13 CFR 107.1450 - Optional redemption of Preferred Securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Optional redemption of Preferred Securities. 107.1450 Section 107.1450 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Preferred Securities...
13 CFR 107.1410 - Requirement to redeem 4 percent Preferred Securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Requirement to redeem 4 percent Preferred Securities. 107.1410 Section 107.1410 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Preferred...
13 CFR 107.1420 - Articles requirements for 4 percent Preferred Securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Articles requirements for 4 percent Preferred Securities. 107.1420 Section 107.1420 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Preferred...
17 CFR 31.22 - Prohibited trading in leverage contracts.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Prohibited trading in leverage contracts. 31.22 Section 31.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.22 Prohibited trading in leverage contracts. No futures commission merchant or...
17 CFR 31.22 - Prohibited trading in leverage contracts.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Prohibited trading in leverage contracts. 31.22 Section 31.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.22 Prohibited trading in leverage contracts. No futures commission merchant or...
17 CFR 31.22 - Prohibited trading in leverage contracts.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Prohibited trading in leverage contracts. 31.22 Section 31.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.22 Prohibited trading in leverage contracts. No futures commission merchant or...
17 CFR 31.22 - Prohibited trading in leverage contracts.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Prohibited trading in leverage contracts. 31.22 Section 31.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.22 Prohibited trading in leverage contracts. No futures commission merchant or...
17 CFR 31.22 - Prohibited trading in leverage contracts.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Prohibited trading in leverage contracts. 31.22 Section 31.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.22 Prohibited trading in leverage contracts. No futures commission merchant or...
Code of Federal Regulations, 2011 CFR
2011-01-01
... receipt of additional Leverage, within 120 days prior to the end of your fiscal year. (10) Nonperformance... during the first eight years following your first issuance of Participating Securities. (ii) This... applicable to you; or you fail to maintain as of the end of each fiscal year the investment ratios or amounts...
Code of Federal Regulations, 2010 CFR
2010-01-01
... receipt of additional Leverage, within 120 days prior to the end of your fiscal year. (10) Nonperformance... during the first eight years following your first issuance of Participating Securities. (ii) This... applicable to you; or you fail to maintain as of the end of each fiscal year the investment ratios or amounts...
13 CFR 107.550 - Prior approval of secured third-party debt of leveraged Licensees.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Prior approval of secured third-party debt of leveraged Licensees. 107.550 Section 107.550 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES Managing the Operations of a Licensee Borrowing by Licensees...
13 CFR 107.1910 - Non-waiver of SBA's rights or terms of Leverage security.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Non-waiver of SBA's rights or terms of Leverage security. 107.1910 Section 107.1910 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES Miscellaneous § 107.1910 Non-waiver of SBA's rights or terms...
13 CFR 107.1910 - Non-waiver of SBA's rights or terms of Leverage security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Non-waiver of SBA's rights or terms of Leverage security. 107.1910 Section 107.1910 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES Miscellaneous § 107.1910 Non-waiver of SBA's rights or terms...
13 CFR 108.1910 - Non-waiver of SBA's rights or terms of Leverage security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Non-waiver of SBA's rights or terms of Leverage security. 108.1910 Section 108.1910 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM Miscellaneous § 108.1910 Non-waiver of SBA's rights...
13 CFR 107.1700 - Transfer by SBA of its interest in Licensee's Leverage security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Transfer by SBA of its interest in Licensee's Leverage security. 107.1700 Section 107.1700 Business Credit and Assistance SMALL BUSINESS... will be liable for all damage or loss which SBA may sustain by reason of such disposal, up to the...
13 CFR 108.1700 - Transfer by SBA of its interest in a NMVC Company's Leverage security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Transfer by SBA of its interest in a NMVC Company's Leverage security. 108.1700 Section 108.1700 Business Credit and Assistance SMALL... be liable for all damage or loss which SBA may sustain by reason of such disposal, up to the amount...
13 CFR 107.1440 - Three percent preferred stock issued before November 21, 1989.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Three percent preferred stock issued before November 21, 1989. 107.1440 Section 107.1440 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Preferred...
17 CFR 31.6 - Registration of leverage commodities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... commodities. 31.6 Section 31.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... applied to the National Futