of "yellow" for Zhoushan Islands from 2013 to 2018. These findings could provide a reference for ecological security maintenance of Zhoushan Islands.
19. VIEW OF INTERIOR OF BUILDING 220 SECOND FLOOR, FROM ...
19. VIEW OF INTERIOR OF BUILDING 220 SECOND FLOOR, FROM THE FEMALE MEDIUM SECURITY AREA FACING THE FEMALE MEDIUM SECURITY SLEEPING AREA. THE FEMALE CELL BLOCK DOOR IN SHOWN ON THE RIGHT OF PHOTO. THE SLEEPING AREA IS IN THE CENTER OF PHOTO. - U.S. Naval Base, Pearl Harbor, Brig, Neville Way near Ninth Street at Marine Barracks, Pearl City, Honolulu County, HI
Health education needs of incarcerated women.
Dinkel, Shirley; Schmidt, Katie
2014-07-01
This study identifies the healthcare education needs of incarcerated women in a state corrections facility. This was a naturalistic qualitative study. Focus groups included two groups of adult women incarcerated in a state corrections facility. One group consisted of women housed in maximum security, and one group consisted of women housed in medium security. Data were analyzed using a constant comparison approach. Three guiding questions provided the foundation for the identified themes. Themes included six healthcare education topics important to incarcerated women and three related to health education strategies best suited for incarcerated women. Trust, respect and empowerment are key concepts in educating incarcerated women about their personal health and health of their families. With over 200,000 women incarcerated in the United States today, creating policies and practices that focus on the healthcare education needs of women that are woman focused may enhance knowledge and skills and may ultimately lead to reduced recidivism. © 2014 Sigma Theta Tau International.
Parenreng, Jumadi Mabe; Kitagawa, Akio
2018-05-17
Wireless Sensor Networks (WSNs) with limited battery, central processing units (CPUs), and memory resources are a widely implemented technology for early warning detection systems. The main advantage of WSNs is their ability to be deployed in areas that are difficult to access by humans. In such areas, regular maintenance may be impossible; therefore, WSN devices must utilize their limited resources to operate for as long as possible, but longer operations require maintenance. One method of maintenance is to apply a resource adaptation policy when a system reaches a critical threshold. This study discusses the application of a security level adaptation model, such as an ARSy Framework, for using resources more efficiently. A single node comprising a Raspberry Pi 3 Model B and a DS18B20 temperature sensor were tested in a laboratory under normal and stressful conditions. The result shows that under normal conditions, the system operates approximately three times longer than under stressful conditions. Maintaining the stability of the resources also enables the security level of a network's data output to stay at a high or medium level.
Kitagawa, Akio
2018-01-01
Wireless Sensor Networks (WSNs) with limited battery, central processing units (CPUs), and memory resources are a widely implemented technology for early warning detection systems. The main advantage of WSNs is their ability to be deployed in areas that are difficult to access by humans. In such areas, regular maintenance may be impossible; therefore, WSN devices must utilize their limited resources to operate for as long as possible, but longer operations require maintenance. One method of maintenance is to apply a resource adaptation policy when a system reaches a critical threshold. This study discusses the application of a security level adaptation model, such as an ARSy Framework, for using resources more efficiently. A single node comprising a Raspberry Pi 3 Model B and a DS18B20 temperature sensor were tested in a laboratory under normal and stressful conditions. The result shows that under normal conditions, the system operates approximately three times longer than under stressful conditions. Maintaining the stability of the resources also enables the security level of a network’s data output to stay at a high or medium level. PMID:29772773
Social problem-solving interventions in medium secure settings for women.
Long, C G; Fulton, B; Dolley, O; Hollin, C R
2011-10-01
Problem-solving interventions are a feature of overall medium secure treatment programmes. However, despite the relevance of such treatment to personality disorder there are few descriptions of such interventions for women. Beneficial effects for women who completed social problem-solving group treatment were evident on a number of psychometric assessments. A treatment non-completion rate of one-third raises questions of both acceptability and timing of cognitive behavioural interventions.
Okamoto, Eiji; Kato, Yoshikuni; Seino, Kazuyuki; Miura, Hidekazu; Shiraishi, Yasuyuki; Yambe, Tomoyuki; Mitamura, Yoshinori
2012-10-01
A transcutaneous communication system (TCS) is a key technology for monitoring and controlling artificial hearts and other artificial organs in the body. In this study, we developed a new TCS that uses the human body as a conductive medium. Direct data exchange provides a higher level of communication security compared to that of wireless methods without physical constraints such as an external wire. The external and internal units of the new TCS each consist mainly of a data transmitter and a data receiver. The data transmitter has an amplitude shift keying (ASK) modulator (carrier frequencies: 4 and 10 MHz) and an electrode. The ASK-modulated data current is led into the body through the electrode, and it flows back to the energy source through the body, the data receiver, and the earth ground that includes all conductors and dielectrics in the environment that are in close proximity to the patient. Performance of the TCS was evaluated by a communication test on the surface of the human body and in an animal experiment using a goat. The TCS was able to transmit data concurrently for 4 weeks between everywhere on the surface of the body and everywhere inside the body under full-duplex communication at a transmission rate of 115 kbps. The power consumption of each TCS unit was 125 mW with an ASK-modulated current of 7 mA (root-mean-square). While further study is required to secure its safety, the newly developed TCS has promise to be a next-generation transcutaneous communication device. © 2012, Copyright the Authors. Artificial Organs © 2012, International Center for Artificial Organs and Transplantation and Wiley Periodicals, Inc.
Vasudev, Kamini; Thakkar, Pratish B; Mitcheson, Nicola
2012-01-01
Patients with severe mental illness (SMI) treated with antipsychotic medication are at increased risk of metabolic side-effects like weight gain, diabetes mellitus and dyslipidaemia. This study aims to examine the feasibility of maintaining a physical health monitoring sheet in patients' records and its impact on physical health of patients with SMI, over a period of one year. A physical health monitoring sheet was introduced in all the patients' records on a 15-bedded male medium secure forensic psychiatric rehabilitation unit, as a prompt to regularly monitor physical health parameters. An audit cycle was completed over a one year period. The data between baseline and re-audit were compared. At baseline, 80 per cent of the patients were identified as smokers, 80 per cent had increased body mass index (BMI) and 87 per cent had raised cardiovascular risk over the next ten years. Appropriate interventions were offered to address the risks. At re-audit, the physical health monitoring sheets were up to date in 100 per cent of patients' records. The serum lipids and cardiovascular risk over the next ten years reduced over time. No significant change was noted on the parameters including BMI, central obesity, high blood pressure and smoking status. This was a pilot study and was limited by the small sample size, male gender only and the specific nature of the ward. There is a need for improved access to physical health care in long-stay psychiatric settings. A more robust lifestyle modification programme is required to positively influence the physical health parameters in this cohort of patients. Introduction of a physical health monitoring sheet in patients' records led to regular screening of cardiovascular risks and subsequent increased prescribing of hypolipidaemic agents in individuals with severe mental illness.
Parrott, Fiona R
2010-12-01
Research into the character of social relationships in psychiatric inpatient facilities has focused on face-to-face interaction between individuals and within groups in the communal areas of wards. Using theories developed in material culture and media studies, this article argues that patients' relationships to goods, namely, photographs, cards and gifts from family or friends, televisions and radios, are important mediators and constituents of sociability. In an ethnographic study of a medium-secure psychiatric unit, I show how these goods are put to use in private space in ways that reflect and mitigate the constraints of incarceration and stigmatization. The data were derived from 3 months of participant observation on a male and a female ward at a unit in the south of England, including a series of anthropological interviews with 19 patients. This article highlights two important findings. First, potentially isolating activities are perceived by patients as sociable, in that watching television and looking at photographs in their room helps to counter feelings of loneliness and isolation. Second, potentially sociable activities, exchanging goods or watching the communal television, are often practiced in such a way as to maintain distance between patients in acknowledgment of the constrained and volatile nature of these relationships. This suggests that patients aspire to retain a sense of the artificiality of their situation, preferring to confine their notion of 'real' relationships to those that exist outside the institution.
[THE ACTUAL APPROACHES TO PROBLEM OF IMPORT SUBSTITUTION IN TH FIELD OF PRODUCTION GROWTH MEDIUM].
Shepelin, A P; Domotenko, L V; Diatlov, I A; Mironov, A Yu; Aleshkin, V A
2015-06-01
The import substitution becomes one of strategic tasks of Russian economy as a result of imposition of economic sanctions on part of the USA, EU countries, Japan and number of other states. The development of structure and technology of production of national import substituted growth mediums permits satisfying needs of laboratory service of Russia inactive storage and to secure appropriate response to occurring challenges and new biological menaces and support bio-security of state at proper level. The presented data concerning substantiation of nomenclature of growth mediums and transport system permit satisfying in fullness the needs of clinical and sanitary microbiology in growth mediums of national production and to give up of import deliveries without decreasing of quality of microbiological studies.
20 CFR 416.966 - Work which exists in the national economy.
Code of Federal Regulations, 2013 CFR
2013-04-01
.... 416.966 Section 416.966 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses prepared for the Social Security Administration by various...
20 CFR 416.966 - Work which exists in the national economy.
Code of Federal Regulations, 2014 CFR
2014-04-01
.... 416.966 Section 416.966 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses prepared for the Social Security Administration by various...
20 CFR 416.966 - Work which exists in the national economy.
Code of Federal Regulations, 2011 CFR
2011-04-01
.... 416.966 Section 416.966 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses prepared for the Social Security Administration by various...
20 CFR 416.966 - Work which exists in the national economy.
Code of Federal Regulations, 2012 CFR
2012-04-01
.... 416.966 Section 416.966 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses prepared for the Social Security Administration by various...
49 CFR 1542.211 - Identification systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... secured area or SIDA continuously displays the identification medium issued to that individual on the... individual who has authorized unescorted access to secured areas and SIDA's to ascertain the authority of any... approved identification media. The procedure must— (1) Apply uniformly in secured areas, SIDAs, and...
20 CFR 416.966 - Work which exists in the national economy.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... 416.966 Section 416.966 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses prepared for the Social Security Administration by various...
49 CFR 1542.211 - Identification systems.
Code of Federal Regulations, 2014 CFR
2014-10-01
... secured area or SIDA continuously displays the identification medium issued to that individual on the... individual who has authorized unescorted access to secured areas and SIDA's to ascertain the authority of any... approved identification media. The procedure must— (1) Apply uniformly in secured areas, SIDAs, and...
49 CFR 1542.211 - Identification systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... secured area or SIDA continuously displays the identification medium issued to that individual on the... individual who has authorized unescorted access to secured areas and SIDA's to ascertain the authority of any... approved identification media. The procedure must— (1) Apply uniformly in secured areas, SIDAs, and...
49 CFR 1542.211 - Identification systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... secured area or SIDA continuously displays the identification medium issued to that individual on the... individual who has authorized unescorted access to secured areas and SIDA's to ascertain the authority of any... approved identification media. The procedure must— (1) Apply uniformly in secured areas, SIDAs, and...
49 CFR 1542.211 - Identification systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... secured area or SIDA continuously displays the identification medium issued to that individual on the... individual who has authorized unescorted access to secured areas and SIDA's to ascertain the authority of any... approved identification media. The procedure must— (1) Apply uniformly in secured areas, SIDAs, and...
Code of Federal Regulations, 2011 CFR
2011-07-01
... from a bookstore. (2) At medium security, high security, and administrative institutions, an inmate may... security, good order, or discipline of the institution or if it might facilitate criminal activity. The..., social or sexual, or because its content is unpopular or repugnant. Publications which may be rejected by...
Code of Federal Regulations, 2010 CFR
2010-07-01
... from a bookstore. (2) At medium security, high security, and administrative institutions, an inmate may... security, good order, or discipline of the institution or if it might facilitate criminal activity. The..., social or sexual, or because its content is unpopular or repugnant. Publications which may be rejected by...
Code of Federal Regulations, 2014 CFR
2014-07-01
... from a bookstore. (2) At medium security, high security, and administrative institutions, an inmate may... security, good order, or discipline of the institution or if it might facilitate criminal activity. The..., social or sexual, or because its content is unpopular or repugnant. Publications which may be rejected by...
Code of Federal Regulations, 2013 CFR
2013-07-01
... from a bookstore. (2) At medium security, high security, and administrative institutions, an inmate may... security, good order, or discipline of the institution or if it might facilitate criminal activity. The..., social or sexual, or because its content is unpopular or repugnant. Publications which may be rejected by...
Code of Federal Regulations, 2012 CFR
2012-07-01
... from a bookstore. (2) At medium security, high security, and administrative institutions, an inmate may... security, good order, or discipline of the institution or if it might facilitate criminal activity. The..., social or sexual, or because its content is unpopular or repugnant. Publications which may be rejected by...
Where "Old Heads" Prevail: Inmate Hierarchy in a Men's Prison Unit.
Kreager, Derek A; Young, Jacob T N; Haynie, Dana L; Bouchard, Martin; Schaefer, David R; Zajac, Gary
2017-01-01
Research of inmate social order is a once-vibrant area that receded just as American incarceration rates climbed and the country's carceral contexts dramatically changed. This study reengages inmate society with an abductive mixed methods investigation of informal status within a contemporary men's prison unit. The authors collect narrative and social network data from 133 male inmates housed in a unit of a Pennsylvania medium-security prison. Analyses of inmate narratives suggest that unit "old heads" provide collective goods in the form of mentoring and role modeling that foster a positive and stable peer environment. This hypothesis is then tested with Exponential Random Graph Models (ERGMs) of peer nomination data. The ERGM results complement the qualitative analysis and suggest that older inmates and those who have been on the unit longer are perceived by their peers as powerful and influential. Both analytical strategies point to the maturity of aging and the acquisition of local knowledge as important for attaining informal status in the unit. In sum, this mixed methods case study extends theoretical insights of classic prison ethnographies, adds quantifiable results capable of future replication, and points to a growing population of older inmates as important for contemporary prison social organization.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... Public Comments Regarding Small and Medium Enterprises' Understanding of and Compliance With the Export Administration Regulations AGENCY: Bureau of Industry and Security, Commerce. ACTION: Notice of Inquiry. SUMMARY... the public regarding small and medium enterprises' (SMEs) understanding of and compliance with export...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for...: Security threat assessments for cargo personnel in the United States. This section applies in the United...— (1) Each individual must successfully complete a security threat assessment or comparable security...
2002-06-01
NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS WHAT PRACTICES IN AIRPORT SECURITY SHOULD THE UNITED STATES IMPLEMENT AT...COVERED Master’s Thesis 4. TITLE AND SUBTITLE What Practices in Airport Security Should the United States Implement at Commercial...complacency and conflicts of interest. 14. SUBJECT TERMS Airport Security , Aviation Security Systems, Terrorism, Hijacking
Reconviction and revocation rates in Flanders after medium security treatment.
Jeandarme, Inge; Habets, Petra; Oei, T I; Bogaerts, Stefan
2016-01-01
To examine the criminal outcome of Flemish forensic psychiatric patients ('internees') after medium security treatment. Also, the effect of conditional release on recidivism of two subgroups (internees under conditional release and internees who received unconditional release) was examined. Reconviction rates and revocation rates were collected for all participants. Kaplan-Meier survival analyses were used to investigate recidivism rates while controlling for time at risk. During the 10-year period, 502 offenders were discharged from medium security treatment. Over a follow-up period averaging 3.6years, 7.4% of discharged patients were reconvicted or received a new 'not guilty by reason of insanity' (NGRI) verdict for a violent offence. One-quarter of the population had their conditional release revoked. Part of the study population was granted unconditional release. Reconviction rates were higher after unconditional release in comparison to conditional release. The results of this study suggest that the court supervision of NGRI patients in Flanders is effective in protecting the community from further offending. Copyright © 2016 Elsevier Ltd. All rights reserved.
The strategic measures for the industrial security of small and medium business.
Lee, Chang-Moo
2014-01-01
The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-08
... Rule 5.2(j)(3), the Exchange's listing standards for Investment Company Units (``Units'').\\3\\ \\3\\ An Investment Company Unit is a security that represents an interest in a registered investment company that... of securities (or holds securities in another registered investment company that holds securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-09
... 1974; Department of Homeland Security/United States Citizenship and Immigration Services--DHS/USCIS-011... ``Department of Homeland Security/United States Citizenship and Immigration Services--011 E- Verify Program System of Records.'' The United States Citizenship and Immigration Services E-Verify Program allows...
42 CFR 37.41 - Chest roentgenogram specifications.
Code of Federal Regulations, 2011 CFR
2011-10-01
... source or focal spot to film distance shall be at least 6 feet; (3) Medium speed film and medium speed..., latitude and quantum mottle similar to those of systems designated as “medium speed” may be employed; (4... at which it is made, the social security number of the miner, and the date of the roentgenogram. No...
42 CFR 37.41 - Chest roentgenogram specifications.
Code of Federal Regulations, 2012 CFR
2012-10-01
... source or focal spot to film distance shall be at least 6 feet; (3) Medium speed film and medium speed..., latitude and quantum mottle similar to those of systems designated as “medium speed” may be employed; (4... at which it is made, the social security number of the miner, and the date of the roentgenogram. No...
42 CFR 37.41 - Chest roentgenogram specifications.
Code of Federal Regulations, 2010 CFR
2010-10-01
... source or focal spot to film distance shall be at least 6 feet; (3) Medium speed film and medium speed..., latitude and quantum mottle similar to those of systems designated as “medium speed” may be employed; (4... at which it is made, the social security number of the miner, and the date of the roentgenogram. No...
Unbalanced Stability: Applying Lessons from American Cities in Stability Operations
2011-05-19
teenagers congregating on street corners, public solicitation for prostitution, begging, public drinking, verbal harassment of women on the street, and...United Nations Security Council, “United Nations Security Council Resolution 1590 (2005).” http://www.un.org/ga/search/view_doc.asp?symbol=S/RES/ 1590 (2005...Security Council. “United Nations Security Council Resolution 1590 (2005).” United Nations. http://www.un.org/ga/search/view_doc.asp?symbol=S/RES/ 1590
31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.
Code of Federal Regulations, 2010 CFR
2010-07-01
... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities of the United States. The existing distinctive papers shall be used for the printing of interest...
Where “Old Heads” Prevail: Inmate Hierarchy in a Men’s Prison Unit*
Kreager, Derek A.; Young, Jacob T.N.; Haynie, Dana L.; Bouchard, Martin; Schaefer, David R.; Zajac, Gary
2017-01-01
Research of inmate social order is a once-vibrant area that receded just as American incarceration rates climbed and the country’s carceral contexts dramatically changed. This study reengages inmate society with an abductive mixed methods investigation of informal status within a contemporary men’s prison unit. The authors collect narrative and social network data from 133 male inmates housed in a unit of a Pennsylvania medium-security prison. Analyses of inmate narratives suggest that unit “old heads” provide collective goods in the form of mentoring and role modeling that foster a positive and stable peer environment. This hypothesis is then tested with Exponential Random Graph Models (ERGMs) of peer nomination data. The ERGM results complement the qualitative analysis and suggest that older inmates and those who have been on the unit longer are perceived by their peers as powerful and influential. Both analytical strategies point to the maturity of aging and the acquisition of local knowledge as important for attaining informal status in the unit. In sum, this mixed methods case study extends theoretical insights of classic prison ethnographies, adds quantifiable results capable of future replication, and points to a growing population of older inmates as important for contemporary prison social organization. PMID:29540904
9 CFR 205.105 - Master list and portion thereof distributed to registrants-format.
Code of Federal Regulations, 2011 CFR
2011-01-01
... product to a security interest (see § 205.102), in numerical order by social security number or approved... equipment. The system may, however, honor requests from registrants to substitute recordings on any medium...
9 CFR 205.105 - Master list and portion thereof distributed to registrants-format.
Code of Federal Regulations, 2014 CFR
2014-01-01
... product to a security interest (see § 205.102), in numerical order by social security number or approved... equipment. The system may, however, honor requests from registrants to substitute recordings on any medium...
9 CFR 205.105 - Master list and portion thereof distributed to registrants-format.
Code of Federal Regulations, 2012 CFR
2012-01-01
... product to a security interest (see § 205.102), in numerical order by social security number or approved... equipment. The system may, however, honor requests from registrants to substitute recordings on any medium...
9 CFR 205.105 - Master list and portion thereof distributed to registrants-format.
Code of Federal Regulations, 2013 CFR
2013-01-01
... product to a security interest (see § 205.102), in numerical order by social security number or approved... equipment. The system may, however, honor requests from registrants to substitute recordings on any medium...
9 CFR 205.105 - Master list and portion thereof distributed to registrants-format.
Code of Federal Regulations, 2010 CFR
2010-01-01
... product to a security interest (see § 205.102), in numerical order by social security number or approved... equipment. The system may, however, honor requests from registrants to substitute recordings on any medium...
Data Encoding using Periodic Nano-Optical Features
NASA Astrophysics Data System (ADS)
Vosoogh-Grayli, Siamack
Successful trials have been made through a designed algorithm to quantize, compress and optically encode unsigned 8 bit integer values in the form of images using Nano optical features. The periodicity of the Nano-scale features (Nano-gratings) have been designed and investigated both theoretically and experimentally to create distinct states of variation (three on states and one off state). The use of easy to manufacture and machine readable encoded data in secured authentication media has been employed previously in bar-codes for bi-state (binary) models and in color barcodes for multiple state models. This work has focused on implementing 4 states of variation for unit information through periodic Nano-optical structures that separate an incident wavelength into distinct colors (variation states) in order to create an encoding system. Compared to barcodes and magnetic stripes in secured finite length storage media the proposed system encodes and stores more data. The benefits of multiple states of variation in an encoding unit are 1) increased numerically representable range 2) increased storage density and 3) decreased number of typical set elements for any ergodic or semi-ergodic source that emits these encoding units. A thorough investigation has targeted the effects of the use of multi-varied state Nano-optical features on data storage density and consequent data transmission rates. The results show that use of Nano-optical features for encoding data yields a data storage density of circa 800 Kbits/in2 via the implementation of commercially available high resolution flatbed scanner systems for readout. Such storage density is far greater than commercial finite length secured storage media such as Barcode family with maximum practical density of 1kbits/in2 and highest density magnetic stripe cards with maximum density circa 3 Kbits/in2. The numerically representable range of the proposed encoding unit for 4 states of variation is [0 255]. The number of typical set elements for an ergodic source emitting the optical encoding units compared to a bi-state encoding unit (bit) shows a 36 orders of magnitude decrease for the error probability interval of [0 0.01]. The algorithms for the proposed encoding system have been implemented in MATLAB and the Nano-optical structures have been fabricated using Electron Beam Lithography on optical medium.
Psychiatric diagnosis and differential risks of offending following discharge.
Coid, Jeremy W; Yang, Min; Ullrich, Simone; Hickey, Nicole; Kahtan, Nadji; Freestone, Mark
2015-01-01
Psychiatric diagnosis is not considered a risk factor for offending following discharge. However, treatment interventions and aftercare are strongly influenced by clinical primary diagnosis. We compared differential risks of reoffending of patients falling into six primary diagnostic categories following discharge from Medium Secure Units in the UK: schizophrenia/schizoaffective disorder; delusional disorder; mania/hypomania; depressive disorder; organic brain syndrome; personality disorder. We followed up 1344 patients, on average 6.2 years (SD=2.1) at risk, discharged from 7 of 14 Regional Medium Secure services in England and Wales. Outcomes were period prevalence, incidence, and cumulative probability of criminal conviction. Established demographic and criminal history predictors of reoffending were observed across different diagnostic categories. Risks of all offending were increased for personality disorder, violence/acquisitive offending for delusional disorder, sexual offending for mania/hypomania and violence/acquisitive offending for organic brain syndrome. Patterns of risk over time differed markedly between categories of mental disorder. Most patients with personality disorder who offended violently did so within 4 years of discharge. A subgroup with delusional disorder demonstrated increased risk of violent offending 5 years after discharge. Differential risks of reoffending are observed between different diagnostic groups. Clinical diagnosis should be included together with established risk measures in risk management following discharge. Close supervision of patients with personality disorder should begin immediately after discharge when risks of reoffending are greatest. For delusional disorder further investigation is needed into the marked increase in risk of violence after 5 years. Copyright © 2015 Elsevier Ltd. All rights reserved.
Qi, Xiaoxing; Liu, Liming; Liu, Yabin; Yao, Lan
2013-06-01
Integrated food security covers three aspects: food quantity security, food quality security, and sustainable food security. Because sustainable food security requires that food security must be compatible with sustainable development, the risk assessment of sustainable food security is becoming one of the most important issues. This paper mainly focuses on the characteristics of sustainable food security problems in the major grain-producing areas in China. We establish an index system based on land resources and eco-environmental conditions and apply a dynamic assessment method based on status assessments and trend analysis models to overcome the shortcomings of the static evaluation method. Using fuzzy mathematics, the risks are categorized into four grades: negligible risk, low risk, medium risk, and high risk. A case study was conducted in one of China's major grain-producing areas: Dongting Lake area. The results predict that the status of the sustainable food security in the Dongting Lake area is unsatisfactory for the foreseeable future. The number of districts at the medium-risk range will increase from six to ten by 2015 due to increasing population pressure, a decrease in the cultivated area, and a decrease in the effective irrigation area. Therefore, appropriate policies and measures should be put forward to improve it. The results could also provide direct support for an early warning system-which could be used to monitor food security trends or nutritional status so to inform policy makers of impending food shortages-to prevent sustainable food security risk based on some classical systematic methods. This is the first research of sustainable food security in terms of risk assessment, from the perspective of resources and the environment, at the regional scale.
NASA Astrophysics Data System (ADS)
Rangga, K. K.; Syarief, Y. A.
2018-03-01
The objectives of this study are to study the participation of paddy farmers in the Special Effort program to increase paddy production, to study the level of household food security of paddy farmers, and to analyze the correlation between farmer participation and food security level of paddy farmers. The location was chosen purposively in Seputih Raman sub-district. The data were collected from December 2016 to February 2017. The population of this study was paddy farmers who participating in Special Effort program. The hypothesis was tested by using Spearman’s Rank correlation test. Farmer household’s food security was measured objectively based on the share of household’s food expenditure and subjectively based on the opinion, views, and attitudes or farmers’ opinions on food availability, food distribution, and household food consumption. This research showed that farmers’ participation in Special Effort program in Seputih Raman Sub Ditrict, Central Lampung Regency belonged to medium classification, household food security either objectively or subjectively was in food resistant condition of medium classification, and there was significant correlation between farmers’ participation and food security level of paddy farmer household.
Health Information Security in Hospitals: the Application of Security Safeguards.
Mehraeen, Esmaeil; Ayatollahi, Haleh; Ahmadi, Maryam
2016-02-01
A hospital information system has potentials to improve the accessibility of clinical information and the quality of health care. However, the use of this system has resulted in new challenges, such as concerns over health information security. This paper aims to assess the status of information security in terms of administrative, technical and physical safeguards in the university hospitals. This was a survey study in which the participants were information technology (IT) managers (n=36) who worked in the hospitals affiliated to the top ranked medical universities (university A and university B). Data were collected using a questionnaire. The content validity of the questionnaire was examined by the experts and the reliability of the questionnaire was determined using Cronbach's coefficient alpha (α=0.75). The results showed that the administrative safeguards were arranged at a medium level. In terms of the technical safeguards and the physical safeguards, the IT managers rated them at a strong level. According to the results, among three types of security safeguards, the administrative safeguards were assessed at the medium level. To improve it, developing security policies, implementing access control models and training users are recommended.
The Strategic Measures for the Industrial Security of Small and Medium Business
Lee, Chang-Moo
2014-01-01
The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures. PMID:24955414
78 FR 29147 - 30-Day Notice and Request for Comments
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
... DEPARTMENT OF HOMELAND SECURITY United States Secret Service 30-Day Notice and Request for... Management and Budget, Attn: Desk Officer for United States Secret Service, Department of Homeland Security... directed to: United States Secret Service, Security Clearance Division, Attn: ASAIC Michael Smith...
Wireless networks of opportunity in support of secure field operations
NASA Astrophysics Data System (ADS)
Stehle, Roy H.; Lewis, Mark
1997-02-01
Under funding from the Defense Advanced Research Projects Agency (DARPA) for joint military and law enforcement technologies, demonstrations of secure information transfer in support of law enforcement and military operations other than war, using wireless and wired technology, were held in September 1996 at several locations in the United States. In this paper, the network architecture, protocols, and equipment supporting the demonstration's scenarios are presented, together with initial results, including lessons learned and desired system enhancements. Wireless networks of opportunity encompassed in-building (wireless-LAN), campus-wide (Metricom Inc.), metropolitan (AMPS cellular, CDPD), and national (one- and two-way satellite) systems. Evolving DARPA-sponsored packet radio technology was incorporated. All data was encrypted, using multilevel information system security initiative (MISSI)FORTEZZA technology, for carriage over unsecured and unclassified commercial networks. The identification and authentication process inherent in the security system permitted logging for database accesses and provided an audit trail useful in evidence gathering. Wireless and wireline communications support, to and between modeled crisis management centers, was demonstrated. Mechanisms for the guarded transport of data through the secret-high military tactical Internet were included, to support joint law enforcement and crisis management missions. A secure World Wide Web (WWW) browser forms the primary, user-friendly interface for information retrieval and submission. The WWW pages were structured to be sensitive to the bandwidth, error rate, and cost of the communications medium in use (e.g., the use of and resolution for graphical data). Both still and motion compressed video were demonstrated, along with secure voice transmission from laptop computers in the field. Issues of network bandwidth, airtime costs, and deployment status are discussed.
2014-02-13
sterile water. Culture medium was prepared with 70% Leibovitz’s L15 medium, 18% Grace’s Insect Medium, 12% fetal bovine serum (FBS), 3.4 mg/mL yeast...SECURITY CLASSIFICATION OF: The project goal was to exploit insect cell culture and tissue engineering approaches to generate biological actuators...utilizing the unique hardiness and longevity of insect cell sources for device applications for robotics. In contrast to mammalian cells and tissues
Retirement and health benefits for Mexican migrant workers returning from the United States
Aguila, Emma; Zissimopoulos, Julie
2013-01-01
In the absence of a bilateral agreement for the portability and totalization of social security contributions between the United States and Mexico, this article examines the access to pension and health insurance benefits and employment status of older Mexican return migrants. We find that return migrants who have spent less than a year in the United States have a similar level of access to social security benefits as non-migrants. Return migrants who have spent at least a year in the United States are less likely to have public health insurance or social security benefits, and could be more vulnerable to poverty in old age. These results inform the debate on a bilateral social security agreement between the United States and Mexico to improve return migrants’ social security. PMID:23750049
Code of Federal Regulations, 2010 CFR
2010-01-01
... the act or process by which information is determined to be classified information. Classification... and Security Officer. Document means the physical medium on or in which information is recorded, or a... facts, data, or knowledge itself, as opposed to the medium in which it is contained. Interagency...
The ethical aspects of regulating production.
Swanson, J C
2008-02-01
Polls and surveys conducted within the United States show general agreement that there is public support for the protection of farm livestock and poultry. Concurrent with the growing public sentiment is the recent adoption of socially responsible corporate policies by major food retailers relative to animal welfare. The animal welfare assurance and audit programs developed by the private sector are an attempt to assure consumers that best practice measures and independent oversight result in a reasonable quality of life for food-producing animals. These programs represent voluntary self-regulation and arguably a market-based approach to secure the welfare of food-producing animals. Animal advocacy organizations historically seek regulatory oversight of animal care practice. Legislative routes that require government promulgation and enforcement of animal care regulations represent an involuntary form of animal welfare assurance. There are ethical considerations concerning the employment of voluntary or involuntary regulation of the welfare of food-producing animals. For example, degree of public endangerment, economic impact, viability of small to medium producers, food price, food quality, and food security are prominent among the ethical considerations in deliberating whether to impose regulatory mandates on production. In either regulatory approach, the public must be convinced that the welfare of food-producing animals can be secured in a transparent and convincing manner.
Treatment needs of prisoners with psychiatric disorders.
Gunn, J; Maden, A; Swinton, M
1991-01-01
OBJECTIVE--To describe the prevalence of psychiatric disorder and the treatment needs of sentenced prisoners in England and Wales. DESIGN--Population survey based on a 5% sample of men serving prison sentences. SETTING--Sixteen prisons for adult males and nine institutions for male young offenders representative of all prisons in prison type, security levels, and length of sentences. SUBJECTS--406 young offenders and 1478 adult men, 404 and 1365 of whom agreed to be interviewed. MAIN OUTCOME MEASURES--History of psychiatric disorder, clinical diagnosis of psychiatrist, and required treatment. RESULTS--652 (37%) men had psychiatric disorders diagnosed, of whom 15 (0.8%) had organic disorders, 34 (2%) psychosis, 105 (6%) neurosis, 177 (10%) personality disorder, and 407 (23%) substance misuse. 52 (3%) were judged to require transfer to hospital for psychiatric treatment, 96 (5%) required treatment in a therapeutic community setting, and a further 176 (10%) required further psychiatric assessment or treatment within prison. CONCLUSIONS--By extrapolation the sentenced prison population includes over 700 men with psychosis, and around 1100 who would warrant transfer to hospital for psychiatric treatment. Provision of secure treatment facilities, particularly long term medium secure units, needs to be improved. Services for people with personality, sexual, and substance misuse disorders should be developed in both prisons and the health service. PMID:1912775
77 FR 55777 - Security Zones; Dignitary Arrival/Departure and United Nations Meetings, New York, NY
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-11
... 1625-AA87 Security Zones; Dignitary Arrival/Departure and United Nations Meetings, New York, NY AGENCY... a permanent security zone on the waters of the East River and Bronx Kill, in the vicinity of... security zone on the East River, New York; and clarify the enforcement times and locations of the security...
Computing Game-Theoretic Solutions for Security in the Medium Term
This project concerns the design of algorithms for computing game- theoretic solutions . (Game theory concerns how to act in a strategically optimal...way in environments with other agents who also seek to act optimally but have different , and possibly opposite, interests .) Such algorithms have...recently found application in a number of real-world security applications, including among others airport security, scheduling Federal Air Marshals, and
49 CFR 1554.101 - Security Measures.
Code of Federal Regulations, 2014 CFR
2014-10-01
... certificated repair stations located— (1) On airport. On an air operations area or security identification display area of an airport covered by an airport security program under 49 CFR part 1542 in the United States, or on the security restricted area of any commensurate airport outside the United States...
Rule to finalize standards for medium- and heavy-duty vehicles that would improve fuel efficiency and cut carbon pollution to reduce the impacts of climate change, while bolstering energy security and spurring manufacturing innovation.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-16
... 1974; Department of Homeland Security United States Citizenship and Immigration Services--DHS/USCIS... of Homeland Security/ United States Citizenship and Immigration Services--SORN DHS/USCIS--013 E-Verify Self Check System of Records.'' The U.S. Citizenship and Immigration Services E-Verify Self Check...
Analysis of the Strategy to Combat Maritime Piracy
2009-12-11
26 Contemporary Maritime Piracy: Causative Factors...NSC National Security Council PUC Persons Under Control viii SLOC Sea lines of communication SSA Ships Security Assessment SSP Ships Security Plan...UNCLOS United Nations Convention on the Law of the Sea USD United States Dollar U.S. United States ix ILLUSTRATIONS Page Figure 1. Factors
6 CFR 13.45 - Deposit in Treasury of United States.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Deposit in Treasury of United States. 13.45 Section 13.45 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.45 Deposit in Treasury of United States. All amounts collected pursuant to this part...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-18
... 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary Database System of... Security/United States Coast Guard-024 Auxiliary Database (AUXDATA) System of Records.'' This system of... titled, ``DHS/USCG-024 Auxiliary Database (AUXDATA) System of Records.'' The AUXDATA system is the USCG's...
Enhancing National Security in Jamaica Through the Development and Employment of Special Forces
2005-06-01
face Jamaica. This study examines the value, utility, and possible roles of such a unit in the Jamaican security landscape, and makes recommendations...and possible roles of such a unit in the Jamaican security landscape, and makes recommendations for the establishment and employment of such a unit...
48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., helicopters, and other military vehicles operated by Contractors performing private security functions; and... Private Security Functions Outside the United States. 52.225-26 Section 52.225-26 Federal Acquisition... CONTRACT CLAUSES Text of Provisions and Clauses 52.225-26 Contractors Performing Private Security Functions...
48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., helicopters, and other military vehicles operated by Contractors performing private security functions; and... Private Security Functions Outside the United States. 52.225-26 Section 52.225-26 Federal Acquisition... CONTRACT CLAUSES Text of Provisions and Clauses 52.225-26 Contractors Performing Private Security Functions...
20 CFR 404.1901 - Introduction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... social security system of the United States and the social security system of a foreign country. An... be based on a combination of a person's periods of coverage under the social security system of the United States and the social security system of the foreign country. An agreement also provides for the...
20 CFR 404.1566 - Work which exists in the national economy.
Code of Federal Regulations, 2014 CFR
2014-04-01
.... 404.1566 Section 404.1566 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses, prepared for the Social Security Administration by various...
20 CFR 404.1566 - Work which exists in the national economy.
Code of Federal Regulations, 2011 CFR
2011-04-01
.... 404.1566 Section 404.1566 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses, prepared for the Social Security Administration by various...
20 CFR 416.945 - Your residual functional capacity.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Your residual functional capacity. 416.945 Section 416.945 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE... disorder may be fully capable of the physical demands consistent with those of sustained medium work...
20 CFR 416.969a - Exertional and nonexertional limitations.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Exertional and nonexertional limitations. 416.969a Section 416.969a Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME... of jobs by various exertional levels (sedentary, light, medium, heavy, and very heavy) in terms of...
20 CFR 416.969a - Exertional and nonexertional limitations.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Exertional and nonexertional limitations. 416.969a Section 416.969a Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME... of jobs by various exertional levels (sedentary, light, medium, heavy, and very heavy) in terms of...
20 CFR 416.945 - Your residual functional capacity.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Your residual functional capacity. 416.945 Section 416.945 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE... disorder may be fully capable of the physical demands consistent with those of sustained medium work...
20 CFR 416.969a - Exertional and nonexertional limitations.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Exertional and nonexertional limitations. 416.969a Section 416.969a Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME... of jobs by various exertional levels (sedentary, light, medium, heavy, and very heavy) in terms of...
20 CFR 416.969a - Exertional and nonexertional limitations.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Exertional and nonexertional limitations. 416.969a Section 416.969a Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME... of jobs by various exertional levels (sedentary, light, medium, heavy, and very heavy) in terms of...
20 CFR 404.1566 - Work which exists in the national economy.
Code of Federal Regulations, 2013 CFR
2013-04-01
.... 404.1566 Section 404.1566 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses, prepared for the Social Security Administration by various...
20 CFR 404.1566 - Work which exists in the national economy.
Code of Federal Regulations, 2012 CFR
2012-04-01
.... 404.1566 Section 404.1566 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses, prepared for the Social Security Administration by various...
20 CFR 404.1566 - Work which exists in the national economy.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... 404.1566 Section 404.1566 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses, prepared for the Social Security Administration by various...
20 CFR 416.969a - Exertional and nonexertional limitations.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Exertional and nonexertional limitations. 416.969a Section 416.969a Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME... of jobs by various exertional levels (sedentary, light, medium, heavy, and very heavy) in terms of...
26 CFR 1.411(d)-4 - Section 411(d)(6) protected benefits.
Code of Federal Regulations, 2014 CFR
2014-04-01
... terms relating to the payment schedule, timing, commencement, medium of distribution (e.g., in cash or...: (1) Ancillary life insurance protection; (2) Accident or health insurance benefits; (3) Social security supplements described in section 411(a)(9), except qualified social security supplements as...
26 CFR 1.411(d)-4 - Section 411(d)(6) protected benefits.
Code of Federal Regulations, 2012 CFR
2012-04-01
... terms relating to the payment schedule, timing, commencement, medium of distribution (e.g., in cash or...: (1) Ancillary life insurance protection; (2) Accident or health insurance benefits; (3) Social security supplements described in section 411(a)(9), except qualified social security supplements as...
26 CFR 1.411(d)-4 - Section 411(d)(6) protected benefits.
Code of Federal Regulations, 2013 CFR
2013-04-01
... terms relating to the payment schedule, timing, commencement, medium of distribution (e.g., in cash or...: (1) Ancillary life insurance protection; (2) Accident or health insurance benefits; (3) Social security supplements described in section 411(a)(9), except qualified social security supplements as...
2013-06-01
the former Allies of the Second World War, several European countries, the United States of America , and Canada came together to provide for their...European countries, the United States of America , and Canada came together to provide for their security and in 1949 formed a unique security alliance, the ...European countries, the United States of America (U.S.), and Canada came together to provide for their
United States Air Force Security Forces in an Era of Terrorist Threats
1999-06-01
their primary duties. The third alternative is to eliminate the Palace Tenure deployments of security personnel and replace them with dedicated units...The Phoenix Raven program, the 820th Security Forces Group, and Palace Tenure commitments. The specified mission varies by organization, but the...820th Security Forces Group. January 1999, slide 4. 166 Statement of LT. Col. Larry A. Buckingham , 820th Security Forces Group Commander, “820th Security
Variation in Hydraulic Conductivity with Decreasing pH in a Biologically-Clogged Porous Medium
NASA Astrophysics Data System (ADS)
Kirk, M. F.; Santillan, E.; McGrath, L. K.; Altman, S. J.
2011-12-01
Biological clogging can significantly lower the hydraulic conductivity of porous media, potentially helping to limit CO2 transport from geological carbon storage reservoirs. How clogging is affected by CO2 injection, however, is unclear. We used column experiments to examine how decreasing pH, a geochemical change associated with CO2 injection, will affect the hydraulic conductivity (K) of biologically clogged porous medium. Four biologically-active experiments and two control experiments were performed. Columns consisted of 1 mm2 capillary tubes filled with 105-150 μm diameter glass beads. Artificial groundwater medium containing 1 mM glucose was pumped through the columns at a rate of 0.015 mL/min (q = 21.6 m/day; Re = 0.045). Each column was inoculated with 10^8 CFU of Pseudomonas fluorescens tagged with a green fluorescent protein; cells introduced to control columns were heat sterilized. Biomass distribution and transport was monitored using scanning laser confocal microscopy and effluent plating. Growth was allowed to occur for 5 days in medium with pH 7 in the biologically active columns. During that time, K decreased to values ranging from 10 to 27% of the average control K and effluent cell levels increased to about 10^8 CFU/mL. Next, the pH of the inflowing medium was lowered to 4 in three experiments and 5.5 in one experiment. After pH 4 medium was introduced, K increased to values ranging from 21 to 64% of the average control K and culturable cell levels in the effluent fell by about 4 log units. Confocal images show that clogging persisted in the columns at pH 4 because most of the microbial biomass remained attached to bead surfaces. In the experiment where pH was lowered to 5.5, K changed little because biological clogging remained entirely intact. The concentration of culturable cells in the effluent was also invariant. These results suggest that biomass in porous medium will largely remain in place following exposure to acidic water in a CO2 storage reservoir, particularly where buffering is able to limit the extent of acidification. This material is based upon work supported as part of the Center for Frontiers of Subsurface Energy Security, an Energy Frontier Research Center funded by the U.S. Department of Energy, Office of Science, Office of Basic Energy Sciences under Award Number DE-SC0001114. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.
20 CFR Appendix 2 to Subpart P of... - Medical-Vocational Guidelines
Code of Federal Regulations, 2013 CFR
2013-04-01
... Subpart P of Part 404 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... impairment(s). 203.00Maximum sustained work capability limited to medium work as a result of severe medically... work capability for sedentary, light, medium, heavy, or very heavy work) in evaluating the individual's...
20 CFR Appendix 2 to Subpart P of... - Medical-Vocational Guidelines
Code of Federal Regulations, 2011 CFR
2011-04-01
... Subpart P of Part 404 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... impairment(s). 203.00Maximum sustained work capability limited to medium work as a result of severe medically... work capability for sedentary, light, medium, heavy, or very heavy work) in evaluating the individual's...
20 CFR Appendix 2 to Subpart P of... - Medical-Vocational Guidelines
Code of Federal Regulations, 2014 CFR
2014-04-01
... Subpart P of Part 404 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... impairment(s). 203.00Maximum sustained work capability limited to medium work as a result of severe medically... work capability for sedentary, light, medium, heavy, or very heavy work) in evaluating the individual's...
20 CFR Appendix 2 to Subpart P of... - Medical-Vocational Guidelines
Code of Federal Regulations, 2012 CFR
2012-04-01
... Subpart P of Part 404 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... impairment(s). 203.00Maximum sustained work capability limited to medium work as a result of severe medically... work capability for sedentary, light, medium, heavy, or very heavy work) in evaluating the individual's...
20 CFR Appendix 2 to Subpart P of... - Medical-Vocational Guidelines
Code of Federal Regulations, 2010 CFR
2010-04-01
... Subpart P of Part 404 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... impairment(s). 203.00Maximum sustained work capability limited to medium work as a result of severe medically... work capability for sedentary, light, medium, heavy, or very heavy work) in evaluating the individual's...
77 FR 66885 - Submission of OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-07
... media, including microfilm, microfiche, or any similar medium, or (ii) electronic storage media, including any digital storage medium or system that meets the terms of rule 31a-2(f). The fund, or person... Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy...
31 CFR 103.11 - Meaning of terms.
Code of Federal Regulations, 2010 CFR
2010-07-01
... accepted as a medium of exchange in the country of issuance. Currency includes U.S. silver certificates, U... customarily used and accepted as a medium of exchange in a foreign country. (i) [Reserved] (j) Deposit account... the person's name and address, as well as taxpayer identification number (e.g., social security or...
75 FR 31768 - Procurement List Proposed Additions and Deletions
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-04
.... Service Type/Location: Custodial Services, Woodlawn Child Care Center, Social Security Administration... Regular NSN: 8415-01-546-0166--Undershirt Size Small Long NSN: 8415-01-538-8614--Undershirt Size Medium Regular NSN: 8415-01-546-0305--Undershirt Size Medium Long NSN: 8415-01-538-8621--Undershirt Size Large...
Materials for Adaptive Structural Acoustic Control. Volume 1
1993-04-06
FOLLOWING PAGE 14. SUBJECT TERMS 15. NUMBER OF PAGES 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20...375 Rubber is a highly nonlinear clastic medium. In the unstressed compliant state, the molecules ate coiled and tangled . but under stress the molecules...one-dimensional system, \\\\here tangle (solid dots) and the oblique (open circle) states are the shaded area represents the level of thermal energy
20 CFR 416.945 - Your residual functional capacity.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Your residual functional capacity. 416.945 Section 416.945 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE... medium work activity, but another person with the same disorder, because of pain, may not be capable of...
20 CFR 404.1225 - Records-for wages paid prior to 1987.
Code of Federal Regulations, 2013 CFR
2013-04-01
....1225 Section 404.1225 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... included under its agreement to keep, accurate records of all remuneration (whether in cash or in a medium... show for each employee: (1) The employee's name, address, and Social Security number; (2) The total...
20 CFR 404.1225 - Records-for wages paid prior to 1987.
Code of Federal Regulations, 2012 CFR
2012-04-01
....1225 Section 404.1225 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... included under its agreement to keep, accurate records of all remuneration (whether in cash or in a medium... show for each employee: (1) The employee's name, address, and Social Security number; (2) The total...
20 CFR 404.1225 - Records-for wages paid prior to 1987.
Code of Federal Regulations, 2011 CFR
2011-04-01
....1225 Section 404.1225 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... included under its agreement to keep, accurate records of all remuneration (whether in cash or in a medium... show for each employee: (1) The employee's name, address, and Social Security number; (2) The total...
20 CFR 416.945 - Your residual functional capacity.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Your residual functional capacity. 416.945 Section 416.945 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE... medium work activity, but another person with the same disorder, because of pain, may not be capable of...
20 CFR 404.1225 - Records-for wages paid prior to 1987.
Code of Federal Regulations, 2014 CFR
2014-04-01
....1225 Section 404.1225 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... included under its agreement to keep, accurate records of all remuneration (whether in cash or in a medium... show for each employee: (1) The employee's name, address, and Social Security number; (2) The total...
Code of Federal Regulations, 2014 CFR
2014-01-01
... information, to identify a specific person, including any: (1) Name, social security number, date of birth... important information such as the consumer's date of birth or Social Security number may be missing because... medium, created by or derived from a health care provider or the consumer, that relates to: (i) The past...
20 CFR 416.945 - Your residual functional capacity.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Your residual functional capacity. 416.945 Section 416.945 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE... medium work activity, but another person with the same disorder, because of pain, may not be capable of...
20 CFR 404.1225 - Records-for wages paid prior to 1987.
Code of Federal Regulations, 2010 CFR
2010-04-01
....1225 Section 404.1225 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... included under its agreement to keep, accurate records of all remuneration (whether in cash or in a medium... show for each employee: (1) The employee's name, address, and Social Security number; (2) The total...
20 CFR 416.967 - Physical exertion requirements.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 416.967 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE... economy, we classify jobs as sedentary, light, medium, heavy, and very heavy. These terms have the same..., a job is in this category when it requires a good deal of walking or standing, or when it involves...
20 CFR 416.967 - Physical exertion requirements.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Section 416.967 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE... economy, we classify jobs as sedentary, light, medium, heavy, and very heavy. These terms have the same..., a job is in this category when it requires a good deal of walking or standing, or when it involves...
20 CFR 416.967 - Physical exertion requirements.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Section 416.967 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE... economy, we classify jobs as sedentary, light, medium, heavy, and very heavy. These terms have the same..., a job is in this category when it requires a good deal of walking or standing, or when it involves...
20 CFR 416.967 - Physical exertion requirements.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Section 416.967 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE... economy, we classify jobs as sedentary, light, medium, heavy, and very heavy. These terms have the same..., a job is in this category when it requires a good deal of walking or standing, or when it involves...
20 CFR 416.967 - Physical exertion requirements.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Section 416.967 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE... economy, we classify jobs as sedentary, light, medium, heavy, and very heavy. These terms have the same..., a job is in this category when it requires a good deal of walking or standing, or when it involves...
Hidden Costs of the Campus Security Force.
ERIC Educational Resources Information Center
Temple, Charles M.
1981-01-01
Information on the security operations of public four-year colleges and universities is examined, and the case of the University of Tennessee, Chattanooga (UTC), which saved $66,000 a year from the security unit's operational budget, is noted. Of 561 questionnaires sent to public institutions regarding the general operation of security units,…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-03
... is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0031] Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011...
[Psychiatric security units in Norway. Patients and activity].
Linaker, O M; Thoresen, R; Figenschou, L; Sølvberg, H; Refsnes, U; Jakobsen, D
1994-05-20
The authors briefly discuss past and present reasons for the psychiatric security unit system in Norway. They describe the patients in these units at the beginning of 1993 (N = 123). Of these patients, 16% were females, 78% had a main diagnosis of schizophrenia, and 12% were admitted because of personality disorders. Physical restraints had been used for 25%, pharmacological restraints for 17%, and forced pharmacological treatment had been necessary for 26% of the patients during the last six months. There were high rates of behaviour problems related to criminality, abuse, violence and auto-aggression. Nearly all the patients were committed involuntarily, and additional legal restrictions were imposed for one third of them. The majority (63%) of the patients had been in security units for more than one year. The highest levels of security within the security unit system were used for those with the most serious criminality or behaviour problems prior to admission.
Method of securing filter elements
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brown, Erik P.; Haslam, Jeffery L.; Mitchell, Mark A.
2016-10-04
A filter securing system including a filter unit body housing; at least one tubular filter element positioned in the filter unit body housing, the tubular filter element having a closed top and an open bottom; a dimple in either the filter unit body housing or the top of the tubular filter element; and a socket in either the filter unit body housing or the top of the tubular filter element that receives the dimple in either the filter unit body housing or the top of the tubular filter element to secure the tubular filter element to the filter unit bodymore » housing.« less
Code of Federal Regulations, 2011 CFR
2011-07-01
.... 1 et seq.), the tariff laws of the United States, or the Social Security Act (42 U.S.C. 301 et seq... individual, the taxpayer identifying number is generally the individual's social security number. (c) General...) Social Security benefit payments (excluding Supplemental Security Income payments), Black Lung (part B...
Rep. Miller, Jeff [R-FL-1
2009-04-30
House - 05/26/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
... procedures, physical security plan, guard training and qualification plan, or cyber security plan for the... Power Plant Unit 1, Exemption From Certain Security Requirements 1.0 Background DTE Energy (DTE) is the... atmospheric pressure. In November 1972, the Power Reactor Development Company (PRDC), the licensee at that...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-19
... security zones as RNAs. The Marine Air Terminal, United Nations, and United Nations West Channel Closure... United Nations General Assembly RNA Regulated Navigation Area UN United Nations A. Public Participation... comment, it will be considered as having been received by the Coast Guard when it is received at the...
32 CFR Appendix B to Part 806b - Preparing a System Notice
Code of Federal Regulations, 2013 CFR
2013-07-01
... authorizes using the Social Security Number as a personal identifier. Include this authority whenever the Social Security Number is used to retrieve records. Purpose: Describe briefly and specifically what the... records in the system: Storage: State the medium in which the Air Force keeps the records; for example, in...
32 CFR Appendix B to Part 806b - Preparing a System Notice
Code of Federal Regulations, 2012 CFR
2012-07-01
... authorizes using the Social Security Number as a personal identifier. Include this authority whenever the Social Security Number is used to retrieve records. Purpose: Describe briefly and specifically what the... records in the system: Storage: State the medium in which the Air Force keeps the records; for example, in...
32 CFR Appendix B to Part 806b - Preparing a System Notice
Code of Federal Regulations, 2014 CFR
2014-07-01
... authorizes using the Social Security Number as a personal identifier. Include this authority whenever the Social Security Number is used to retrieve records. Purpose: Describe briefly and specifically what the... records in the system: Storage: State the medium in which the Air Force keeps the records; for example, in...
32 CFR Appendix B to Part 806b - Preparing a System Notice
Code of Federal Regulations, 2011 CFR
2011-07-01
... authorizes using the Social Security Number as a personal identifier. Include this authority whenever the Social Security Number is used to retrieve records. Purpose: Describe briefly and specifically what the... records in the system: Storage: State the medium in which the Air Force keeps the records; for example, in...
Problematic Sexual Behaviour in a Secure Psychiatric Setting: Challenges and Developing Solutions
ERIC Educational Resources Information Center
Hughes, Gareth V.; Hebb, Jo
2005-01-01
Sexually abusive behaviours are common in a forensic psychiatric population, both before admission and while hospitalized. A survey of our medium security facility found that 41% of patients had a history of sexually abusive behaviours, ranging from convictions for sexual assault through to current episodes of sexual harassment. Most forensic…
32 CFR Appendix B to Part 806b - Preparing a System Notice
Code of Federal Regulations, 2010 CFR
2010-07-01
... authorizes using the Social Security Number as a personal identifier. Include this authority whenever the Social Security Number is used to retrieve records. Purpose: Describe briefly and specifically what the... records in the system: Storage: State the medium in which the Air Force keeps the records; for example, in...
17 CFR 230.135 - Notice of proposed registered offerings.
Code of Federal Regulations, 2011 CFR
2011-04-01
... through any medium a notice of a proposed offering to be registered under the Act will not be deemed to... issuer is directing its offering to only a particular class of purchasers; (vii) Any statements or... offering. In a rights offering to existing security holders: (1) The class of security holders eligible to...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-06
... relating to codes of ethics. This Rule requires investment advisers to adopt a code of ethics that reflects... securities laws. Accordingly, procedures designed to prevent the communication and misuse of non-public... securities of large, medium and small capitalization companies across the globe including developed countries...
Reliability, Compliance, and Security in Web-Based Course Assessments
ERIC Educational Resources Information Center
Bonham, Scott
2008-01-01
Pre- and postcourse assessment has become a very important tool for education research in physics and other areas. The web offers an attractive alternative to in-class paper administration, but concerns about web-based administration include reliability due to changes in medium, student compliance rates, and test security, both question leakage…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-10
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0062] Privacy Act of 1974; Department of Homeland Security United States Coast Guard DHS/USCG-027 Recruiting Files System of... accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to update and reissue an...
Perimeter security for Minnesota correctional facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crist, D.; Spencer, D.D.
1996-12-31
For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned newmore » construction at other facilities.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-07
... DEPARTMENT OF HOMELAND SECURITY United States Immigration and Customs Enforcement Agency... Department of Homeland Security, U.S. Immigration and Customs Enforcement (ICE), will submit the following... United States Immigration and Customs Enforcement, Department of Homeland Security, and sent via...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gibbs, P. W.
Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.
Household dietary diversity, vitamin A consumption and food security in rural Tigray, Ethiopia.
Schwei, Rebecca J; Tesfay, Haile; Asfaw, Frezer; Jogo, Wellington; Busse, Heidi
2017-06-01
To describe: household dietary diversity across four zones in Ethiopia; the relationship between household dietary diversity and consumption of vitamin A-rich foods; and the relationship between household dietary diversity and food security status. This was a cross-sectional survey. Data were collected using structured questionnaires in the local language. Household dietary diversity scores measured types of foods households consumed, and households were classified by food security status using a modified version of the Household Food Insecurity Access Scale. An ordinal logistics regression model was created to assess the relationship between three tiers of dietary diversity (low, medium and high) and food security while controlling for agricultural zone, educational variables and household characteristics. Rural households in Tigray, Ethiopia. Three hundred households in Tigray, Ethiopia, were interviewed. Of the households, 23, 47 and 30 % had low, medium and high dietary diversity, respectively. Among households with high dietary diversity, eggs and fruit were the most common foods added to the diet. In the fully adjusted model, participants who reported being food secure had 1·8 increased odds of greater dietary diversity (95 % CI 1·0, 3·2) compared with participants who were food insecure. Food security was positively associated with dietary diversity. In order to enhance health, interventions that improve dietary diversity and vitamin A consumption should remain important areas of focus for health leaders in the region.
Challenge and Response: Anticipating US Military Security Concerns
1994-08-01
in the U.S. And the Russian Orthodox Church may emerge as another such political force as was evidenced by its mediative role in the turbulent days...objectives (ends) and public opinion. Recall the turmoil in the United States during the Vietnam War and how 471 internal politics affected the...ABSTRACT 15. SUBJECT TERMS Military planning - United States; National Security - United States; World politics - 1989 - 16. SECURITY CLASSIFICATION OF
78 FR 25324 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-30
... rules governing offers and sales of securities made outside the United States without registration under... 5 of the Securities Act applies to offers and sales of securities outside of the United States...) Whether this collection of information is necessary for the proper performance of the functions of the...
An analysis of nurses' post-incident manual restraint reports.
Ryan, C J; Bowers, L
2006-10-01
Manual restraint techniques are associated with the management of violence in psychiatric settings. Restraint effectiveness and acceptability are under scrutiny, yet the nature and frequency of who or what were involved in restraint episodes have not previously been fully described or understood. The aim of this study was to describe the nature and frequency of manual restraint-related events and their components. This study was carried out using content analyses of nurses' post-incident reports from a psychiatric unit situated within a general hospital, and from its associated medium-secure unit. Requests for restraint occurred at the rate of about once per day, and the majority related to patients' ill-directed frustration, resistance to containment and their desire to leave the ward. Only half of responses to conflicts resulted in restraint implementation. The majority of restraint activities occurred during the afternoon and night. Male patients and detained patients were more frequent participants in restraint interventions. To a lesser extent, police, ambulance, fire services, hospital security, visitors and ex-patients were also involved in restraint episodes. Injuries were rare. In conclusion, training in restraint skills, clinical audit of adverse incidents, and research into psychiatric aggression all need to take into account the association of restraint with the enforcement of detention and treatment of acutely ill patients. The coupling of restraint with medication requires examination of its safety and efficacy. Interagency training may enable the essential services involved to coordinate restraint activities more effectively.
NASA Astrophysics Data System (ADS)
Bermeo, A.; Couturier, S.
2017-01-01
Because of its renewed importance in international agendas, food security in sub-tropical countries has been the object of studies at different scales, although the spatial components of food security are still largely undocumented. Among other aspects, food security can be assessed using a food selfsufficiency index. We propose a spatial representation of this assessment in the densely populated rural area of the Huasteca Poblana, Mexico, where there is a known tendency towards the loss of selfsufficiency of basic grains. The main agricultural systems in this area are the traditional milpa (a multicrop practice with maize as the main basic crop) system, coffee plantations and grazing land for bovine livestock. We estimate a potential additional milpa - based maize production by smallholders identifying the presence of extensive coffee and pasture systems in the production data of the agricultural census. The surface of extensive coffee plantations and pasture land were estimated using the detailed coffee agricultural census data, and a decision tree combining unsupervised and supervised spectral classification techniques of medium scale (Landsat) satellite imagery. We find that 30% of the territory would benefit more than 50% increment in food security and 13% could theoretically become maize self-sufficient from the conversion of extensive systems to the traditional multicrop milpa system.
26 CFR 31.6001-2 - Additional records under Federal Insurance Contributions Act.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Insurance Contributions Act shall keep records of all remuneration, whether in cash or in a medium other... name are as shown on an account number card issued to the employee by the Social Security... number and name are as shown on an account number card issued to the employee by the Social Security...
26 CFR 31.6001-2 - Additional records under Federal Insurance Contributions Act.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Insurance Contributions Act shall keep records of all remuneration, whether in cash or in a medium other... name are as shown on an account number card issued to the employee by the Social Security... number and name are as shown on an account number card issued to the employee by the Social Security...
26 CFR 31.6001-2 - Additional records under Federal Insurance Contributions Act.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Insurance Contributions Act shall keep records of all remuneration, whether in cash or in a medium other... name are as shown on an account number card issued to the employee by the Social Security... number and name are as shown on an account number card issued to the employee by the Social Security...
26 CFR 31.6001-2 - Additional records under Federal Insurance Contributions Act.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Insurance Contributions Act shall keep records of all remuneration, whether in cash or in a medium other... name are as shown on an account number card issued to the employee by the Social Security... number and name are as shown on an account number card issued to the employee by the Social Security...
17 CFR 240.17a-3 - Records to be made by certain exchange members, brokers and dealers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... transacts a business in securities through the medium of any such member, and every broker or dealer... associated person's name, address, social security number, and the starting date of the associated person's... accounts in existence on the effective date of this section, the member, broker or dealer must obtain this...
26 CFR 31.6001-2 - Additional records under Federal Insurance Contributions Act.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Insurance Contributions Act shall keep records of all remuneration, whether in cash or in a medium other... name are as shown on an account number card issued to the employee by the Social Security... number and name are as shown on an account number card issued to the employee by the Social Security...
The Nature and Prevalence of Learning Deficiencies among Adult Inmates.
ERIC Educational Resources Information Center
Bell, Raymond; And Others
In order to determine the nature and prevalence of learning deficiencies among adult inmates in U.S. correctional institutions, a sample of subjects was drawn from three institutions in each of the states of Louisiana, Pennsylvania, and Washington. One male maximum security, one male medium security, and one women's prison were selected in each of…
75 FR 51854 - Privacy Act of 1974: Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-23
... schedules of the United States Securities and Exchange Commission and as approved by the National Archives... of Trading and Markets, U.S. Securities and Exchange Commission, 100 F Street, NE., Washington, DC... schedules of the United States Securities and Exchange Commission and as approved by the National Archives...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-09
... of 1974: Implementation of Exemptions; Department of Homeland Security United States Immigration and Customs Enforcement-- 011 Immigration and Enforcement Operational Records System of Records AGENCY... rule to amend its regulations to exempt portions of a Department of Homeland Security/U.S. Immigration...
Analysis of security and threat of underwater wireless sensor network topology
NASA Astrophysics Data System (ADS)
Yang, Guang; Wei, Zhiqiang; Cong, Yanping; Jia, Dongning
2012-04-01
Underwater wireless sensor networks (UWSNs) are a subclass of wireless sensor networks. Underwater sensor deployment is a significant challenge due to the characteristics of UWSNs and underwater environment. Recent researches for UWSNs deployment mostly focus on the maintenance of network connectivity and maximum communication coverage. However, the broadcast nature of the transmission medium incurs various types of security attacks. This paper studies the security issues and threats of UWSNs topology. Based on the cluster-based topology, an underwater cluster-based security scheme (U-CBSS) is presented to defend against these attacks. and safety.
Bode, Ingvild
2017-01-01
The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted. PMID:29782586
Bode, Ingvild
2018-06-01
The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-27
... immigrants or nonimmigrants, of aliens who are subject to United Nations Security Council travel bans as of... served by suspending the entry into the United States, as immigrants or nonimmigrants, of aliens whose... find that the unrestricted immigrant and nonimmigrant entry into the United States of persons described...
Code of Federal Regulations, 2014 CFR
2014-04-01
... otherwise permanently residing in the United States under color of law. 416.1329 Section 416.1329 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED... in the United States under color of law. (a) A recipient ceases to be an eligible individual or...
Code of Federal Regulations, 2013 CFR
2013-04-01
... otherwise permanently residing in the United States under color of law. 416.1329 Section 416.1329 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED... in the United States under color of law. (a) A recipient ceases to be an eligible individual or...
Code of Federal Regulations, 2012 CFR
2012-04-01
... otherwise permanently residing in the United States under color of law. 416.1329 Section 416.1329 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED... in the United States under color of law. (a) A recipient ceases to be an eligible individual or...
Code of Federal Regulations, 2010 CFR
2010-04-01
... otherwise permanently residing in the United States under color of law. 416.1329 Section 416.1329 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED... in the United States under color of law. (a) A recipient ceases to be an eligible individual or...
Code of Federal Regulations, 2011 CFR
2011-04-01
... otherwise permanently residing in the United States under color of law. 416.1329 Section 416.1329 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED... in the United States under color of law. (a) A recipient ceases to be an eligible individual or...
78 FR 30847 - White Pine-Nye Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-23
... Advisory Committee will meet in Eureka, Nevada. The Committee is authorized under the Secure Rural Schools... the full agenda may be previewed at: https://fsplaces.fs.fed.us/fsfiles/unit/wo/secure_rural_schools... will be posted at https://fsplaces.fs.fed.us/fsfiles/unit/wo/secure_rural_schools.nsf , within 21 days...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-08
... 1974; Department of Homeland Security U.S. Citizenship and Immigration Services -011 E-Verify Program... ``Department of Homeland Security/United States Citizenship and Immigration Services--011 E- Verify Program System of Records.'' The United States Citizenship and Immigration Services E-Verify Program allows...
26 CFR 1.884-5 - Qualified resident.
Code of Federal Regulations, 2014 CFR
2014-04-01
... established securities market (within the meaning of paragraph (d) of this section) in that country or the... securities market (within the meaning of paragraph (d) of this section) in the United States; (D) A not-for... class of stock is listed on an established securities market in the United States or in the country of...
26 CFR 1.884-5 - Qualified resident.
Code of Federal Regulations, 2013 CFR
2013-04-01
... established securities market (within the meaning of paragraph (d) of this section) in that country or the... securities market (within the meaning of paragraph (d) of this section) in the United States; (D) A not-for... class of stock is listed on an established securities market in the United States or in the country of...
26 CFR 1.884-5 - Qualified resident.
Code of Federal Regulations, 2012 CFR
2012-04-01
... established securities market (within the meaning of paragraph (d) of this section) in that country or the... securities market (within the meaning of paragraph (d) of this section) in the United States; (D) A not-for... class of stock is listed on an established securities market in the United States or in the country of...
7 CFR 160.75 - Loan of standards under security deposit.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 3 2010-01-01 2010-01-01 false Loan of standards under security deposit. 160.75... REGULATIONS AND STANDARDS FOR NAVAL STORES Loan and Care of United States Standards § 160.75 Loan of standards under security deposit. Duplicates of the United States Standards for rosin may be loaned to interested...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-14
... involves important physical modifications to the HNP, Unit 1 security system. There are several issues... in which some important security modifications are planned. A direct outside access route to the... implementation deadline, the licensee currently maintains a security system acceptable to the NRC and that will...
ERIC Educational Resources Information Center
Chu, Chi Meng; Thomas, Stuart D. M.; Ogloff, James R. P.; Daffern, Michael
2013-01-01
Although violence risk assessment knowledge and practice has advanced over the past few decades, it remains practically difficult to decide which measures clinicians should use to assess and make decisions about the violence potential of individuals on an ongoing basis, particularly in the short to medium term. Within this context, this study…
The vitamin D status of prison inmates.
Nwosu, Benjamin Udoka; Maranda, Louise; Berry, Rosalie; Colocino, Barbara; Flores, Carlos D; Folkman, Kerry; Groblewski, Thomas; Ruze, Patricia
2014-01-01
There is no comprehensive, systematic analysis of the vitamin D status of prisoners in the scientific literature. To investigate the vitamin D status and its determinants in US prison inmates. Given the uniformity of dietary intake amongst inmates, vitamin D status will be determined by non-dietary factors such as skin pigmentation, security level-, and the duration of incarceration. A retrospective study of 526 inmates (males, n=502, age 48.6 ± 12.5 years; females, n=24, age 44.1 ± 12.2) in Massachusetts prisons. Vitamin D sufficiency, insufficiency, and deficiency were respectively defined as a 25(OH)D concentration 75 nmol/L; 50 to 75 nmol/L; and <50 nmol/L. The Massachusetts Department of Correction Statement of Nutritional Adequacy stated that each inmate received the recommended daily allowance of vitamin D daily. Security level of incarceration was designated as minimum, medium, and maximum. Racial groups were categorized as Black, white, Asian, and Others. Serum 25(OH)D levels peaked in summer and autumn, and decreased in winter and spring. Vitamin D deficiency occurred in 50.5% of blacks, 29.3% of whites, and 14.3% of Asian inmates (p=0.007). Black inmates had significantly lower serum 25(OH)D level than white inmates at the maximum security level (p=0.015), medium security level (p=0.001), but not at the minimum security level (p=0.40). After adjusting for covariates black inmates at a maximum security level had a four-fold higher risk for vitamin D deficiency than white inmates at the same security level (OR 3.9 [95% CI 1.3-11.7]. The vitamin D status of prison inmates is determined by skin pigmentation, seasons, and the security level of incarceration.
Extruder system and method for treatment of a gaseous medium
DOE Office of Scientific and Technical Information (OSTI.GOV)
Silvi, Norberto; Perry, Robert James; Singh, Surinder Prabhjot
A system for treatment of a gaseous medium, comprises an extruder having a barrel. The extruder further comprises a first inlet port, a second inlet port, and a plurality of outlet ports coupled to the barrel. The first inlet port is configured for feeding a lean sorbent, the second inlet port is configured for feeding a gaseous medium, and the plurality of outlet ports are configured for releasing a plurality of components removed from the gaseous medium. Further, the extruder comprises a plurality of helical elements coupled to a plurality of kneading elements, mounted on a shaft, and disposed withinmore » the barrel. The barrel and the plurality of helical and kneading elements together form an absorption unit and a desorption unit. The first and second inlet ports are formed in the absorption unit and the plurality of outlet ports are formed in the absorption and desorption units.« less
Evaluation research of small and medium-sized enterprise informatization on big data
NASA Astrophysics Data System (ADS)
Yang, Na
2017-09-01
Under the background of big data, key construction of small and medium-sized enterprise informationization level was needed, but information construction cost was large, while information cost of inputs can bring benefit to small and medium-sized enterprises. This paper established small and medium-sized enterprise informatization evaluation system from hardware and software security level, information organization level, information technology application and the profit level, and information ability level. The rough set theory was used to brief indexes, and then carry out evaluation by support vector machine (SVM) model. At last, examples were used to verify the theory in order to prove the effectiveness of the method.
Birefringence in a chiral medium, via temporal cloaking
NASA Astrophysics Data System (ADS)
Khan, Humayun; Haneef, Muhammad
2017-05-01
This paper reports theoretical investigation of birefringence in a chiral medium for the creation of temporal cloaking. The chiral medium splits the input probe beam into left/right circular polarized beams. These left/right circular polarized beams are then controlled and modified within the chiral medium. The left circular polarized beam delays by 24 ns whereas the right circular polarized beam advances by -23 ns at a control field of rabbi frequency 6γ . This opens a 47 ns time gap for temporal cloaking to hide information without noise corruption and energy loss. The results have potential applications in communication devices for secure propagation of light pulse.
Code of Federal Regulations, 2010 CFR
2010-04-01
... plan may provide that any such document may be transferred to microfilm or other recording medium after... years or at such earlier date as is specified in a plan for the destruction or disposition of any such documents if such plan has been filed with the Commission by such exchange, association, clearing agency or...
2004-07-01
Melissa ) is created in the controlled environment and propagated. The students learn how viruses are written, how they are propagated via mediums like...vulnerabilities and threats, establishing disaster response and recovery procedures. Joseph Giordano , Technical Advisor, Information Warfare Branch, AFRL 60 The
Five Models for European Security: Implications for the United States
1992-01-01
tripolar concept of security. It is the product of Europeans’ search for a third way between the United States and the former Soviet Union-in part to...distinguish the five systems from each other are reasonably clear (ad hoc, bipolar, tripolar , multi-polar collective, and overlapping), there is room...based on a tripolar concept of security. It is the product of Europeans’ search for a third way between the United States and the former Soviet Union-in
Liang, Jinyang; Gao, Liang; Hai, Pengfei; Li, Chiye; Wang, Lihong V.
2015-01-01
Compressed ultrafast photography (CUP), a computational imaging technique, is synchronized with short-pulsed laser illumination to enable dynamic three-dimensional (3D) imaging. By leveraging the time-of-flight (ToF) information of pulsed light backscattered by the object, ToF-CUP can reconstruct a volumetric image from a single camera snapshot. In addition, the approach unites the encryption of depth data with the compressed acquisition of 3D data in a single snapshot measurement, thereby allowing efficient and secure data storage and transmission. We demonstrated high-speed 3D videography of moving objects at up to 75 volumes per second. The ToF-CUP camera was applied to track the 3D position of a live comet goldfish. We have also imaged a moving object obscured by a scattering medium. PMID:26503834
28 CFR 0.111B - Witness Security Program.
Code of Federal Regulations, 2014 CFR
2014-07-01
... United States Marshals Service § 0.111B Witness Security Program. (a) In connection with the protection... potential witness, the Director of the United States Marshals Service and officers of the United States Marshals Service designated by the Director may: (1) Provide suitable documents to enable the person to...
28 CFR 0.111B - Witness Security Program.
Code of Federal Regulations, 2013 CFR
2013-07-01
... United States Marshals Service § 0.111B Witness Security Program. (a) In connection with the protection... potential witness, the Director of the United States Marshals Service and officers of the United States Marshals Service designated by the Director may: (1) Provide suitable documents to enable the person to...
31 CFR 370.0 - What does this part cover?
Code of Federal Regulations, 2010 CFR
2010-07-01
... RELATING TO UNITED STATES SECURITIES General Information § 370.0 What does this part cover? (a) Scope. This... does not apply to transactions for the sale of United States Savings Bonds accomplished through savings... connection with United States securities. This part also provides regulations for the electronic submission...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-27
...; Zion Nuclear Power Station, Units 1 and 2; Exemption From Certain Physical Security Requirements 1.0... the ZNPS Physical Security Plan (PSP) for the protection of the nuclear material while in transit to... the new physical security requirements in 10 CFR 73.55. The December 2, 2010, letter included...
32 CFR 310.15 - General considerations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... individual's rights, privileges, or benefits under any Federal program. (b) Collecting social security... regardless of the medium used to collect the information (forms, personal interviews, telephonic interviews...
32 CFR 310.15 - General considerations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... individual's rights, privileges, or benefits under any Federal program. (b) Collecting social security... regardless of the medium used to collect the information (forms, personal interviews, telephonic interviews...
Buchholz, Vered; Sadot, Eran; Spivak, Hadar
2015-08-01
Intracorporeal suturing is time-consuming and could be difficult in certain operative circumstances. Instead of knot tying, specially designed clips have been introduced to anchor and secure the end of a single strand or suture. Although these clips provide a maximal required holding grip (HG), they considerably increase the cost of the procedure. The aim of this in vitro study was to identify the feasibility, and means of achieving the best HG, of commonly used disposable automatic clip appliers (LCAs) over regular strands. We placed 2-0 PDS (rigid) and 2-0 Vicryl (soft) sutures through fresh gastric wall specimens. Six different commercial-type LCAs, all having large or medium/large clips, were applied at the distal end of each suture. An IMDA manual digital force gauge was used to measure the HG of each clip at 2 positions: the middle clip position and the angle (at the crouch) position. A total of 192 measurements were taken. The results were classified into 3 HG levels measured by Newton units (N): the strongest grip (> 1 N), medium grip (> 0.5 and < 1 N), and weak grip (< 0.5 N). The strongest HG was obtained by applying 10 to 12 mm LCAs with large or medium/large clips over PDS at an angle position (HG = 1.1 ± 0.2 to 1.6 ± 0.3 N). The weakest grip was obtained by applying any type of LCA over Vicryl at the middle position (HG = 0.08 ± 0.04 to 0.2 ± 0.06 N, P < 0.001). The latter was associated with clips freely falling off the sutures even before applying any force. In general, more force was needed to dislodge any brand clip from the PDS compared with Vicryl suture (0.8 ± 0.6 vs. 0.4 ± 0.3 N, P < 0.001). The angle position was always stronger than the middle position (0.9 ± 0.6 vs. 0.3 ± 0.2 N, P < 0.001). There was a trend for the 10 to 12 mm LCA to have a better HG than the 5 mm ones (0.65 ± 0.5 vs. 0.51 ± 0.5 N, P = 0.08). We propose that 10 to 12 mm LCAs generate enough HG to secure a single strand when clips are placed at the angle position. This is especially true over PDS (hard) strands. The application of 5 mm LCA clips to secure the end of the Vicryl strand is not recommended. Further clinical studies are warranted.
Scalable Directed Self-Assembly Using Ultrasound Waves
2015-09-04
SECURITY CLASSIFICATION OF: We aim to understand how ultrasound waves can be used to create organized patterns of nanoparticles in a host medium such...as a polymer matrix material. The critical difference between the ultrasound technology studied in this project, and other directed self-assembly...of nanoparticles dispersed in a host medium are assembled by means of standing ultrasound waves. Additionally, we have obtained experimental
Unit costs of medium and heavy truck crashes.
DOT National Transportation Integrated Search
2008-03-01
This study provides the latest estimates of unit costs for highway crashes involving medium/heavy trucks by severity. Based on the latest data available, the estimated cost of police-reported crashes involving trucks with a gross weight rating of mor...
Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS)
2012-05-01
protect, and secure the United States and its interests. • AOF is the United States, Alaska, Canada, Mexico, Bahamas, Puerto Rico , and the U.S. Virgin...Criteria (UFC) for Smart Microgrid Cyber design guides for Industrial Control Systems (ICS) Residual systems Operations and Maintenance Operator...Training Sustainment Commercial Transition Cooperation with NIST for microgrid security standards Working with industry associations and
Architecture of security management unit for safe hosting of multiple agents
NASA Astrophysics Data System (ADS)
Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques
1999-04-01
In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-03
... for certificates representing units of fractional undivided interest in the Series' portfolio (``Units... offering price plus a front-end sales charge. If such a market is not maintained at any time for any Series... Equity Series will not restrict their portfolio investments to ``eligible trust securities.'' D. Capital...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-28
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: American United Gold Corporation, AMS Homecare Inc., Aucxis Corp., and CYOP Systems International Inc.; Order of Suspension of... current and accurate information concerning the securities of American United Gold Corporation because it...
Using RFID to Enhance Security in Off-Site Data Storage
Lopez-Carmona, Miguel A.; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R.
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention. PMID:22163638
Using RFID to enhance security in off-site data storage.
Lopez-Carmona, Miguel A; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.
Davoren, Mary; Byrne, Orla; O'Connell, Paul; O'Neill, Helen; O'Reilly, Ken; Kennedy, Harry G
2015-11-23
Patients admitted to a secure forensic hospital are at risk of a long hospital stay. Forensic hospital beds are a scarce and expensive resource and ability to identify the factors predicting length of stay at time of admission would be beneficial. The DUNDRUM-1 triage security scale and DUNDRUM-2 triage urgency scale are designed to assess need for therapeutic security and urgency of that need while the HCR-20 predicts risk of violence. We hypothesized that items on the DUNDRUM-1 and DUNDRUM-2 scales, rated at the time of pre-admission assessment, would predict length of stay in a medium secure forensic hospital setting. This is a prospective study. All admissions to a medium secure forensic hospital setting were collated over a 54 month period (n = 279) and followed up for a total of 66 months. Each patient was rated using the DUNDRUM-1 triage security scale and DUNDRUM-2 triage urgency scale as part of a pre-admission assessment (n = 279) and HCR-20 within 2 weeks of admission (n = 187). Episodes of harm to self, harm to others and episodes of seclusion whilst an in-patient were collated. Date of discharge was noted for each individual. Diagnosis at the time of pre-admission assessment (adjustment disorder v other diagnosis), predicted legal status (sentenced v mental health order) and items on the DUNDRUM-1 triage security scale and the DUNDRUM-2 triage urgency scale, also rated at the time of pre-admission assessment, predicted length of stay in the forensic hospital setting. Need for seclusion following admission also predicted length of stay. These findings may form the basis for a structured professional judgment instrument, rated prior to or at time of admission, to assist in estimating length of stay for forensic patients. Such a tool would be useful to clinicians, service planners and commissioners given the high cost of secure psychiatric care.
50 CFR 253.25 - Other administrative requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... to submit along with the application a taxpayer identification number (TIN) (social security number... reproduced by any mechanical, magnetic or other process or medium. (e) Paperwork Reduction Act. The...
50 CFR 253.25 - Other administrative requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... to submit along with the application a taxpayer identification number (TIN) (social security number... reproduced by any mechanical, magnetic or other process or medium. (e) Paperwork Reduction Act. The...
50 CFR 253.25 - Other administrative requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... to submit along with the application a taxpayer identification number (TIN) (social security number... reproduced by any mechanical, magnetic or other process or medium. (e) Paperwork Reduction Act. The...
50 CFR 253.25 - Other administrative requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... to submit along with the application a taxpayer identification number (TIN) (social security number... reproduced by any mechanical, magnetic or other process or medium. (e) Paperwork Reduction Act. The...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-21
...; Zion Nuclear Power Station, Units 1 and 2; Exemption From Certain Security Requirements 1.0 Background Zion Nuclear Power Station (ZNPS or Zion), Unit 1, is a Westinghouse 3250 MWt Pressurized Water Reactor... activities in nuclear power reactors against radiological sabotage,'' paragraph (b)(1) states, ``The licensee...
Weaponizing the Final Frontier: The United States and the New Space Race
2017-06-09
42 CHAPTER 3 RESEARCH METHODOLOGY ................................................................43 Documentary Analysis...Commission to Assess United States National Security Space Management and Organization, Executive Summary. The report concluded that to avoid a “Space Pearl...2010), 36. 10 Report of the Commission to Assess United States National Security Space Management and Organization pursuant to Public Law 106-65
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-11
... for Grant Proposals: Study of the United States Institute on U.S. National Security Policymaking... 11, 2011. Executive Summary: The Branch for the Study of the U.S., Office of Academic Exchange... design and implementation of the Study of the United States Institute on U.S. National Security...
Code of Federal Regulations, 2014 CFR
2014-04-01
... residing in the United States under color of law. 416.1619 Section 416.1619 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Residence and Citizenship § 416.1619 When you cannot be considered permanently residing in the United States under color of...
Code of Federal Regulations, 2010 CFR
2010-04-01
... residing in the United States under color of law. 416.1619 Section 416.1619 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Residence and Citizenship § 416.1619 When you cannot be considered permanently residing in the United States under color of...
Code of Federal Regulations, 2013 CFR
2013-04-01
... residing in the United States under color of law. 416.1619 Section 416.1619 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Residence and Citizenship § 416.1619 When you cannot be considered permanently residing in the United States under color of...
Code of Federal Regulations, 2011 CFR
2011-04-01
... residing in the United States under color of law. 416.1619 Section 416.1619 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Residence and Citizenship § 416.1619 When you cannot be considered permanently residing in the United States under color of...
Code of Federal Regulations, 2012 CFR
2012-04-01
... residing in the United States under color of law. 416.1619 Section 416.1619 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Residence and Citizenship § 416.1619 When you cannot be considered permanently residing in the United States under color of...
Use of Security Officers on Inpatient Psychiatry Units.
Lawrence, Ryan E; Perez-Coste, Maria M; Arkow, Stan D; Appelbaum, Paul S; Dixon, Lisa B
2018-04-02
Violent and aggressive behaviors are common among psychiatric inpatients. Hospital security officers are sometimes used to address such behaviors. Research on the role of security in inpatient units is scant. This study examined when security is utilized and what happens when officers arrive. The authors reviewed the security logbook and the medical records for all patients discharged from an inpatient psychiatry unit over a six-month period. Authors recorded when security calls happened, what behaviors triggered security calls, what outcomes occurred, and whether any patient characteristics were associated with security calls. A total of 272 unique patients were included. A total of 49 patients (18%) generated security calls (N=157 calls). Security calls were most common in the first week of hospitalization (N=45 calls), and roughly half of the patients (N=25 patients) had only one call. The most common inciting behavior was "threats to persons" (N=34 calls), and the most common intervention was intramuscular antipsychotic injection (N=49 calls). The patient variables associated with security calls were having more than one prior hospitalization (odds ratio [OR]=4.56, p=.001, 95% confidence interval [CI]=1.80-11.57), involuntary hospitalization (OR=5.09, p<.001, CI=2.28-11.33), and going to court for any reason (OR=5.80, p=.004, CI=1.75-19.15). Security officers were often called for threats of violence and occasionally called for actual violence. Patient variables associated with security calls are common among inpatients, and thus clinicians should stay attuned to patients' moment-to-moment care needs.
42 CFR 441.720 - Independent assessment.
Code of Federal Regulations, 2014 CFR
2014-10-01
... other information technology medium, if the following conditions are met: (A) The agent performing the... authorized under section 1115 or section 1915 of the Social Security Act. (b) Reassessments. The independent...
17 CFR 230.253 - Offering circular.
Code of Federal Regulations, 2011 CFR
2011-04-01
... permitted. (2) Where an offering circular is distributed through an electronic medium, issuers may satisfy... COMPLETENESS OF ANY OFFERING CIRCULAR OR OTHER SELLING LITERATURE. THESE SECURITIES ARE OFFERED PURSUANT TO AN...
17 CFR 230.253 - Offering circular.
Code of Federal Regulations, 2010 CFR
2010-04-01
... permitted. (2) Where an offering circular is distributed through an electronic medium, issuers may satisfy... COMPLETENESS OF ANY OFFERING CIRCULAR OR OTHER SELLING LITERATURE. THESE SECURITIES ARE OFFERED PURSUANT TO AN...
Rep. Lamborn, Doug [R-CO-5
2014-04-01
House - 04/16/2014 Referred to the Subcommittee on Immigration and Border Security. (All Actions) Notes: For further action, see S.2195, which became Public Law 113-100 on 4/18/2014. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Applying New Network Security Technologies to SCADA Systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P
2006-11-01
Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators.more » 4This page intentionally left blank.« less
5 CFR 1312.31 - Security violations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified Information § 1312.31 Security violations. (a) A security violation notice is issued by the United...
DNA-based cryptographic methods for data hiding in DNA media.
Marwan, Samiha; Shawish, Ahmed; Nagaty, Khaled
2016-12-01
Information security can be achieved using cryptography, steganography or a combination of them, where data is firstly encrypted using any of the available cryptography techniques and then hid into any hiding medium. Recently, the famous genomic DNA has been introduced as a hiding medium, known as DNA steganography, due to its notable ability to hide huge data sets with a high level of randomness and hence security. Despite the numerous cryptography techniques, to our knowledge only the vigenere cipher and the DNA-based playfair cipher have been combined with the DNA steganography, which keeps space for investigation of other techniques and coming up with new improvements. This paper presents a comprehensive analysis between the DNA-based playfair, vigenere, RSA and the AES ciphers, each combined with a DNA hiding technique. The conducted analysis reports the performance diversity of each combined technique in terms of security, speed, hiding capacity in addition to both key size and data size. Moreover, this paper proposes a modification of the current combined DNA-based playfair cipher technique, which makes it not only simple and fast but also provides a significantly higher hiding capacity and security. The conducted extensive experimental studies confirm such outstanding performance in comparison with all the discussed combined techniques. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 25 Indians 1 2012-04-01 2011-04-01 true Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of the...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 25 Indians 1 2011-04-01 2011-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of the...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 25 Indians 1 2013-04-01 2013-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of the...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 25 Indians 1 2014-04-01 2014-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of the...
Masys, D. R.; Baker, D. B.
1997-01-01
The Internet's World-Wide Web (WWW) provides an appealing medium for the communication of health related information due to its ease of use and growing popularity. But current technologies for communicating data between WWW clients and servers are systematically vulnerable to certain types of security threats. Prominent among these threats are "Trojan horse" programs running on client workstations, which perform some useful and known function for a user, while breaching security via background functions that are not apparent to the user. The Patient-Centered Access to Secure Systems Online (PCASSO) project of SAIC and UCSD is a research, development and evaluation project to exploit state-of-the-art security and WWW technology for health care. PCASSO is designed to provide secure access to clinical data for healthcare providers and their patients using the Internet. PCASSO will be evaluated for both safety and effectiveness, and may provide a model for secure communications via public data networks. PMID:9357644
Code of Federal Regulations, 2012 CFR
2012-10-01
...) Date of birth; (C) Social security number; (D) Payment history; (E) Account number; and (F) Name and... medium) by a health care provider who is a mental health professional documenting or analyzing the...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zagidullin, M V; Nikolaev, V D; Svistun, M I
2001-08-31
The gain, the temperature, and the absolute velocity of the supersonic active oxygen-iodine medium produced by an ejector nozzle unit were determined by the technique of high-resolution diode laser spectroscopy. The gain in the active medium is formed at less than 44 mm from the nozzle unit for an absolute flow velocity {nu} {approx} 600 m s{sup -1}. Upon dilution of oxygen by primary nitrogen in the ratio of 1 : 6.9, the gain of the active medium amounts to 7x10{sup -3} cm{sup -1}, the temperature of the active medium to 200 K, the absolute flow velocity to 580 mmore » s{sup -1}, and the pressure to 58 Torr. As the dilution is increased to 1 : 13.5, the gain reduces to 4.5x10{sup -3} cm{sup -1}, the temperature lowers to 180 K, the velocity of the active medium increases to 615 m s{sup -1}, and the pressure increases to 88 Torr. The increase in the initial content of water vapour in the oxygen flow results in an increase in the temperature and a decrease in the gain of the active medium. (active media)« less
37 CFR 5.1 - Applications and correspondence involving national security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... correspondence involving national security. 5.1 Section 5.1 Patents, Trademarks, and Copyrights UNITED STATES... involving national security. (a) All correspondence in connection with this part, including petitions... national security classified (see § 1.9(i) of this chapter) and contain authorized national security...
12 CFR 615.5500 - Definitions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5500 Definitions. In this subpart, unless the context otherwise requires or indicates: (a) Global debt securities means consolidated... United States or simultaneously inside and outside the United States. (b) Global agent means any fiscal...
12 CFR 615.5500 - Definitions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5500 Definitions. In this subpart, unless the context otherwise requires or indicates: (a) Global debt securities means consolidated... United States or simultaneously inside and outside the United States. (b) Global agent means any fiscal...
12 CFR 615.5500 - Definitions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5500 Definitions. In this subpart, unless the context otherwise requires or indicates: (a) Global debt securities means consolidated... United States or simultaneously inside and outside the United States. (b) Global agent means any fiscal...
12 CFR 615.5500 - Definitions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5500 Definitions. In this subpart, unless the context otherwise requires or indicates: (a) Global debt securities means consolidated... United States or simultaneously inside and outside the United States. (b) Global agent means any fiscal...
76 FR 14678 - Communications Unit Leader Prerequisite and Evaluation
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-17
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0004] Communications Unit Leader Prerequisite... Security (DHS), National Protection and Programs Directorate (NPPD), Cybersecurity and Communications (CS&C), Office of Emergency Communications (OEC) will submit the following information collection request to the...
Army Global Basing Posture: An Analytic Framework for Maximizing Responsiveness and Effectiveness
2015-01-01
potential changes in the national security environment and to evaluate U.S. Army stationing, prepositioning, security cooperation activities, and...report should be of interest to those concerned with U.S. global posture and national security strategy, especially as it pertains to U.S. land power...40 A.1. United Nations Support Index for Plenary Votes, by State ................................................ 64 A.2. United Nations
Sea Piracy in Southeast Asia: Implications for Countering Maritime Terrorism in the United States
2006-06-01
least ten agencies that have some involvement in maritime security management with nine authorized to conduct law enforcement operations at sea...exercises, cooperating on consequence management , and sustaining capacity building operations .173 The United States has important bilateral security...Overview and Evaluation,” Journal of Homeland Security and Emergency Management 2, no. 4 (2005). 221 Frittelli, “Terminal Operators ,” 2006, 3
DOT National Transportation Integrated Search
2009-10-01
This report presents the findings of a comprehensive engineering analysis of electronic stability control (ESC) and roll stability control (RSC) systems for single-unit medium and heavy trucks and large-platform buses. This report details the applica...
MAC layer security issues in wireless mesh networks
NASA Astrophysics Data System (ADS)
Reddy, K. Ganesh; Thilagam, P. Santhi
2016-03-01
Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.
7 CFR 51.2751 - U.S. Medium Virginia.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 2 2011-01-01 2011-01-01 false U.S. Medium Virginia. 51.2751 Section 51.2751... STANDARDS) United States Standards for Shelled Virginia Type Peanuts Grades § 51.2751 U.S. Medium Virginia. “U.S. Medium Virginia” consists of shelled Virginia type peanut kernels of similar varietal...
7 CFR 51.2751 - U.S. Medium Virginia.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 2 2010-01-01 2010-01-01 false U.S. Medium Virginia. 51.2751 Section 51.2751... STANDARDS) United States Standards for Shelled Virginia Type Peanuts Grades § 51.2751 U.S. Medium Virginia. “U.S. Medium Virginia” consists of shelled Virginia type peanut kernels of similar varietal...
7 CFR 51.2751 - U.S. Medium Virginia.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 2 2012-01-01 2012-01-01 false U.S. Medium Virginia. 51.2751 Section 51.2751... STANDARDS) United States Standards for Shelled Virginia Type Peanuts Grades § 51.2751 U.S. Medium Virginia. “U.S. Medium Virginia” consists of shelled Virginia type peanut kernels of similar varietal...
24 CFR 891.635 - Security deposits.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Security deposits. 891.635 Section... Assistance § 891.635 Security deposits. The general requirements for security deposits on assisted units are... a security deposit equal to one month's rent payable by the family. (b) The Borrower shall maintain...
Privacy and security of patient data in the pathology laboratory.
Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.
Lower crustal section of the Oman Ophiolite drilled in Hole GT1A, ICDP Oman Drilling Project
NASA Astrophysics Data System (ADS)
Umino, S.; Kelemen, P. B.; Matter, J. M.; Coggon, J. A.; Takazawa, E.; Michibayashi, K.; Teagle, D. A. H.
2017-12-01
Hole GT1A (22° 53.535'N, 58° 30.904'E) was drilled by the Oman Drilling Project (OmDP) into GT1A of the Samail ophiolite, Oman. OmDP is an international collaboration supported by the International Continental Scientific Drilling Program, the Deep Carbon Observatory, NSF, IODP, JAMSTEC, and the European, Japanese, German and Swiss Science Foundations, with in-kind support in Oman from the Ministry of Regional Municipalities and Water Resources, Public Authority of Mining, Sultan Qaboos University, and the German University of Technology. Hole GT1A was diamond cored in 22 Jan to 08 Feb 2017 to a total depth of 403.05 m. The outer surfaces of the cores were imaged and described on site before being curated, boxed and shipped to the IODP drill ship Chikyu, where they underwent comprehensive visual and instrumental analysis. Hole GT1A drilled the lower crustal section in the southern Oman Ophiolite and recovered 401.52 m of total cores (99.6% recovery). The main lithology is dominated by olivine gabbro (65.9%), followed in abundance by olivine-bearing gabbro (21.5%) and olivine melagabbro (3.9%). Minor rock types are orthopyroxene-bearing olivine gabbro (2.4%), oxide-bearing olivine gabbro (1.5%), gabbro (1.1%), anorthositic gabbro (1%), troctolitic gabbro (0.8%); orthopyroxene-bearing gabbro (0.5%), gabbronorite (0.3%); and dunite (0.3%). These rocks are divided into Lithologic Unit I to VII at 26.62 m, 88.16 m, 104.72 m, 154.04 m, 215.22 m, 306.94 m in Chikyu Curated Depth in descending order; Unit I and II consist of medium-grained olivine gabbro with lower olivine abundance in Unit II. Unit III is medium-grained olivine melagabbros, marked by an increase in olivine. Unit IV is relatively homogenous medium-grained olivine gabbros with granular textures. Unit V is identified by the appearance of fine-grained gabbros, but the major rocktypes are medium grained olivine gabbros. Unit VI is medium-grained olivine gabbro, marked by appearance of orthopyroxene. Unit VII is of fine- to medium-grained olivine gabbros with less olivine.
Hemrich, Günter
2005-06-01
This case study reviews the experience of the Somalia Food Security Assessment Unit (FSAU) of operating a food security information system in the context of a complex emergency. In particular, it explores the linkages between selected features of the protracted crisis environment in Somalia and conceptual and operational aspects of food security information work. The paper specifically examines the implications of context characteristics for the establishment and operations of the FSAU field monitoring component and for the interface with information users and their diverse information needs. It also analyses the scope for linking food security and nutrition analysis and looks at the role of conflict and gender analysis in food security assessment work. Background data on the food security situation in Somalia and an overview of some key features of the FSAU set the scene for the case study. The paper is targeted at those involved in designing, operating and funding food security information activities.
DOT National Transportation Integrated Search
2008-12-05
1) The August 2006 attempt by individuals to carry liquid explosives onboard multiple commercial aircraft bound for the United States from the United Kingdom has highlighted both the continued importance of securing the civil aviation system and the ...
32 CFR 327.6 - Collecting personal information
Code of Federal Regulations, 2012 CFR
2012-07-01
... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used to...
32 CFR 327.6 - Collecting personal information.
Code of Federal Regulations, 2014 CFR
2014-07-01
... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used to...
32 CFR 327.6 - Collecting personal information
Code of Federal Regulations, 2010 CFR
2010-07-01
... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used to...
32 CFR 327.6 - Collecting personal information
Code of Federal Regulations, 2011 CFR
2011-07-01
... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used to...
32 CFR 327.6 - Collecting personal information.
Code of Federal Regulations, 2013 CFR
2013-07-01
... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used to...
New technologies in the management of risk and violence in forensic settings.
Tully, John; Larkin, Fintan; Fahy, Thomas
2015-06-01
Novel technological interventions are increasingly used in mental health settings. In this article, we describe 3 novel technological strategies in use for management of risk and violence in 2 forensic psychiatry settings in the United Kingdom: electronic monitoring by GPS-based tracking devices of patients on leave from a medium secure service in London, and closed circuit television (CCTV) monitoring and motion sensor technology at Broadmoor high secure hospital. A common theme is the use of these technologies to improve the completeness and accuracy of data used by clinicians to make clinical decisions. Another common thread is that each of these strategies supports and improves current clinical approaches rather than drastically changing them. The technologies offer a broad range of benefits. These include less restrictive options for patients, improved accountability of both staff and patients, less invasive testing, improved automated record-keeping, and better assurance reporting. Services utilizing technologies need also be aware of limitations. Technologies may be seen as unduly restrictive by patients and advocates, and technical issues may reduce effectiveness. It is vital that the types of technological innovations described in this article should be subject to thorough evaluation that addresses cost effectiveness, qualitative analysis of patients' attitudes, safety, and ethical considerations.
49 CFR 1546.211 - Law enforcement personnel.
Code of Federal Regulations, 2012 CFR
2012-10-01
....211 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Operations § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...
49 CFR 1546.211 - Law enforcement personnel.
Code of Federal Regulations, 2011 CFR
2011-10-01
....211 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Operations § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...
49 CFR 1546.211 - Law enforcement personnel.
Code of Federal Regulations, 2014 CFR
2014-10-01
....211 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Operations § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...
49 CFR 1546.211 - Law enforcement personnel.
Code of Federal Regulations, 2013 CFR
2013-10-01
....211 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Operations § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...
Rep. Miller, Jeff [R-FL-1
2011-06-14
House - 05/08/2012 Placed on the Union Calendar, Calendar No. 328. (All Actions) Notes: For further action, see H.R.6328, which became Public Law 112-271 on 1/14/2013. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Evaluation of Traditional Security Solutions in the SCADA Environment
2012-03-01
Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Robert D. Larkin, Captain, USAF AFIT/GCO/ENG/12-06 DEPARTMENT OF THE AIR...views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, Department...United States. AFIT/GCO/ENG/12-06 Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Presented to the Faculty Department of
Illegal Immigration in the United States: Implications for Rule of Law and National Security
2012-02-15
AIR WAR COLLEGE AIR UNIVERSITY ILLEGAL IMMIGRATION IN THE UNITED STATES: IMPLICATIONS FOR RULE OF LAW AND NATIONAL SECURITY By Paul A...government’s failure to strictly enforce immigration laws presents national security vulnerabilities and is subversive to the rule of law . Without...the rule of law , serious social tensions will occur that impel states and localities to fill the void left by the lack of immigration enforcement. In
KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer on Smartphones
2011-05-01
format data to exchange because contact information can be exported to V- Cards using existing APIs. For these reasons it was chosen as the medium to... Card format allows customization of this field. The service provider field serves to identify the app the key is for and the username field stores the...public key data. A sample V- Card field looks like Listing 1 below. IMPP;TextSecure
How Space - The Fourth Operational Medium - Supports Operational Maneuver.
1987-05-17
51981 87-3044 87 9 18 014 UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704-0188 la. REPORT...P. J anecek (14213 AT L_ aCd) ZL-wI DO Form 1473, JUN 86 Previous editions are obsolete. SECURITY CLASSIFICATION OF THIS PAGE UNCLASSIFIED . ~18...Space technology, superior and enhanced weapons, and space systems combine to form spacepower that can be exploited to enhance ground force mission
Globalized Security Reshaping America’s Defense Trade Policy
2001-04-01
AU/SCHOOL/NNN/2001-04 THE ATLANTIC COUNCIL OF THE UNITED STATES AIR UNIVERSITY NATIONAL DEFENSE FELLOWSHIP PROGRAM GLOBALIZED SECURITY RESHAPING...Author(s) Sullivan, Shannon M. Project Number Task Number Work Unit Number Performing Organization Name(s) and Address(es) Air University Maxwell...Makins, President of the Atlantic Council of the United States, did appreciate these factors , and he steered me into what became a fascinating
Illicit Drug Trade-Impact on United States National Health Care
2013-03-01
pobreza en Mexico sube a 52 milliones,” CNN Expansion, July 29, 2011, http://www.cnnexpansion.com/ economia /2011/07/29/pobreza- mexico -2010 (accessed...Unlimited. 13. SUPPLEMENTARY NOTES Word Count: 5,569 14. ABSTRACT The United States and Mexico face a myriad of threats to national security...Policy Classification: Unclassified The United States and Mexico face a myriad of threats to national security
Worldwide Report, Arms Control.
1985-07-19
on measures of substantially reducing medium -range nuclear arms to agreed-upon levels on the basis of reciprocity and in strict conformity with the ...to the United States to reach agreement on the immediate discontinua- tion by the United States of the deployment of medium -range missiles in Europe... by unilaterally imposing a moratorium on the
Arno, Peter S; House, James S; Viola, Deborah; Schechter, Clyde
2011-05-01
Social Security is the most important and effective income support program ever introduced in the United States, alleviating the burden of poverty for millions of elderly Americans. We explored the possible role of Social Security in reducing mortality among the elderly. In support of this hypothesis, we found that declines in mortality among the elderly exceeded those among younger age groups following the initial implementation of Social Security in 1940, and also in the periods following marked improvements in Social Security benefits via legislation and indexing of benefits that occurred between the mid-1960s and the early 1970s. A better understanding of the link between Social Security and health status among the elderly would add a significant and missing dimension to the public discourse over the future of Social Security, and the potential role of income support programs in reducing health-related socioeconomic disparities and improving population health.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-02
... DEPARTMENT OF JUSTICE [OMB Number 1124-0001] National Security Division; Agency Information..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit... Justice sponsoring the collection: Form Number: NSD- 1. National Security Division, U.S. Department of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-02
... DEPARTMENT OF JUSTICE [OMB Number 1124-0006] National Security Division; Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-23
... Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the United.... 110-181, enacted January 28, 2008), section 862, entitled ``Contractors Performing Private Security... NDAA required standardization of rules for private security contractors that are performing in...
Kasztelowicz, Piotr; Czubenko, Marek; Zieba, Iwona
2003-01-01
The informatical revolution in computer age, which gives significant benefit in transfer of medical information requests to pay still more attention for aspect of network security. All known advantages of network technologies--first of all simplicity of copying, multiplication and sending information to many individuals can be also dangerous, if illegal, not permitted persons get access to medical data bases. Internet is assumed to be as especially "anarchic" medium, therefore in order to use it in professional work any security principles should be bewared. In our presentation we will try to find the optimal security solution in organisational and technological aspects for any medical network. In our opinion the harmonious co-operation between users, medical authorities and network administrators is core of the success.
Code of Federal Regulations, 2010 CFR
2010-10-01
... to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Transportation of... determines is not known or is a threat to security. (e) At the border. (1) Train crew members who are not U.S...
About the Transportation Secure Data Center | Transportation Secure Data
Center | NREL About the Transportation Secure Data Center About the Transportation Secure Data Center The Transportation Secure Data Center (TSDC) makes vital transportation data broadly available large, colorful map of the United States. NREL data experts and engineers analyze large sets of complex
NASA Astrophysics Data System (ADS)
Born, Joshua
The purpose of this research was to examine the cyber-security posture for the United States' electrical grid, which comprises a major component of critical infrastructure for the country. The United States electrical sector is so vast, that the Department of Homeland Security (DHS) estimates, it contains more than 6,413 power plants (this includes 3,273 traditional electric utilities and 1,738 nonutility power producers) with approximately 1,075 gigawatts of energy produced on a daily basis. A targeted cyber-security attack against the electric grid would likely have catastrophic results and could even serve as a precursor to a physical attack against the United States. A recent report by the consulting firm Black and Veatch found that one of the top five greatest concerns for United States electric utilities is the risk that cybersecurity poses to their industry and yet, only one-third state they are currently prepared to meet the increasingly likely threat. The report goes on to state, "only 32% of electric utilities surveyed had integrated security systems with the proper segmentation, monitoring and redundancies needed for cyber threat protection. Another 48 % said they did not" Recent estimates indicate that a large-scale cyber-attack against this sector could cost the United States economy as much as a trillion dollars within a weeks' time. Legislative efforts in the past have primarily been focused on creating mandates that encourage public and private partnership, which have been not been adopted as quickly as desired. With 85 % of all electric utilities being privately owned, it is key that the public and private sector partner in order to mitigate risks and respond as a cohesive unit in the event of a major attack. Keywords: Cybersecurity, Professor Riddell, cyber security, energy, intelligence, outlook, electrical, compliance, legislation, partnerships, critical infrastructure.
20 CFR 220.131 - Work which exists in the national economy.
Code of Federal Regulations, 2013 CFR
2013-04-01
... and medium jobs exist in the national economy: (1) Dictionary of Occupational Titles, published by the..., also published by the Bureau of the Census. (4) Occupational Analyses, prepared for the Social Security...
20 CFR 220.131 - Work which exists in the national economy.
Code of Federal Regulations, 2012 CFR
2012-04-01
... and medium jobs exist in the national economy: (1) Dictionary of Occupational Titles, published by the..., also published by the Bureau of the Census. (4) Occupational Analyses, prepared for the Social Security...
20 CFR 220.131 - Work which exists in the national economy.
Code of Federal Regulations, 2011 CFR
2011-04-01
... and medium jobs exist in the national economy: (1) Dictionary of Occupational Titles, published by the..., also published by the Bureau of the Census. (4) Occupational Analyses, prepared for the Social Security...
20 CFR 220.131 - Work which exists in the national economy.
Code of Federal Regulations, 2014 CFR
2014-04-01
... and medium jobs exist in the national economy: (1) Dictionary of Occupational Titles, published by the..., also published by the Bureau of the Census. (4) Occupational Analyses, prepared for the Social Security...
20 CFR 220.131 - Work which exists in the national economy.
Code of Federal Regulations, 2010 CFR
2010-04-01
... and medium jobs exist in the national economy: (1) Dictionary of Occupational Titles, published by the..., also published by the Bureau of the Census. (4) Occupational Analyses, prepared for the Social Security...
33 CFR 107.210 - Applicability.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 107.210 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY... Territorial Waters § 107.210 Applicability. (a) This subpart applies to: (1) Vessels of the United States less... territorial waters; (2) Vessels of the United States less than 100 meters (328 feet) in length (and all...
20 CFR 416.1600 - Introduction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Introduction. 416.1600 Section 416.1600 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... United States (see § 416.1615); or (c) An alien permanently residing in the United States under color of...
20 CFR 416.1600 - Introduction.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Introduction. 416.1600 Section 416.1600 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... United States (see § 416.1615); or (c) An alien permanently residing in the United States under color of...
20 CFR 416.1600 - Introduction.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Introduction. 416.1600 Section 416.1600 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... United States (see § 416.1615); or (c) An alien permanently residing in the United States under color of...
20 CFR 416.1600 - Introduction.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Introduction. 416.1600 Section 416.1600 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... United States (see § 416.1615); or (c) An alien permanently residing in the United States under color of...
20 CFR 416.1600 - Introduction.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Introduction. 416.1600 Section 416.1600 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... United States (see § 416.1615); or (c) An alien permanently residing in the United States under color of...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pregenzer, Arian Leigh
2011-12-01
The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunitiesmore » for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.« less
A security architecture for interconnecting health information systems.
Gritzalis, Dimitris; Lambrinoudakis, Costas
2004-03-31
Several hereditary and other chronic diseases necessitate continuous and complicated health care procedures, typically offered in different, often distant, health care units. Inevitably, the medical records of patients suffering from such diseases become complex, grow in size very fast and are scattered all over the units involved in the care process, hindering communication of information between health care professionals. Web-based electronic medical records have been recently proposed as the solution to the above problem, facilitating the interconnection of the health care units in the sense that health care professionals can now access the complete medical record of the patient, even if it is distributed in several remote units. However, by allowing users to access information from virtually anywhere, the universe of ineligible people who may attempt to harm the system is dramatically expanded, thus severely complicating the design and implementation of a secure environment. This paper presents a security architecture that has been mainly designed for providing authentication and authorization services in web-based distributed systems. The architecture has been based on a role-based access scheme and on the implementation of an intelligent security agent per site (i.e. health care unit). This intelligent security agent: (a). authenticates the users, local or remote, that can access the local resources; (b). assigns, through temporary certificates, access privileges to the authenticated users in accordance to their role; and (c). communicates to other sites (through the respective security agents) information about the local users that may need to access information stored in other sites, as well as about local resources that can be accessed remotely.
Materiel Readiness Support Activity Automation Plan
1986-09-01
Hardwire leased lines Sytek RF broadband cable modems Digital phone switched service Medium Speed - up to 56k baud RF modems Digital phone service High...dialing 121 I iI Medium Speed - up to 56k baud RF modems - up to 56k baud sync modem $2070 plus installation - $25 per month maintenance - $1200 per...security is to disconnect net- work, modem , and hardwire access (that is, all external access to the machine) after 5 p.m. (normal business hours
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false General. 204.3 Section 204.3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES RELATING TO DEBT COLLECTION...; the Social Security Act; or the tariff laws of the United States. (e) The procedures for...
The vulnerable do-gooders: security strategies of German aid agencies.
Schneiker, Andrea
2013-04-01
Humanitarian and development agencies have confronted growing insecurity in some of the regions in which they work over the course of the past decade. Consequently, aid agencies are changing their approach to security issues. Compared to aid agencies from other countries, especially the United Kingdom and the United States, German aid agencies have been relatively slow to adopt security measures. In addition, the security measures they have selected differ from one agency to another, even in comparable security contexts. The literature on organisational learning helps to explain these differences. The findings show that external and internal organisational factors influence an aid agency's choice of a particular security measure. The different responses of German aid agencies to the changing security environment demonstrate that security measures are not only influenced by an organisation's identity but also can be a way for them to demonstrate their identity and thereby distinguish themselves from other actors that deliver aid. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.
Optical smart card using semipassive communication.
Glaser, I; Green, Shlomo; Dimkov, Ilan
2006-03-15
An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.
Optical smart card using semipassive communication
NASA Astrophysics Data System (ADS)
Glaser, I.; Green, Shlomo; Dimkov, Ilan
2006-03-01
An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.
Environmental Security in the Danube River Basin: Policy Implications for the United States
1999-01-01
United Nations Environmental Programme and Centre for Human Settlements jointly formed a Balkans Task Force that has been conducting independent and...1199 V ACKNOWLEDGMENTS I would like to thank the United States Air Force Institute for National Security Studies (TNSS) and the Army Environmental...regularly scheduled course on Responsibilities of Military Forces in Environmental Protection. Mr. Robert Jarrett of AEPI provided valuable review
Security Protection on Trust Delegated Data in Public Mobile Networks
NASA Astrophysics Data System (ADS)
Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin
This paper provides detailed solutions for trust delegation and security protection for medical records in public mobile communication networks. The solutions presented in this paper enable the development of software for mobile devices that can be used by emergency medical units in urgent need of sensitive personal information about unconscious patients. In today's world, technical improvements in mobile communication systems mean that users can expect to have access to data at any time regardless of their location. This paper presents a token-based procedure for the data security at a mobile device and delegation of trust between a requesting mobile unit and secure medical data storage. The data security at the mobile device is enabled using identity based key generation methodology.
The Counter Terrorist Classroom: Religion, Education, and Security
ERIC Educational Resources Information Center
Gearon, Liam
2013-01-01
The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-01
... following: Individual names, addresses, phone numbers, dates of birth, driver's license numbers, social security numbers, license plate numbers, medical information (typically in the case of accidents or... numbers, social security numbers, license plate numbers, medical information (typically in the case of...
Attachment and Culture: Security in the United States and Japan.
ERIC Educational Resources Information Center
Rothman, Fred; Weisz, John; Pott, Martha; Morelli, Gilda; Miyake, Kazuo
2000-01-01
Highlights evidence of cultural variations in child attachment, noting how western values and meanings permeate attachment theory. Comparisons of the United States and Japan emphasize the cultural relativity of three core hypotheses of attachment theory related to: caregiver sensitivity, child social competence, and a secure base for exploring the…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-29
... for the following securities: Index-Linked Exchangeable Notes; Equity Gold Shares; Trust Certificates; Commodity-Based Trust Shares; Currency Trust Shares; Commodity Index Trust Shares; Commodity Futures Trust Shares; Partnership Units; Trust Units; Managed Trust Securities; and Currency Warrants (together with...
15 CFR 2008.16 - Security education program.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 15 Commerce and Foreign Trade 3 2012-01-01 2012-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...
15 CFR 2008.16 - Security education program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 15 Commerce and Foreign Trade 3 2011-01-01 2011-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...
15 CFR 2008.16 - Security education program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 15 Commerce and Foreign Trade 3 2013-01-01 2013-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...
15 CFR 2008.16 - Security education program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 15 Commerce and Foreign Trade 3 2014-01-01 2014-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...
20 CFR 416.1327 - Suspension due to absence from the United States.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Suspension due to absence from the United States. 416.1327 Section 416.1327 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Suspensions and Terminations § 416.1327 Suspension due to...
78 FR 22526 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-16
...); (4) United States Social Security Number (SSN), (if any), United States Immigration and Naturalization Service (INS) Identification or similar number(s), (if any), and any equivalent social security or...) spouse; (c) children; (d) brothers; (e) sisters; (f) others; (9) team name; (10) place of insertion; (11...
Privacy and security of patient data in the pathology laboratory
Cucoranu, Ioan C.; Parwani, Anil V.; West, Andrew J.; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B.; Balis, Ulysses J.; Tuthill, Mark J.; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904
Naval Response to a Changed Security Environment: Maritime Security in the Mediterranean
2007-01-01
other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a...PAGES 28 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8...elements. The first was to use inflatable Zodiac -type speedboats to attack ships. The second was to blow up medium-sized vessels near other ships
Security Force Assistance Logistics: The Key to Self-Reliance?
2011-05-19
internal defense – the umbrella term that SFA falls under – and directly linked to assisting the foreign security force (FSF) “with the procurement...ideology.6 To some extent or another logistics figures prominently under the umbrella of military advising, so there is understandably a certain degree...billion” under the Mutual Defense Assistance Program (MDAP), which “included more than 1,100 medium-gun M47 and M48 Patton tanks, 152 light-gun tanks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Qojas, M.
1999-03-01
This document is an analysis of options for unilateral and cooperative action to improve the security of Jordan's borders. Sections describe the current political, economic, and social interactions along Jordan's borders. Next, the document discusses border security strategy for cooperation among neighboring countries and the adoption of confidence-building measures. A practical cooperative monitoring system would consist of hardware for early warning, command and control, communications, and transportation. Technical solutions can expand opportunities for the detection and identification of intruders. Sensors (such as seismic, break-wire, pressure-sensing, etc.) can warn border security forces of intrusion and contribute to the identification of themore » intrusion and help formulate the response. This document describes conceptual options for cooperation, offering three scenarios that relate to three hypothetical levels (low, medium, and high) of cooperation. Potential cooperative efforts under a low cooperation scenario could include information exchanges on military equipment and schedules to prevent misunderstandings and the establishment of protocols for handling emergency situations or unusual circumstances. Measures under a medium cooperation scenario could include establishing joint monitoring groups for better communications, with hot lines and scheduled meetings. The high cooperation scenario describes coordinated responses, joint border patrols, and sharing border intrusion information. Finally, the document lists recommendations for organizational, technical, and operational initiatives that could be applicable to the current situation.« less
17 CFR 240.3b-4 - Definition of “foreign government,” “foreign issuer” and “foreign private issuer”.
Code of Federal Regulations, 2010 CFR
2010-04-01
... voting securities beneficially owned by residents of the United States as reported on reports of... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Definition of âforeign... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES...
Coping with Iran: Confrontation, Containment, or Engagement?
2007-01-01
David Ignatius (national security columnist , The Washington Post) IRAN’S NATIONAL SECURITY ENVIRONMENT Mohammad Javad Zarif Iran’s national security...senior editor, Newsweek) David Ignatius (national security columnist , The Washington Post) HOW THE U.S. GOVERNMENT VIEWS IRAN R. Nicholas Burns...Iranian Ambassador to the United Nations Questions Michael Hirsh Senior Editor Newsweek David Ignatius National Security Columnist The Washington
78 FR 17469 - Government Securities: Call for Large Position Reports
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-21
... DEPARTMENT OF THE TREASURY Government Securities: Call for Large Position Reports AGENCY: Office... Reserve Bank of New York, Government Securities Dealer Statistics Unit, 4th Floor, 33 Liberty Street, New... Eidemiller, or Kevin Hawkins; Government Securities Regulations Staff, Department of the Treasury, at 202-504...
Code of Federal Regulations, 2011 CFR
2011-07-01
..., Medium, and Large HMIWI 1 Table 1 to Subpart HHH of Part 62 Protection of Environment ENVIRONMENTAL... 62—Emission Limits for Small Rural, Small, Medium, and Large HMIWI Pollutant Units (7 percent oxygen, dry basis at standard conditions) Emission limits HMIWI size Small rural Small Medium Large...
Code of Federal Regulations, 2012 CFR
2012-07-01
..., Medium, and Large HMIWI 1 Table 1 to Subpart HHH of Part 62 Protection of Environment ENVIRONMENTAL... 62—Emission Limits for Small Rural, Small, Medium, and Large HMIWI Pollutant Units (7 percent oxygen, dry basis at standard conditions) Emission limits HMIWI size Small rural Small Medium Large...
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Medium, and Large HMIWI 1 Table 1 to Subpart HHH of Part 62 Protection of Environment ENVIRONMENTAL... 62—Emission Limits for Small Rural, Small, Medium, and Large HMIWI Pollutant Units (7 percent oxygen, dry basis at standard conditions) Emission limits HMIWI size Small rural Small Medium Large...
Security in MANETs using reputation-adjusted routing
NASA Astrophysics Data System (ADS)
Ondi, Attila; Hoffman, Katherine; Perez, Carlos; Ford, Richard; Carvalho, Marco; Allen, William
2009-04-01
Mobile Ad-Hoc Networks enable communication in various dynamic environments, including military combat operations. Their open and shared communication medium enables new forms of attack that are not applicable for traditional wired networks. Traditional security mechanisms and defense techniques are not prepared to cope with the new attacks and the lack of central authorities make identity verifications difficult. This work extends our previous work in the Biologically Inspired Tactical Security Infrastructure to provide a reputation-based weighing mechanism for linkstate routing protocols to protect the network from attackers that are corrupting legitimate network traffic. Our results indicate that the approach is successful in routing network traffic around compromised computers.
Huang, Lu-Chou; Chu, Huei-Chung; Lien, Chung-Yueh; Hsiao, Chia-Hung; Kao, Tsair
2009-09-01
As patients face the possibility of copying and keeping their electronic health records (EHRs) through portable storage media, they will encounter new risks to the protection of their private information. In this study, we propose a method to preserve the privacy and security of patients' portable medical records in portable storage media to avoid any inappropriate or unintentional disclosure. Following HIPAA guidelines, the method is designed to protect, recover and verify patient's identifiers in portable EHRs. The results of this study show that our methods are effective in ensuring both information security and privacy preservation for patients through portable storage medium.
The neoliberal political economy and erosion of retirement security.
Polivka, Larry; Luo, Baozhen
2015-04-01
The origins and trajectory of the crisis in the United States retirement security system have slowly become part of the discussion about the social, political, and economic impacts of population aging. Private sources of retirement security have weakened significantly since 1980 as employers have converted defined benefits precisions to defined contribution plans. The Center for Retirement Research (CRR) now estimates that over half of boomer generation retirees will not receive 70-80% of their wages while working. This erosion of the private retirement security system will likely increase reliance on the public system, mainly Social Security and Medicare. These programs, however, have increasingly become the targets of critics who claim that they are not financially sustainable in their current form and must be significantly modified. This article will focus on an analysis of these trends in the erosion of the United States retirement security system and their connection to changes in the United States political economy as neoliberal, promarket ideology, and policies (low taxes, reduced spending, and deregulation) have become dominant in the private and public sectors. The neoliberal priority on reducing labor costs and achieving maximum shareholder value has created an environment inimical to maintain the traditional system of pension and health care benefits in both the private and public sectors. This article explores the implications of these neoliberal trends in the United States economy for the future of retirement security. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Land Ecological Security Evaluation of Guangzhou, China
Xu, Linyu; Yin, Hao; Li, Zhaoxue; Li, Shun
2014-01-01
As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES) plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES), has been introduced with the city of Guangzhou, China, as a case study, which evaluates the LES in regional and unit scales for reasonable and specific urban planning. In the evaluation process with this method, we have combined the material security with the spiritual security that is inevitably associated with LES. Some new coefficients of land-security supply/demand distribution and technology contribution for LES evaluation have also been introduced for different spatial scales, including the regional and the unit scales. The results for Guangzhou indicated that, temporally, the LES supply indices were 0.77, 0.84 and 0.77 in 2000, 2006 and 2009 respectively, while LES demand indices for the city increased in 2000, 2006 and 2009 from 0.57 to 0.95, which made the LES level decreased slowly in this period. Spatially, at the regional scale, the urban land ecological security (ULES) level decreased from 0.2 (marginal security) to −0.18 (marginal insecurity) as a whole; in unit scale, areas in the north and in parts of the east were relatively secure and the security area was shrinking with time, but the central and southern areas turned to be marginal insecurity, especially in 2006 and 2009. This study proposes that DLES evaluation should be conducted for targeted and efficient urban planning and management, which can reflect the LES level of study area in general and in detail. PMID:25321873
Land ecological security evaluation of Guangzhou, China.
Xu, Linyu; Yin, Hao; Li, Zhaoxue; Li, Shun
2014-10-15
As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES) plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES), has been introduced with the city of Guangzhou, China, as a case study, which evaluates the LES in regional and unit scales for reasonable and specific urban planning. In the evaluation process with this method, we have combined the material security with the spiritual security that is inevitably associated with LES. Some new coefficients of land-security supply/demand distribution and technology contribution for LES evaluation have also been introduced for different spatial scales, including the regional and the unit scales. The results for Guangzhou indicated that, temporally, the LES supply indices were 0.77, 0.84 and 0.77 in 2000, 2006 and 2009 respectively, while LES demand indices for the city increased in 2000, 2006 and 2009 from 0.57 to 0.95, which made the LES level decreased slowly in this period. Spatially, at the regional scale, the urban land ecological security (ULES) level decreased from 0.2 (marginal security) to -0.18 (marginal insecurity) as a whole; in unit scale, areas in the north and in parts of the east were relatively secure and the security area was shrinking with time, but the central and southern areas turned to be marginal insecurity, especially in 2006 and 2009. This study proposes that DLES evaluation should be conducted for targeted and efficient urban planning and management, which can reflect the LES level of study area in general and in detail.
31 CFR 370.1 - What special terms do I need to know to understand this part?
Code of Federal Regulations, 2014 CFR
2014-07-01
... electronic medium and is retrievable in perceivable form. Electronic signature means a signature of an...Direct account number, your social security account number or employer identification number, and your...
31 CFR 370.1 - What special terms do I need to know to understand this part?
Code of Federal Regulations, 2011 CFR
2011-07-01
... electronic medium and is retrievable in perceivable form. Electronic signature means a signature of an...Direct account number, your social security account number or employer identification number, and your...
31 CFR 370.1 - What special terms do I need to know to understand this part?
Code of Federal Regulations, 2012 CFR
2012-07-01
... electronic medium and is retrievable in perceivable form. Electronic signature means a signature of an...Direct account number, your social security account number or employer identification number, and your...
31 CFR 370.1 - What special terms do I need to know to understand this part?
Code of Federal Regulations, 2013 CFR
2013-07-01
... electronic medium and is retrievable in perceivable form. Electronic signature means a signature of an...Direct account number, your social security account number or employer identification number, and your...
28 CFR 540.14 - General correspondence.
Code of Federal Regulations, 2012 CFR
2012-07-01
... address. (2) Except for “special mail,” outgoing mail from a sentenced inmate in a medium or high security... which may lead to the use of physical violence or group disruption; (3) Information of escape plots, of...
28 CFR 540.14 - General correspondence.
Code of Federal Regulations, 2013 CFR
2013-07-01
... address. (2) Except for “special mail,” outgoing mail from a sentenced inmate in a medium or high security... which may lead to the use of physical violence or group disruption; (3) Information of escape plots, of...
28 CFR 540.14 - General correspondence.
Code of Federal Regulations, 2010 CFR
2010-07-01
... address. (2) Except for “special mail,” outgoing mail from a sentenced inmate in a medium or high security... which may lead to the use of physical violence or group disruption; (3) Information of escape plots, of...
28 CFR 540.14 - General correspondence.
Code of Federal Regulations, 2011 CFR
2011-07-01
... address. (2) Except for “special mail,” outgoing mail from a sentenced inmate in a medium or high security... which may lead to the use of physical violence or group disruption; (3) Information of escape plots, of...
28 CFR 540.14 - General correspondence.
Code of Federal Regulations, 2014 CFR
2014-07-01
... address. (2) Except for “special mail,” outgoing mail from a sentenced inmate in a medium or high security... which may lead to the use of physical violence or group disruption; (3) Information of escape plots, of...
17. VIEW OF INTERIOR OF BUILDING 220 SECOND FLOOR, MALE ...
17. VIEW OF INTERIOR OF BUILDING 220 SECOND FLOOR, MALE MEDIUM SECURITY SLEEPING AREA. - U.S. Naval Base, Pearl Harbor, Brig, Neville Way near Ninth Street at Marine Barracks, Pearl City, Honolulu County, HI
1982-12-01
ADA2 690 PERSANGU SECUR HEUNEDSAESANDOMANHE / GUL COOPERATION CO..U) NAVAL POSTGRADUATE SCHOOL NC MONTEREY CA J A GAWLIK DEC 82CASSIFIED F/G 5/4 NL...CHART NATIONAL BUREAU OF STANDARDS 1963 A 1 NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS PERSIAN GULF SECURITY: THE UNITED STATES AND OMAN...5 PRA OGR NIT uw Naval Postgraduate School Monterey, California 93940 1i. CONTROLLIUG OPPICe NAME AND LOSOESS Ia. REPORT OATS Naval Postgraduate
NEW Manning System Field Evaluation
1986-12-15
M’xzimum 200 wor(ds) 14 . SUBJECT TERMS 15. NUMBER OF PAGES 16. PRICE COf 17. SECURITY CLASSIFI.ATION 18. SEC.URITY CLASSIFIC,,TIO 19 SECURITY...three- year life cycle geared to the fLrst-term soldIer’s enlistment. tn the majority or cases, these units were deployed OCONUS for a part of the unit’s...soldiers of selected COHORT and monCO9ORT battalions and companies/batterles )oth in CONUS and USARSUR (five iterations over three years ). The primary
Ideas, Concepts, Doctrine: Basic Thinking in the United States Air Force, 1907-1960. Volume 1
1989-12-01
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 684 19a. NAME OF RESPONSIBLE PERSON a. REPORT...reflect the official policy or position of the Department of Defense or the United States government. This publication has been reviewed by security and...lecture have been cleared with the lecturer, even though they may have been unclassified as to military security . To a man these lecturers have been
24 CFR 880.608 - Security deposits.
Code of Federal Regulations, 2011 CFR
2011-04-01
... security deposits. (c) In order to be considered for the return of the security deposit, a family which vacates its unit will provide the owner with its forwarding address or arrange to pick up the refund. (d...
24 CFR 880.608 - Security deposits.
Code of Federal Regulations, 2010 CFR
2010-04-01
... security deposits. (c) In order to be considered for the return of the security deposit, a family which vacates its unit will provide the owner with its forwarding address or arrange to pick up the refund. (d...
A model of airport security work flow based on petri net
NASA Astrophysics Data System (ADS)
Dong, Xinming
2017-09-01
Extremely long lines at airports in the United States have been sharply criticized. In order to find out the bottleneck in the existing security system and put forward reasonable improvement plans and proposal, the Petri net model and the Markov Chain are introduced in this paper. This paper uses data collected by transportation Security Agency (TSA), assuming the data can represent the average level of all airports in the Unites States, to analysis the performance of security check system. By calculating the busy probabilities and the utilization probabilities, the bottleneck is found. Moreover, recommendation is given based on the parameters’ modification in Petri net model.
Laser vibration sensing at Fraunhofer IOSB: review and applications
NASA Astrophysics Data System (ADS)
Lutzmann, Peter; Göhler, Benjamin; Hill, Chris A.; van Putten, Frank
2017-03-01
Laser vibrometry based on coherent detection allows noncontact measurements of small-amplitude vibration characteristics of objects. This technique, commonly using the Doppler effect, offers high potential for short-range civil applications and for medium- or long-range applications in defense and security. Most commercially available laser Doppler vibrometers are for short ranges (up to a few tens of meters) and use a single beam from a low-power HeNe laser source (λ=633 nm). Medium- or long-range applications need higher laser output power, and thus, appropriate vibrometers typically operate at 1.5, 2, or 10.6 μm to meet the laser safety regulations. Spatially resolved vibrational information can be obtained from an object by using scanning laser vibrometers. To reduce measuring time and to measure transient object movements and vibrational mode structures of objects, several approaches to multibeam laser Doppler vibrometry have been developed, and some of them are already commercially available for short ranges. We focus on applications in the field of defense and security, such as target classification and identification, including camouflaged or partly concealed targets, and the detection of buried land mines. Examples of civil medium-range applications are also given.
10 CFR 2.903 - Protection of restricted data and national security information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-25
... 1974; Department of Homeland Security U.S. Citizenship and Immigration Services--008 Refugee Access... of records titled, ``Department of Homeland Security/United States Citizenship and Immigration... Department of Homeland Security/U.S. Citizenship and Immigration Services to collect information to verify...
48 CFR 204.470-2 - National security exclusion.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false National security... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... associated with such activities, with direct national security significance. (b) In order to ensure that all...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2011-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2014-04-01 2014-04-01 false Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2013-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2012-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
31 CFR 358.1 - What special terms apply to this part?
Code of Federal Regulations, 2010 CFR
2010-07-01
... unmatured bearer securities are bearer bonds. BECCS means the Treasury's Bearer Corpora Conversion System... BECCS. Callable means a United States Treasury security subject to call before maturity. Callable Coupons means the coupons associated with a callable security that are due after the date the security is...
The New Wild West: Military Support in Border Security Operations
2012-06-08
military service members from being used to enforce the laws of the United States unless expressly authorized by the United States Constitution or the...cartels constitute a significant threat to United States national security that cannot be defeated or deterred by law enforcement methods alone in order...Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be subject to any penalty for
Exploring the Future of Security in the Caribbean: a Regional Security Partnership?
2007-12-14
by these organizations and their members. 25 CHAPTER 2 LITERATURE REVIEW Psychologist Abraham Maslow posited that safety [read security] is one...addressing the security needs of the Caribbean Basin and the United States? Of necessity , there are several secondary questions which must be...development of models/ theories of security. These theories of security abound, and have evolved as the international arena has changed. Realists, idealists and
García, Joan; Vivar, Joan; Aromir, Maria; Mujeriego, Rafael
2003-06-01
The main objective of this paper is to evaluate the role of hydraulic retention time (HRT) and granular medium in faecal coliform (FC) and somatic coliphage (SC) removal in tertiary reed beds. Experiments were carried out in a pilot plant with four parallel reed beds (horizontal subsurface flow constructed wetlands), each one containing a different type of granular medium. This pilot plant is located in a wastewater treatment plant in Montcada i Reixac, near Barcelona, in northeastern Spain. The microbial inactivation ratios obtained in the different beds are compared as a function of three selected HRTs. Secondary effluent from the wastewater treatment plant was used as the influent of the pilot system. The microbial inactivation ratio ranged between 0.1 and 2.7 log-units for FC and from 0.5 to 1.7 log-units for SC in beds with coarser granular material (5-25mm), while it ranged between 0.7 and 3.4 log-units for FC and from 0.9 to 2.6 log-units for SC in the bed with finer material (2-13mm). HRT and granular medium are both key factors in microbial removal in the tertiary reed beds. The microbial inactivation ratio rises as the HRT increases until it reaches a saturation value (in general at an HRT of 3 days). The value of the microbial inactivation ratio at the saturation level depends on the granular medium contained in the bed. The specific surface area necessary to reach 2-3 log-units of FC and SC is approximately 3m(2)/person-equivalent.
Security Issues in mGovernment
NASA Astrophysics Data System (ADS)
Kumar, Manish; Hanumanthappa, M.; Reddy, Bhavanam Lakshma
E-government is one of the most rapidly evolving service domains in the contemporary information society. Many governments have already developed and provided e-government services to businesses and citizens. Nowadays actors in the government domain attempt to take the next step and exploit the latest wireless technologies in order to provide ubiquitous services for mobile users. However, this approach involves some hidden risks mainly due to the inherent insecurity of the air medium and the vulnerabilities of the wireless systems. Thus, in this paper we investigate the security gaps and considerations which should be taken into account for an m-government system. Finally, we provide a list of security guidelines and policies, which the users of the system should be aware of and follow in order to avoid security attacks.
Threats to information security of real-time disease surveillance systems.
Henriksen, Eva; Johansen, Monika A; Baardsgaard, Anders; Bellika, Johan G
2009-01-01
This paper presents the main results from a qualitative risk assessment of information security aspects for a new real-time disease surveillance approach in general, and for the Snow surveillance system in particular. All possible security threats and acceptable solutions, and the implications these solutions had to the design of the system, were discussed. Approximately 30 threats were identified. None of these got an unacceptable high risk level originally, but two got medium risk level, of which one was concluded to be unacceptable after further investigation. Of the remaining low risk threats, some have severe consequence, thus requiring particular assessment. Since it is very important to identify and solve all security threats before real-time solutions can be used in a wide scale, additional investigations are needed.
Code of Federal Regulations, 2010 CFR
2010-04-01
... insurance policies. Form N-6 shall be used for registration under the Securities Act of 1933 of securities... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form N-6, registration... policies. 239.17c Section 239.17c Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...
Port Security: A National Planning Guide
DOT National Transportation Integrated Search
1997-01-01
Port Security: A National Planning Guide has been produced for the purpose of conveying the United States Department of Transportations policy perspective on port security to the maritime community. This guide provides an overview of the essential as...
Influence of organic buffers on bacteriocin production by Streptococcus thermophilus ST110.
Somkuti, George A; Gilbreth, Stefanie E
2007-08-01
The effect of the organic buffer salts MES, MOPS, and PIPES on the growth of S. thermophilus ST110, medium pH, and accumulation of the antipediococcal bacteriocin thermophilin 110 were evaluated in whey permeate media over a period of 24 h. In nonbuffered medium, thermophilin 110 production at 37 degrees C paralleled the growth of S. thermophilus ST110 and reached a maximum after 8-10 h. Addition of organic buffer salts decreased the drop in medium pH and resulted in increased biomass (dry cells; microg/mL) and higher yields of thermophilin 110 (units/microg cells). The best results were obtained by the addition of 1% (w/v) MES to the medium, which reduced the pH drop to 1.8 units after 10 h of growth (compared to 2.3 pH units in the control) and resulted in a 1.5-fold increase in cell mass (495 microg/mL) and a 7-fold increase in thermophilin 110 yield (77 units/microg dry cells) over the control. The results showed that whey permeate-based media may be suitable for producing large amounts of thermophilin 110 needed for controlling spoilage pediococci in industrial wine and beer fermentations.
Pakistan: Can the United States Secure an Insecure State?
2010-01-01
do not have female staff; the male-to-female staff ratio in the health field is 7 to 1.130 More nurses and female staff are needed, especially to...exercise was rescheduled for 2009. 9 Interview with Ninth Air Force personnel, September 12, 2008. 200 Pakistan: Can the United States Secure an Insecure
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-21
...: Effective Date: May 21, 2010. FOR FURTHER INFORMATION CONTACT: Pamela K. Durham, Office of Missile Threat... in the foreign policy or national security interests of the United States to remove the restrictions..., their sub-units and successors: 1. D. Mendeleyev University of Chemical Technology of Russia 2. Moscow...
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950... was exempt from Social Security tax was also excluded. Certain other work for the United States or an... the Agriculture Marketing Service and the Commodity Stabilization Service, formerly the Production and...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-24
... Power Station, Unit 1; Exemption From Certain Security Requirements 1.0 Background Exelon Nuclear is the licensee and holder of Facility Operating License No. DPR-2 issued for Dresden Nuclear Power Station (DNPS... protection of licensed activities in nuclear power reactors against radiological sabotage,'' paragraph (b)(1...
77 FR 51981 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-28
... DEPARTMENT OF DEFENSE Department of the Air Force [Docket ID: USAF-2012-0016] Proposed Collection; Comment Request AGENCY: United States Security Forces Center, Headquarters, DoD. ACTION: Notice. In compliance with Section 3506(c)(2)(A) of the Paperwork Reduction Act of 1995, the Office of the United States Security Forces Center, Headquarters...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-09
..., DHS. ACTION: Notice. SUMMARY: The United States and Canada are staunch allies, vital economic partners... in which the United States and Canada share responsibility for the security and resilience of our..., while working together to facilitate the flows of legitimate travel and trade. Beyond the Border...
Analysis of Multiple Data Hiding Combined Coloured Visual Cryptography and LSB
NASA Astrophysics Data System (ADS)
Maulana, Halim; Rahman Syahputra, Edy
2017-12-01
Currently the level of data security becoming a major factor in data transfer. As we know every process of sending data through any medium the risk of that data gets hacked will still be there. Some techniques for securing data such as steganography and cryptography also often used as a solution for securing data. But it does not last long because it has been found out the weaknesses of the algorithm so that the security be assured. So, in need of variety of new algorithms to be able to protect the data so that data security can be guaranteed. In this study tries to combine two visual algorithms that steganography and cryptography. Where in these experiments will try to secure two pieces of data type that is the type of image data and text data where both the data is regarded as a message so to obtain the correct information receiver should get that two types of data.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., Medium, and Large HMIWI 1 Table 1 to Subpart HHH of Part 62 Protection of Environment ENVIRONMENTAL... Part 62—Emission Limits for Small Rural, Small, Medium, and Large HMIWI For the air pollutant You must meet this emissions limit HMIWI size Small rural Small Medium Large With these units(7 percent oxygen...
Code of Federal Regulations, 2013 CFR
2013-07-01
..., Medium and Large HMIWI 1 Table 1 to Subpart HHH of Part 62 Protection of Environment ENVIRONMENTAL... Part 62—Emissions Limits for Small Rural, Small, Medium and Large HMIWI For the air pollutant You must meet this emissions limit HMIWI size Small rural Small Medium Large With these units(7 percent oxygen...
Arno, Peter S.; House, James S.; Viola, Deborah; Schechter, Clyde
2011-01-01
Social Security is the most important and effective income support program ever introduced in the United States, alleviating the burden of poverty for millions of elderly Americans. We explored the possible role of Social Security in reducing mortality among the elderly. In support of this hypothesis, we found that declines in mortality among the elderly exceeded those among younger age groups following the initial implementation of Social Security in 1940, and also in the periods following marked improvements in Social Security benefits via legislation and indexing of benefits that occurred between the mid-1960s and the early 1970s. A better understanding of the link between Social Security and health status among the elderly would add a significant and missing dimension to the public discourse over the future of Social Security, and the potential role of income support programs in reducing health-related socioeconomic disparities and improving population health. PMID:21326333
26 CFR 1.162-18 - Illegal bribes and kickbacks.
Code of Federal Regulations, 2010 CFR
2010-04-01
... medium in which the payment is made and regardless of the identity of the immediate recipient or payor... Social Security Act, as amended, or in whole or in part out of Federal funds under a State plan approved...
2002-03-22
may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure
Social Security Contributions and Return Migration Among Older Male Mexican Immigrants.
Aguila, Emma; Vega, Alma
2017-06-01
For decades, scholars have studied the effects of immigration on the U.S. social security system. To date, this research has been primarily limited to migrants within the United States and does not consider those who return to their countries of origin. We estimate the proportion of male Mexican return migrants who contributed to the U.S. social security system and analyze their socioeconomic characteristics and migration histories. We also estimate the proportion that receive or expect to receive U.S. social security benefits. Using probit regression on the 2012 Mexican Health and Aging Study (MHAS), we describe the predictors of having contributed to the U.S. social security system among Mexican males in Mexico aged 50 years and older who at some point lived in the United States. We find that 32% of male return migrants reported having contributed to the U.S. social security system, but only 5% of those who contributed, received or expected to receive benefits. Those who reported having contributed spent more years in the United States and were more likely to be U.S. citizens or legal permanent residents than those who did not contribute. Immigrants often pay Old-Age, Survivors, and Disability Insurance taxes using legitimate or illegitimate social security numbers and return to their home countries without collecting U.S. social security benefits. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
NASA Technical Reports Server (NTRS)
Ko, H. C.
1973-01-01
The wave-normal emissivity and the ray emissivity formulas for an electron moving along a helical path in a magnetoactive medium are presented. Simplified formulas for the case of an isotropic plasma are also given. Because of the helical motion of the electron, a difference exists between the radiated power per unit solid angle and the received power per unit solid angle. The relation between these two quantities in a magnetoactive medium is shown. Results are compared with those obtained by others, and the sources of discrepancies are pointed out.
Code of Federal Regulations, 2011 CFR
2011-04-01
... who is responsible for implementation and oversight of information security programs and procedures... complaints regarding all elements of the information security program shall be directed to the Director of... UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION National Security...
49 CFR 1510.1 - Applicability and purpose.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE... intrastate air transportation originating at airports in the United States. [79 FR 35472, June 20, 2014] ...
49 CFR 1510.1 - Applicability and purpose.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE... intrastate air transportation originating at airports in the United States to pay for the costs of providing...
49 CFR 1510.1 - Applicability and purpose.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE... intrastate air transportation originating at airports in the United States to pay for the costs of providing...
49 CFR 1510.1 - Applicability and purpose.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE... intrastate air transportation originating at airports in the United States to pay for the costs of providing...
49 CFR 1510.1 - Applicability and purpose.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE... intrastate air transportation originating at airports in the United States to pay for the costs of providing...
31 CFR 306.113 - Cases not requiring bonds of indemnity.
Code of Federal Regulations, 2010 CFR
2010-07-01
... the security was in the custody or control of the United States, or a duly authorized agent thereof... GOVERNING U.S. SECURITIES Relief for Loss, Theft, Destruction, Mutilation, or Defacement of Securities § 306... relief for the loss, theft, destruction, mutilation, or defacement of registered securities in any of the...
76 FR 63668 - Omaha Public Power District; Fort Calhoun Station, Unit 1; Exemption
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-13
... health and safety, and are consistent with the common defense and security; and (2) special circumstances.... Consistent With Common Defense and Security The proposed exemption would allow FCS to reschedule its biennial... schedule has no relation to security issues. Therefore, the common defense and security is not impacted by...
2016-05-01
militarily. Even Taiwan’s attempts to adopt asymmetric and innovative defense capabilities, paired with the advantages of island defense and foreign ...States foreign policy. According to the Defense Security Cooperation Agency, the United States transfers “defense articles and services in furtherance...of national security and foreign policy objectives.” By increasing the military capabilities of foreign allies and partners, the United States
Thermal analysis of Malaysian double storey housing - low/medium cost unit
NASA Astrophysics Data System (ADS)
Normah, M. G.; Lau, K. Y.; Yusoff, S. Mohd.
2012-06-01
Almost half of the total energy used today is consumed in buildings. In the tropical climate, air-conditioning a housing unit takes much of the energy bill. Malaysia is no exception. Malaysian double storey terrace housing is popular among developers and buyers. Surveys have shown that housing occupants are much dissatisfied with the thermal comfort and artificial cooling is often sought. The objective of this study is to assess the thermal comfort of the low and medium-cost double storey housing in the area surrounding Universiti Teknologi Malaysia. A simulation program using the Weighting Factor Method calculates the heat transfer interaction, temperature distribution, and PMV level in three types of housing units in relation to the size. Fanger's PMV model based on ISO Standard 7730 is used here because it accounts for all parameters that affect the thermal sensation of a human within its equation. Results showed that both the low and medium-cost housing units studied are out of the comfortable range described by ASHRAE Standard 55 with the units all complied with the local bylaws. In view of the uncertainties in energy supply, future housing units should consider natural ventilation as part of the passive energy management.
77 FR 213 - United States Savings Bonds, Series EE and I
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-04
... (APA). Because this rule relates to United States securities, which are contracts between Treasury and the owner of the security, this rule falls within the contract exception to the APA, 5 U.S.C. 553(a)(2). As a result, the notice, public comment, and delayed effective date provisions of the APA are...
Code of Federal Regulations, 2013 CFR
2013-04-01
... OF LABOR FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, AS AMENDED BLACK LUNG BENEFITS; REQUIREMENTS FOR COAL MINE OPERATOR'S INSURANCE Authorization of Self-Insurers § 726.107 Deposits of negotiable... Federal Reserve banks or the Treasurer of the United States; authority to sell such securities; interest...
ERIC Educational Resources Information Center
McLean, Scott; Gasperini, Lavinia; Rudgard, Stephen
2002-01-01
The distance learning experiences of the United Nations Food and Agriculture Organization led to the following suggestions for applying distance learning strategies to the challenges of food security and rural development: use distance learning for the right reasons, be sensitive to context, use existing infrastructure, engage stakeholders, and…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-10
...- Institutional Broker units should not use trading or order management systems which permit them to share... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65035; File No. SR-CHX-2011-20] Self-Regulatory... Unit Within the Firm August 4, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of...
26 CFR 31.3406(d)-4 - Special rules for readily tradable instruments acquired through a broker.
Code of Federal Regulations, 2014 CFR
2014-04-01
... means of magnetic media, machine readable document, or any other medium, provided that the notice... her social security number.) (2) You failed to certify, under penalties of perjury, that you are not...
26 CFR 31.3406(d)-4 - Special rules for readily tradable instruments acquired through a broker.
Code of Federal Regulations, 2013 CFR
2013-04-01
... means of magnetic media, machine readable document, or any other medium, provided that the notice... her social security number.) (2) You failed to certify, under penalties of perjury, that you are not...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. Administrative..., statements, and other required documents. Electronic media means: (1) Electronic storage material on which...) and any removable/transportable digital memory medium, such as magnetic tape or disk, optical disk, or...
26 CFR 31.3406(d)-4 - Special rules for readily tradable instruments acquired through a broker.
Code of Federal Regulations, 2011 CFR
2011-04-01
... means of magnetic media, machine readable document, or any other medium, provided that the notice... her social security number.) (2) You failed to certify, under penalties of perjury, that you are not...
Code of Federal Regulations, 2014 CFR
2014-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. Administrative..., statements, and other required documents. Electronic media means: (1) Electronic storage material on which...) and any removable/transportable digital memory medium, such as magnetic tape or disk, optical disk, or...
Rule to finalize standards for medium- and heavy-duty vehicles that would improve fuel efficiency and cut carbon pollution to reduce the impacts of climate change, while bolstering energy security and spurring manufacturing innovation.
26 CFR 31.3406(d)-4 - Special rules for readily tradable instruments acquired through a broker.
Code of Federal Regulations, 2010 CFR
2010-04-01
... means of magnetic media, machine readable document, or any other medium, provided that the notice... her social security number.) (2) You failed to certify, under penalties of perjury, that you are not...
Performance Evaluation of Axial Flow AG-1 FC and Prototype FM (High Strength) HEPA Filters - 13123
DOE Office of Scientific and Technical Information (OSTI.GOV)
Giffin, Paxton K.; Parsons, Michael S.; Wilson, John A.
High efficiency particulate air (HEPA) filters are routinely used in DOE nuclear containment activities. The Nuclear Air Cleaning Handbook (NACH) stipulates that air cleaning devices and equipment used in DOE nuclear applications must meet the American Society of Mechanical Engineers (ASME) Code on Nuclear Air and Gas Treatment (AG-1) standard. This testing activity evaluates two different axial flow HEPA filters, those from AG-1 Sections FC and FM. Section FM is under development and has not yet been added to AG-1 due to a lack of qualification data available for these filters. Section FC filters are axial flow units that utilizemore » a fibrous glass filtering medium. The section FM filters utilize a similar fibrous glass medium, but also have scrim backing. The scrim-backed filters have demonstrated the ability to endure pressure impulses capable of completely destroying FC filters. The testing activities presented herein will examine the total lifetime loading for both FC and FM filters under ambient conditions and at elevated conditions of temperature and relative humidity. Results will include loading curves, penetration curves, and testing condition parameters. These testing activities have been developed through collaborations with representatives from the National Nuclear Security Administration (NNSA), DOE Office of Environmental Management (DOE-EM), New Mexico State University, and Mississippi State University. (authors)« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
...; Submission for OMB Review; Contractors Performing Private Security Functions Outside the United States... new information collection requirement concerning Contractors Performing Private Security Functions... identified by Information Collection 9000- 0184, Contractors Performing Private Security Functions Outside...
Protecting clinical data on Web client computers: the PCASSO approach.
Masys, D. R.; Baker, D. B.
1998-01-01
The ubiquity and ease of use of the Web have made it an increasingly popular medium for communication of health-related information. Web interfaces to commercially available clinical information systems are now available or under development by most major vendors. To the extent that such interfaces involve the use of unprotected operating systems, they are vulnerable to security limitations of Web client software environments. The Patient Centered Access to Secure Systems Online (PCASSO) project extends the protections for person-identifiable health data on Web client computers. PCASSO uses several approaches, including physical protection of authentication information, execution containment, graphical displays, and monitoring the client system for intrusions and co-existing programs that may compromise security. PMID:9929243
2016-04-24
the Cybersecurity in the United States – Brief Overview 13 2.1. Data Breaches in the United States 14 2.2. Security and...Capacity to Defend 15 2.2.1. Cybersecurity Capabilities in the United States 18 2.3. Internationalization of Cybersecurity ...The Department of Homeland Security (DHS) Org Chart 43 2.2.1.2 National Cybersecurity and Communications Integration Center (NCCIC) Org
29 CFR 71.12 - Use and collection of social security numbers.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 29 Labor 1 2011-07-01 2011-07-01 false Use and collection of social security numbers. 71.12... RECORDS UNDER THE PRIVACY ACT OF 1974 General § 71.12 Use and collection of social security numbers. (a) Each component unit that requests an individual to disclose his social security account number shall...
Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model
ERIC Educational Resources Information Center
Kassa, Woldeloul
2016-01-01
Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…
20 CFR 725.606 - Security for the payment of benefits.
Code of Federal Regulations, 2010 CFR
2010-04-01
... operator or other employer fails to provide proof of such security to the Director within 30 days of its...-compliance to the appropriate United States district court in accordance with § 725.351(c). (f) Security... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Security for the payment of benefits. 725.606...
Code of Federal Regulations, 2012 CFR
2012-01-01
... securities and non-corporate interests from third parties. 801.30 Section 801.30 Commercial Practices FEDERAL... securities and non-corporate interests from third parties. (a) This section applies to: (1) Acquisitions on a national securities exchange or through an interdealer quotation system registered with the United States...
Code of Federal Regulations, 2013 CFR
2013-01-01
... securities and non-corporate interests from third parties. 801.30 Section 801.30 Commercial Practices FEDERAL... securities and non-corporate interests from third parties. (a) This section applies to: (1) Acquisitions on a national securities exchange or through an interdealer quotation system registered with the United States...
Code of Federal Regulations, 2014 CFR
2014-01-01
... securities and non-corporate interests from third parties. 801.30 Section 801.30 Commercial Practices FEDERAL... securities and non-corporate interests from third parties. (a) This section applies to: (1) Acquisitions on a national securities exchange or through an interdealer quotation system registered with the United States...
77 FR 10960 - Security Zone, East River and Bronx Kill; Randalls and Wards Islands, NY
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-24
...-AA87 Security Zone, East River and Bronx Kill; Randalls and Wards Islands, NY AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary security zone on the... security zone is necessary to ensure the safety of the President of the United States, members of his...
29 CFR 71.12 - Use and collection of social security numbers.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 29 Labor 1 2014-07-01 2013-07-01 true Use and collection of social security numbers. 71.12 Section... UNDER THE PRIVACY ACT OF 1974 General § 71.12 Use and collection of social security numbers. (a) Each component unit that requests an individual to disclose his social security account number shall provide the...
29 CFR 71.12 - Use and collection of social security numbers.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 29 Labor 1 2012-07-01 2012-07-01 false Use and collection of social security numbers. 71.12... RECORDS UNDER THE PRIVACY ACT OF 1974 General § 71.12 Use and collection of social security numbers. (a) Each component unit that requests an individual to disclose his social security account number shall...
29 CFR 71.12 - Use and collection of social security numbers.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 29 Labor 1 2013-07-01 2013-07-01 false Use and collection of social security numbers. 71.12... RECORDS UNDER THE PRIVACY ACT OF 1974 General § 71.12 Use and collection of social security numbers. (a) Each component unit that requests an individual to disclose his social security account number shall...
29 CFR 71.12 - Use and collection of social security numbers.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 1 2010-07-01 2010-07-01 true Use and collection of social security numbers. 71.12 Section... UNDER THE PRIVACY ACT OF 1974 General § 71.12 Use and collection of social security numbers. (a) Each component unit that requests an individual to disclose his social security account number shall provide the...
Security Standards and Best Practice Considerations for Quantum Key Distribution (QKD)
2012-03-01
SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD) THESIS...protection in the United States. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD...FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY
Respect in forensic psychiatric nurse-patient relationships: a practical compromise.
Rose, Donald N; Peter, Elizabeth; Gallop, Ruth; Angus, Jan E; Liaschenko, Joan
2011-03-01
The context of forensic psychiatric nursing is distinct from other psychiatric settings as, it involves placement of patients in secure environments with restrictions determined by the courts. Previous literature has identified that nurses morally struggle with respecting patients who have committed heinous offences, which can lead to the patient being depersonalized and dehumanized. Although respect is fundamental to ethical nursing practice, it has not been adequately explored conceptually or empirically. As a result, little knowledge exists that identifies how nurses develop, maintain, and express respect for patients. The purpose of this study is to analyze the concept of respect systematically, from a forensic psychiatric nurse's perspective using the qualitative methodology of focused ethnography. Forensic psychiatric nurses were recruited from two medium secure forensic rehabilitation units. In the first interview, 13 registered nurses (RNs) and two registered practical nurses (RPNs) participated, and although all informants were invited to the second interview, six RNs were lost to follow-up. Despite this loss, saturation was achieved and the data were interpreted through a feminist philosophical lens. Respect was influenced by factors categorized into four themes: (1) emotive-cognitive reactions, (2) nonjudgmental approach, (3) social identity and power, and (4) context. The data from the themes indicate that forensic psychiatric nurses strike a practical compromise, in their understanding and enactment of respect in therapeutic relationships with forensic psychiatric patients. © 2011 International Association of Forensic Nurses.
SOCIAL SECURITY NUMBERS: Government Benefits from SSN Use but Could Provide Better Safeguards
2002-05-01
Report to Congressional Requesters United States General Accounting Office GAO May 2002 SOCIAL SECURITY NUMBERS Government Benefits from SSN Use...and Subtitle SOCIAL SECURITY NUMBERS: Government Benefits from SSN Use but Could Provide Better Safeguards Contract Number Grant Number Program...Social Security benefits . Since that time, the number has been used for myriad non-Social Security purposes. Private sector use of the SSN has grown
12 CFR 403.1 - General policies and definitions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... information requires, in the interest of national security, protection against unauthorized disclosure... SAFEGUARDING OF NATIONAL SECURITY INFORMATION § 403.1 General policies and definitions. (a) This regulation of..., declassification, and safeguarding of national security information and material of the United States. This...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 2 2013-01-01 2013-01-01 false U.S. Grade B Small; U.S. Grade B Medium; U.S. Grade B Medium to Large; U.S. Grade B Large. 51.1576 Section 51.1576 Agriculture Regulations of the Department of...) United States Consumer Standards for Potatoes Grades § 51.1576 U.S. Grade B Small; U.S. Grade B Medium; U...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 2 2014-01-01 2014-01-01 false U.S. Grade A Small; U.S. Grade A Medium; U.S. Grade A Medium to Large; U.S. Grade A Large. 51.1575 Section 51.1575 Agriculture Regulations of the Department of...) United States Consumer Standards for Potatoes Grades § 51.1575 U.S. Grade A Small; U.S. Grade A Medium; U...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 2 2014-01-01 2014-01-01 false U.S. Grade B Small; U.S. Grade B Medium; U.S. Grade B Medium to Large; U.S. Grade B Large. 51.1576 Section 51.1576 Agriculture Regulations of the Department of...) United States Consumer Standards for Potatoes Grades § 51.1576 U.S. Grade B Small; U.S. Grade B Medium; U...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 2 2013-01-01 2013-01-01 false U.S. Grade A Small; U.S. Grade A Medium; U.S. Grade A Medium to Large; U.S. Grade A Large. 51.1575 Section 51.1575 Agriculture Regulations of the Department of...) United States Consumer Standards for Potatoes Grades § 51.1575 U.S. Grade A Small; U.S. Grade A Medium; U...
Code of Federal Regulations, 2012 CFR
2012-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. ANSI stands for... required documents. Electronic media means: (1) Electronic storage media including memory devices in computers (hard drives) and any removable/transportable digital memory medium, such as magnetic tape or disk...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. ANSI stands for... required documents. Electronic media means: (1) Electronic storage media including memory devices in computers (hard drives) and any removable/transportable digital memory medium, such as magnetic tape or disk...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. ANSI stands for... required documents. Electronic media means: (1) Electronic storage media including memory devices in computers (hard drives) and any removable/transportable digital memory medium, such as magnetic tape or disk...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-14
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Stephen Glen Guerra, Inmate 98595-279, FCI... Export Privileges On February 6, 2012, in the U.S. District Court, Western District of Texas, Stephen... conviction. [[Page 49470
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL LIFESAVING EQUIPMENT Specification for a Buoyant Vest, Kapok or Fibrous Glass, Adult and Child... than 90 pounds); (c) Model CKM-1, child medium, kapok (for children weighing from 50 to 90 pounds); (d...
Food Insecurity and Food Resource Utilization in an Urban Immigrant Community.
Greenwald, Howard P; Zajfen, Vanessa
2017-02-01
Risk and prevalence of food insecurity and use of food security resources are important but incompletely understood factors in immigrant health. Key informant interviews and a survey (N = 809) of housing units were conducted in a San Diego, California neighborhood with a high proportion of immigrant and low income families. The difference in food insecurity between immigrant and non-immigrant households was non-significant (20.1 vs. 15.7 %, p = n.s.), though immigrant families were more likely to use food security resources such as SNAP (32.7 vs. 22.9 %, p < .01) and food pantries (28.2 vs. 19.7 %, p < .001). Among immigrants, neither national origin nor years in the United States predicted food insecurity or use of most food security resources. In immigrant families, food insecurity often remains a challenge long after immigration, suggesting a potentially increasing need for food security resources as immigration into the United States continues.
Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.
Keys, Yolanda; Stichler, Jaynelle F
Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.
Nuclear Security in the 21^st Century
NASA Astrophysics Data System (ADS)
Archer, Daniel E.
2006-10-01
Nuclear security has been a priority for the United States, starting in the 1940s with the secret cities of the Manhattan Project. In the 1970s, the United States placed radiation monitoring equipment at nuclear facilities to detect nuclear material diversion. Following the breakup of the Soviet Union, cooperative Russian/U.S. programs were launched in Russia to secure the estimated 600+ metric tons of fissionable materials against diversion (Materials Protection, Control, and Accountability -- MPC&A). Furthermore, separate programs were initiated to detect nuclear materials at the country's borders in the event that these materials had been stolen (Second Line of Defense - SLD). In the 2000s, new programs have been put in place in the United States for radiation detection, and research is being funded for more advanced systems. This talk will briefly touch on the history of nuclear security and then focus on some recent research efforts in radiation detection. Specifically, a new breed of radiation monitors will be examined along with the concept of sensor networks.
Code of Federal Regulations, 2010 CFR
2010-07-01
... the Federal Reserve Banks with respect to Book-entry Securities and security interests. 357.13 Section... SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING BOOK-ENTRY TREASURY... (TRADES) § 357.13 Obligations of the United States and the Federal Reserve Banks with respect to Book...
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
The world's political structure and many economic practices are out of harmony with nature. This disharmony threatens environmentally sustainable growth and human survival. United Nations (UN) conference participants discussed the degree of political acceptance of concepts such as environmental security and sustainable development. Their reading…
ERIC Educational Resources Information Center
O'Rand, Angela M.
2011-01-01
Recent patterns of labor exit in late life in the United States are increasingly heterogeneous. This heterogeneity stems from diverse employment careers that are emerging in the workplace where job security is declining. Individuals' structural locations in the labor market expose them to diverse risks for employment and income security at older…
Code of Federal Regulations, 2013 CFR
2013-01-01
... extraordinary threat to the national security, foreign policy, and economy of the United States. As a result... of May 1, 2012. The President took these actions to deal with the unusual and extraordinary threat to the national security, foreign policy, and economy of the United States constituted by the actions of...
Integrating Partner Nations into Coalition Operations
2006-01-01
of United Nations (UN) Security Council Resolu- tion 1529, Chile , Canada, France, and the United States established a multinational force...of restabi- lization. Chile continues to deploy forces as a member of the UN Stabilization Force Haiti (MINUSTAH), led by Brazil and comprised...supporting a tailored exercise and theater security cooperation program that has encouraged partners such as Chile , Brazil, and El Salvador to develop
Code of Federal Regulations, 2014 CFR
2014-07-01
... regulated navigation areas (RNA) or security zones: (1) Wall Street Heliport RNA. All waters of the East... northwest corner of Pier 2 North, Brooklyn (NAD 1983). (2) Randalls and Wards Islands RNA: All waters of the..., and all waters south of the Queensboro Bridge (NAD 1983). (6) United Nations Full River Closure RNA...
CHROMagar Orientation Medium Reduces Urine Culture Workload
Manickam, Kanchana; Karlowsky, James A.; Adam, Heather; Lagacé-Wiens, Philippe R. S.; Rendina, Assunta; Pang, Paulette; Murray, Brenda-Lee
2013-01-01
Microbiology laboratories continually strive to streamline and improve their urine culture algorithms because of the high volumes of urine specimens they receive and the modest numbers of those specimens that are ultimately considered clinically significant. In the current study, we quantitatively measured the impact of the introduction of CHROMagar Orientation (CO) medium into routine use in two hospital laboratories and compared it to conventional culture on blood and MacConkey agars. Based on data extracted from our Laboratory Information System from 2006 to 2011, the use of CO medium resulted in a 28% reduction in workload for additional procedures such as Gram stains, subcultures, identification panels, agglutination tests, and biochemical tests. The average number of workload units (one workload unit equals 1 min of hands-on labor) per urine specimen was significantly reduced (P < 0.0001; 95% confidence interval [CI], 0.5326 to 1.047) from 2.67 in 2006 (preimplementation of CO medium) to 1.88 in 2011 (postimplementation of CO medium). We conclude that the use of CO medium streamlined the urine culture process and increased bench throughput by reducing both workload and turnaround time in our laboratories. PMID:23363839
1996-11-01
As the trend to mergers and diversification of healthcare facilities grows, so too does the challenge to security directors to effectively and efficiently protect not only acute care, emergency, and outpatient facilities, but physician office buildings, parking garages, long-term-care units, medical schools, technical service units, and even health clubs. Besides the different security and communications problems posed by each type of facility, the problem of distance between facilities and their geographic location must also be met. In this report, we'll update you on the approaches being taken by security and planning executives at three leading health systems and how they are dealing with current and future problems.
Sandia National Laboratories: National Security Programs
policy. Topics About Nuclear Weapons Safety & Security Science & Technology Defense Systems & science and technology to help defend and protect the United States. Topics About Defense Systems & . Topics Stationary Power Earth Science Transportation Energy Energy Research Global Security Birc We
10 CFR 1015.210 - Liquidation of collateral.
Code of Federal Regulations, 2010 CFR
2010-01-01
... States. Collection from other sources, including liquidation of security or collateral, is not a... Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) COLLECTION OF CLAIMS OWED THE UNITED STATES Standards... liquidate security or collateral through the exercise of a power of sale in the security instrument or a...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2012 CFR
2012-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2011 CFR
2011-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2014 CFR
2014-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2013 CFR
2013-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-29
... DEPARTMENT OF HOMELAND SECURITY United States Immigration and Customs Enforcement Agency... Department of Homeland Security, U.S. Immigration and Customs Enforcement (USICE), will submit the following... Homeland Security (DHS), Scott Elmore, Forms Manager, U.S. Immigration and Customs Enforcement, 801 I...
Increasing the resilience and security of the United States' power infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Happenny, Sean F.
2015-08-01
The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-worldmore » conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.« less
A demonstration of a low cost approach to security at shipping facilities and ports
NASA Astrophysics Data System (ADS)
Huck, Robert C.; Al Akkoumi, Mouhammad K.; Herath, Ruchira W.; Sluss, James J., Jr.; Radhakrishnan, Sridhar; Landers, Thomas L.
2010-04-01
Government funding for the security at shipping facilities and ports is limited so there is a need for low cost scalable security systems. With over 20 million sea, truck, and rail containers entering the United States every year, these facilities pose a large risk to security. Securing these facilities and monitoring the variety of traffic that enter and leave is a major task. To accomplish this, the authors have developed and fielded a low cost fully distributed building block approach to port security at the inland Port of Catoosa in Oklahoma. Based on prior work accomplished in the design and fielding of an intelligent transportation system in the United States, functional building blocks, (e.g. Network, Camera, Sensor, Display, and Operator Console blocks) can be assembled, mixed and matched, and scaled to provide a comprehensive security system. The following functions are demonstrated and scaled through analysis and demonstration: Barge tracking, credential checking, container inventory, vehicle tracking, and situational awareness. The concept behind this research is "any operator on any console can control any device at any time."
Climent, Salvador; Sanchez, Antonio; Capella, Juan Vicente; Meratnia, Nirvana; Serrano, Juan Jose
2014-01-06
This survey aims to provide a comprehensive overview of the current research on underwater wireless sensor networks, focusing on the lower layers of the communication stack, and envisions future trends and challenges. It analyzes the current state-of-the-art on the physical, medium access control and routing layers. It summarizes their security threads and surveys the currently proposed studies. Current envisioned niches for further advances in underwater networks research range from efficient, low-power algorithms and modulations to intelligent, energy-aware routing and medium access control protocols.
Ramm, D; Mahnke, C; Tauscher, A; Welti, F; Seider, H; Shafaei, R
2012-01-01
The article is based on the results of the project “Company integration management in small and medium-sized companies. Legal requirements and prerequisites for a successful implementation” (01 January 2009-31 August 2010). Since 2004 all employers have been legally bound to offer company integration management (BEM, Betriebliches Eingliederungsmanagement) for all employees who have been incapacitated for work for more than 6 weeks within a year (Section 84 SGB IX, Book 9 of the German Social Code). Objective of this law is to ensure ongoing employment. The aim of the study was to investigate the requirements companies, rehabilitation centres and services as well as social insurance institutions are faced with according to Section 84 SGB IX. Prerequisites for an effective implementation of BEM in small and medium-sized enterprises were analyzed. Protocol-based interviews with experts were adopted. A total of 38 interviews with experts were carried out. The experts interviewed were either willing to give information by interest (concernment) or were named by law as an initiator or co-operator in the process of integration. A substantial literature research was performed in advance of the interviews. The awareness level of BEM is still very low even 7 years after its introduction. Small and medium-sized enterprises do not have any significant experiential knowledge of long-term incapacity for work and, hence, about BEM. Due to a lack of workers representation in many small and medium companies, management does not receive initiatives or support in implementation of BEM from employees' side. Employers prefer a central contact point providing them with the information and help needed, the common service units, however, being widely unknown in this context. Cost comparisons suggest that a company integration management might be more cost-effective than dismissing employees who are incapacitated for some fields of work. These findings might even hold true for small and medium-sized companies. Social insurance institutions are aware of company integration management; however there is a substantial lack of experience. There is some evidence that incentives and bonuses according to Section 84, 3 SGB IX would not have any significant impact on the implementation of company integration management in small and medium-sized enterprises. POLICY RECOMMENDATION: All relevant actors in the field of company integration management should reassess their possibilities to advocate integration management. Not only employees but also employers and social security institutions will benefit from comprehensive implementation of company integration management. © Georg Thieme Verlag KG Stuttgart · New York.
A Dynamic Framework for Water Security
NASA Astrophysics Data System (ADS)
Srinivasan, Veena; Konar, Megan; Sivapalan, Murugesu
2017-04-01
Water security is a multi-faceted problem, going beyond mere balancing of supply and demand. Conventional attempts to quantify water security starting rely on static indices at a particular place and point in time. While these are simple and scalable, they lack predictive or explanatory power. 1) Most static indices focus on specific spatial scales and largely ignore cross-scale feedbacks between human and water systems. 2) They fail to account for the increasing spatial specialization in the modern world - some regions are cities others are agricultural breadbaskets; so water security means different things in different places. Human adaptation to environmental change necessitates a dynamic view of water security. We present a framework that defines water security as an emergent outcome of a coupled socio-hydrologic system. Over the medium term (5-25 years), water security models might hold governance, culture and infrastructure constant, but allow humans to respond to changes and thus predict how water security would evolve. But over very long time-frames (25-100 years), a society's values, norms and beliefs themselves may themselves evolve; these in turn may prompt changes in policy, governance and infrastructure. Predictions of water security in the long term involve accounting for such regime shifts in the cultural and political context of a watershed by allowing the governing equations of the models to change.
Code of Federal Regulations, 2012 CFR
2012-10-01
... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2012-10-01 2012-10-01 false Access to cargo: Security threat assessments for...
Code of Federal Regulations, 2014 CFR
2014-10-01
... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2014-10-01 2014-10-01 false Access to cargo: Security threat assessments for...
Code of Federal Regulations, 2013 CFR
2013-10-01
... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2013-10-01 2013-10-01 false Access to cargo: Security threat assessments for...
Code of Federal Regulations, 2011 CFR
2011-10-01
... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2011-10-01 2011-10-01 false Access to cargo: Security threat assessments for...
Glossary: Defense Acquisition Acronyms and Terms. Revision 2
1987-07-01
Approved REPORT DOCUMENTATION PAGE OMBNo. 070-O 18 la. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS % unclassified 2a. SECURITY CLASSIFICATION ...WORK UNIT Fort Belvoir, VA 22060-5426 ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification ) Glossary Defense Acquisition...DISTRIBUTION/AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION [RUNCLASSIFIED/UNLIMITED 0 SAME AS RPT 0 DTIC USERS unclassified 22a. NAME OF
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1984-04-13
AD-fl143 023 SEMIANNUAL REPORT TO CONGRESS ON THEUEFFECTIVENESS OF i/i THE CIVIL AVIATION SECURITY PROGRAM(U) FEDERAL AVIATION ADMINISTRATION...Semiannual Report to O Congress on the US Deportmnent of TrasEffectiveness ofi of TransportationFedewl Avkffim Avao The Civil Aviation - Security Program... Aviation Security Program 8. Performing OrgniaetioNi RePwt Us. Aviation Security Division 9. Performing Organistion Name and Address 10. Work Unit No
EMP Threats to US National Security: Congressional Responses
NASA Astrophysics Data System (ADS)
Huessy, Peter
2011-04-01
The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.
Secure detection in quantum key distribution by real-time calibration of receiver
NASA Astrophysics Data System (ADS)
Marøy, Øystein; Makarov, Vadim; Skaar, Johannes
2017-12-01
The single-photon detectionefficiency of the detector unit is crucial for the security of common quantum key distribution protocols like Bennett-Brassard 1984 (BB84). A low value for the efficiency indicates a possible eavesdropping attack that exploits the photon receiver’s imperfections. We present a method for estimating the detection efficiency, and calculate the corresponding secure key generation rate. The estimation is done by testing gated detectors using a randomly activated photon source inside the receiver unit. This estimate gives a secure rate for any detector with non-unity single-photon detection efficiency, both inherit or due to blinding. By adding extra optical components to the receiver, we make sure that the key is extracted from photon states for which our estimate is valid. The result is a quantum key distribution scheme that is secure against any attack that exploits detector imperfections.
Birth order in sex-offending and aggressive-offending men.
MacCulloch, Sophie I; Gray, Nicola S; Phillips, Helen K; Taylor, John; MacCulloch, Malcolm J
2004-10-01
The relation between birth order and number of sexual and violent convictions was investigated retrospectively in a sample of 113 men, to determine whether the established fraternal birth order effect in male homosexual preference and deviant sexual preference (e.g., for rape and pedophilia) may be extended to sexual behavior. Participants were mentally disordered offenders detained in a medium secure psychiatric unit in the United Kingdom and comprised 64 men with sexual convictions and 49 men with nonsexual violent convictions. Sibling data from psychiatric notes were used to calculate Berglin's birth order index for each participant and conviction data were obtained from the Home Office Offenders' Index. Fraternal birth order was significantly correlated with number of sexual convictions (p < or = .05). No association was found between fraternal or sororal birth order and violent convictions in either the sex offender or violent offender group. Results suggest that the fraternal birth order effect previously found for deviant sexual preference in sex offenders (K. Côté, C. M. Earls, & M. L. Lalumière, 2002; M. L. Lalumière, G. T. Harris, V. L. Quinsey, & M. E. Rice, 1998) also applies to sexually deviant behavior and is specific to sexual rather than general offending. Results are discussed in terms of the maternal immunosensitization hypothesis. Copyright 2004 Springer Science + Business Media, Inc.
NASA Astrophysics Data System (ADS)
Roşu, M. M.; Tarbă, C. I.; Neagu, C.
2016-11-01
The current models for inventory management are complementary, but together they offer a large pallet of elements for solving complex problems of companies when wanting to establish the optimum economic order quantity for unfinished products, row of materials, goods etc. The main objective of this paper is to elaborate an automated decisional model for the calculus of the economic order quantity taking into account the price regressive rates for the total order quantity. This model has two main objectives: first, to determine the periodicity when to be done the order n or the quantity order q; second, to determine the levels of stock: lighting control, security stock etc. In this way we can provide the answer to two fundamental questions: How much must be ordered? When to Order? In the current practice, the business relationships with its suppliers are based on regressive rates for price. This means that suppliers may grant discounts, from a certain level of quantities ordered. Thus, the unit price of the products is a variable which depends on the order size. So, the most important element for choosing the optimum for the economic order quantity is the total cost for ordering and this cost depends on the following elements: the medium price per units, the stock cost, the ordering cost etc.
1999-04-01
atrium , the inferior vena cava was closed with a silk ligature and the liver was carefully excised. 2.4 Liver...withdraw needle. 5.5.10 Secure tip of cannula with ligature and connect medium at lowest flow rate (5 mL/min). 5.5.11 Cut inferior vena cava below the...heart. 5.5.14 Cannulate the superior vena cava via an incision in the right atrium , secure with ligature. 5.5.15 Close ligature around inferior vena cava
2002-03-01
sections consists of four units, the Domestic Terrorism Operations Unit, the WMD Operations Unit, the WMD Countermeasures Unit, and Special Events Management Unit...Countermeasures Unit Chief Special Events Management Unit Chief Domestic Terrorism/ Counterterrorism Section Chief International Terrorism Section Asstistant
39 CFR 267.4 - Information security standards.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 39 Postal Service 1 2013-07-01 2013-07-01 false Information security standards. 267.4 Section 267.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of...
39 CFR 267.4 - Information security standards.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 39 Postal Service 1 2012-07-01 2012-07-01 false Information security standards. 267.4 Section 267.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of...
39 CFR 267.4 - Information security standards.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 39 Postal Service 1 2014-07-01 2014-07-01 false Information security standards. 267.4 Section 267.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of...
39 CFR 267.4 - Information security standards.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 39 Postal Service 1 2011-07-01 2011-07-01 false Information security standards. 267.4 Section 267.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of...
39 CFR 267.4 - Information security standards.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 39 Postal Service 1 2010-07-01 2010-07-01 false Information security standards. 267.4 Section 267.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of...
32 CFR 700.826 - Physical security.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 5 2014-07-01 2014-07-01 false Physical security. 700.826 Section 700.826 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate...
32 CFR 700.826 - Physical security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 5 2013-07-01 2013-07-01 false Physical security. 700.826 Section 700.826 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate...
32 CFR 700.826 - Physical security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 5 2010-07-01 2010-07-01 false Physical security. 700.826 Section 700.826 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate...
32 CFR 700.826 - Physical security.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 5 2011-07-01 2011-07-01 false Physical security. 700.826 Section 700.826 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate...
32 CFR 700.826 - Physical security.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 5 2012-07-01 2012-07-01 false Physical security. 700.826 Section 700.826 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate...
Fact Sheet: National Space Policy. Appendix F-2
NASA Technical Reports Server (NTRS)
1996-01-01
For over three decades, the United States has led the world in the exploration and use of outer space. Our achievements in space have inspired a generation of Americans and people throughout the world. We will maintain this leadership role by supporting a strong, stable, and balanced national space program that serves our goals in national security, foreign policy, economic growth, environmental stewardship, and scientific and technical excellence. Access to and use of space are central for preserving peace and protecting US national security as well as civil and commercial interests. The United States will pursue greater levels of partnership and cooperation in national and international space activities and work with other nations to ensure the continued exploration and use of outer space for peaceful purposes. The goals of the US space program are to: (a) Enhance knowledge of the Earth, the solar system, and the universe through human and robotic exploration; (b) Strengthen and maintain the national security of the United States; (c) Enhance the economic competitiveness and scientific and technical capabilities of the United States; (d) Encourage State, local, and private sector investment in, and use of, space technologies; (e) Promote international cooperation to further US domestic, national security, and foreign policies. The United States is committed to the exploration and use of outer space by all nations for peaceful purposes and for the benefit of all humanity. "Peaceful purposes" allow defense and intelligence-related activities in pursuit of national security and other goals. The United States rejects any claims to sovereignty by any nation over outer space or celestial bodies, or any portion thereof, and rejects any limitations on the fundamental right of sovereign nations to acquire data from space. The United States considers the space systems of any nation to be national property with the right of passage through and operations in space without interference. Purposeful interference with space systems shall be viewed as an infringement on sovereign rights. The US Government will maintain and coordinate separate national security and civil space systems where differing needs dictate. All actions undertaken by agencies and departments in implementing the national space policy shall be consistent with US law, regulations, national security requirements, foreign policy, international obligations, and nonproliferation policy. The National Science and Technology Council (NSTC) is the principal forum for resolving issues related to national space policy. As appropriate, the NSTC and NSC will co-chair policy process. This policy will be implemented within the overall resource and policy guidance provided by the President.
20 CFR 404.1545 - Your residual functional capacity.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Your residual functional capacity. 404.1545 Section 404.1545 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... fully capable of the physical demands consistent with those of sustained medium work activity, but...
20 CFR 404.1545 - Your residual functional capacity.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Your residual functional capacity. 404.1545 Section 404.1545 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... fully capable of the physical demands consistent with those of sustained medium work activity, but...
ERIC Educational Resources Information Center
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H.
2010-01-01
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
32 CFR 310.15 - General considerations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... individual's rights, privileges, or benefits under any Federal program. (b) Collecting social security... regardless of the medium used to collect the information (forms, personal interviews, telephonic interviews... mandatory (See paragraph (e) of this section); and (v) The effects on the individual if he or she chooses...
32 CFR 310.15 - General considerations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... individual's rights, privileges, or benefits under any Federal program. (b) Collecting social security... regardless of the medium used to collect the information (forms, personal interviews, telephonic interviews... mandatory (See paragraph (e) of this section); and (v) The effects on the individual if he or she chooses...
32 CFR 310.15 - General considerations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... individual's rights, privileges, or benefits under any Federal program. (b) Collecting social security... regardless of the medium used to collect the information (forms, personal interviews, telephonic interviews... mandatory (See paragraph (e) of this section); and (v) The effects on the individual if he or she chooses...
Hollin, Clive R; Davies, Steffan; Duggan, Conor; Huband, Nick; McCarthy, Lucy; Clarke, Martin
2013-07-01
Patients who set fires are a perennial cause of concern with psychiatric services although perhaps rather neglected in the clinical research literature. The current study considered the characteristics on admission of 129 patients, 93 men and 36 women, with a known history of arson who had been admitted to a medium secure psychiatric hospital. The distinguishing characteristics of the sample were high numbers of patients with extensive criminal histories, most probably due to high levels of prison transfer and a higher occurrence of mental illness than psychopathic disorder. Aside from return to prison, most patients were discharged either to another psychiatric hospital or directly to the community. There was a high rate of re-conviction after discharge, mainly for minor offences, with about one in 10 of discharged patients committing arson. It was established, however, that not all incidents of arson led to a prosecution. It is concluded that there are weaknesses in the areas of both risk assessment and evidence-based treatment for arsonists.
The relationship between adult attachment style and post-traumatic stress symptoms: A meta-analysis.
Woodhouse, Sarah; Ayers, Susan; Field, Andy P
2015-10-01
There is increasing evidence that adult attachment plays a role in the development and perseverance of symptoms of posttraumatic stress disorder (PTSD). This meta-analysis aims to synthesise this evidence and investigate the relationship between adult attachment styles and PTSD symptoms. A random-effects model was used to analyse 46 studies (N=9268) across a wide range of traumas. Results revealed a medium association between secure attachment and lower PTSD symptoms (ρˆ=-.27), and a medium association, in the opposite direction, between insecure attachment and higher PTSD symptoms (ρˆ=.26). Attachment categories comprised of high levels of anxiety most strongly related to PTSD symptoms, with fearful attachment displaying the largest association (ρˆ=.44). Dismissing attachment was not significantly associated with PTSD symptoms. The relationship between insecure attachment and PTSD was moderated by type of PTSD measure (interview or questionnaire) and specific attachment category (e.g. secure, fearful). Results have theoretical and clinical significance. Copyright © 2015 Elsevier Ltd. All rights reserved.
Security writing application of thermal decomposition assisted NaYF4:Er3+/Yb3+ upconversion phosphor
NASA Astrophysics Data System (ADS)
Kumar, A.; Tiwari, S. P.; Esteves da Silva, Joaquim C. G.; Kumar, K.
2018-07-01
The authors have synthesized water-dispersible NaYF4:Er3+/Yb3+ upconversion particles via a thermal decomposition route and optimized the green upconversion emission through a concentration variation of the Yb3+ sensitizer. The prepared particles were found to be ellipsoid in shape having an average particle dimension of 600 × 150 nm. It is observed that the sample with 18 mmol% Yb3+ ion concentration and 2 mmol% Er3+ ion gives optimum upconversion intensity in the green region under 980 nm excitation. Colloidal dispersibility of the sample in different solvents was checked and hexane was found to be the best medium for the prepared particles. The particle size of the sample was found to be suitable for the preparation of colloidal ink and security writing on a plain sheet of paper. This was demonstrated successfully using ink prepared in polyvinyl chloride gold medium.
United Nations Charter, Chapter VII, Article 43: Now or Never.
Burkle, Frederick M
2018-04-25
For more than 75 years, the United Nations Charter has functioned without the benefit of Chapter VII, Article 43, which commits all United Nations member states "to make available to the Security Council, on its call, armed forces, assistance, facilities, including rights of passage necessary for the purpose of maintaining international peace and security." The consequences imposed by this 1945 decision have had a dramatic negative impact on the United Nation's functional capacity as a global body for peace and security. This article summarizes the struggle to implement Article 43 over the decades from the onset of the Cold War, through diplomatic attempts during the post-Cold War era, to current and often controversial attempts to provide some semblance of conflict containment through peace enforcement missions. The rapid growth of globalization and the capability of many nations to provide democratic protections to their populations are again threatened by superpower hegemony and the development of novel unconventional global threats. The survival of the United Nations requires many long overdue organizational structure and governance power reforms, including implementation of a robust United Nations Standing Task Force under Article 43. (Disaster Med Public Health Preparedness. 2018;page 1 of 8).
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-15
... Exchange proposes to trade Nasdaq Securities within the existing DMM and SLP framework used to trade its... member organization will not be permitted to be registered as both the DMM Unit and an SLP for the same... Nasdaq Securities to a different DMM Unit or to a different SLP or SLPs. \\5\\ A representative of NYSE...
Rep. Issa, Darrell E. [R-CA-49
2009-07-09
Senate - 10/19/2009 Committee on Homeland Security and Governmental Affairs referred to Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Authority for one-step turn-key design-build contracting for the United States Coast Guard (USCG). 3036.104-90 Section 3036.104-90 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SPECIAL CATEGORIES OF...
Geospatial Informational Security Risks and Concerns of the U.S. Air Force GeoBase Program
2007-03-01
multiple governmental directives such as the Government Performance and Results Act (GPRA), Paperwork Reduction Act (PRA), and Office of Management and... governments , non- governmental organizations (NGOs), universities, and commercial sector contractors (Lachman, 2006). One command noted that over...Defense, or the United States Government . AFIT/GEM/ENV/07-M1 GEOSPATIAL INFORMATIONAL SECURITY RISKS AND CONCERNS OF THE UNITED STATES
From Alliance to Acquaintance: The Australian-American Security Relationship
1991-12-01
THE DROVER’S DOG: HAWKE, 1983-1991 ................ 266 "Concerned to do Nothing" ...................... 269 "Brave Little New Zealand ...1951, Australia and New Zealand concluded a tripartite security pact with the United States. ANZUS did not commit the United States to help defend...discussions highlighted their extensive mutual interests and shared strategic perceptions as allies under the ANZUS (Australia, New Zealand and the
Holben, David H; Taylor, Christopher A
2015-09-01
Food insecurity is a preventable health threat and may precipitate central obesity and metabolic syndrome in children and adolescents in the United States. To examine (1) health by household food security status; and (2) differences and prevalence of central obesity among persons aged 12 to 18 years in the United States. The National Health and Nutrition Examination Survey was administered to a cross-sectional sample of persons aged 12 to 18 years in 1999 to 2006. Controlling for age, race/ethnicity, and sex differences in mean obesity and chronic disease factors across levels of food insecurity (analysis of covariance [Bonferroni post hoc] and ORs [logistic regression analyses]) were examined, as were differences in the rates of risk factors (χ(2) statistics). A total of 7435 participants were analyzed. Those from marginally food secure (n=751) and low-food secure (n=1206) (population size estimate, 26,714,182) households were significantly more likely than their high-food secure counterparts (n=4831) to be overweight (P=.036) (OR, 1.44), and those from marginally food secure households were 1.3-times more likely to be obese (P=.036). Nearly 25% of respondents from marginally food secure, low-food secure, and very low-food secure (n=647) households reported central obesity (P=.002), which was 1.4 to 1.5 times more likely than those from high-food secure households. Participants from high-food secure households had significantly higher mean high-density lipoprotein values (P=.019). Risk factors indicative of metabolic syndrome were present in 3.1%. Household food insecurity was associated with an increased likelihood of being overweight and having central obesity. Limitations included the use of cross-sectional data and some self-reported data and the inability to control for all moderating variables in obesity and overall health status.
Analysis and solutions of security issues in Ethernet PON
NASA Astrophysics Data System (ADS)
Meng, Yu; Jiang, Tao; Xiao, Dingzhong
2005-02-01
Ethernet Passive Optical Network (EPON), which combines the low cost Ethernet equipment and economic fiber infrastructure, is being considered as a promising solution for Fiber-To-The-Home (FTTH). However, since EPON is an optical shared medium network, some unique features make it more vulnerable to security attacks. In this paper, the key security threats of EPON are firstly analyzed. And then, considering some specific properties which might be utilized for security, such as the safety of transmissions in upstream direction, some novel methods are presented to solve security problems. Firstly, based on some modification about registration, the mechanism of access control is achieved. Secondly, we implement an AES-128 symmetrical encryption and decryption in the EPON system. The AES-128 algorithm can process data blocks of 128 bits, but the length of Ethernet frame is variable. How to deal with the last block, which is not up to 128 bits, is discussed in detail. Finally, key update is accomplished through a vendor specific OAM frame in order to enhance the level of security. The proposed mechanism will remain in conformance with P2MP specification defined by 802.3ah TF, and can supply a complete security solution for EPON.
Veerasamy, Anitha; Madane, Srinivasa Rao; Sivakumar, K; Sivaraman, Audithan
2016-01-01
Growing attractiveness of Mobile Ad Hoc Networks (MANETs), its features, and usage has led to the launching of threats and attacks to bring negative consequences in the society. The typical features of MANETs, especially with dynamic topology and open wireless medium, may leave MANETs vulnerable. Trust management using uncertain reasoning scheme has previously attempted to solve this problem. However, it produces additional overhead while securing the network. Hence, a Location and Trust-based secure communication scheme (L&TS) is proposed to overcome this limitation. Since the design securing requires more than two data algorithms, the cost of the system goes up. Another mechanism proposed in this paper, Angle and Context Free Grammar (ACFG) based precarious node elimination and secure communication in MANETs, intends to secure data transmission and detect precarious nodes in a MANET at a comparatively lower cost. The Elliptic Curve function is used to isolate a malicious node, thereby incorporating secure data transfer. Simulation results show that the dynamic estimation of the metrics improves throughput by 26% in L&TS when compared to the TMUR. ACFG achieves 33% and 51% throughput increase when compared to L&TS and TMUR mechanisms, respectively.
39 CFR 267.5 - National Security Information.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 39 Postal Service 1 2012-07-01 2012-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide...
39 CFR 267.5 - National Security Information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 39 Postal Service 1 2010-07-01 2010-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide...
39 CFR 267.5 - National Security Information.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 39 Postal Service 1 2014-07-01 2014-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide...
39 CFR 267.5 - National Security Information.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 39 Postal Service 1 2013-07-01 2013-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide...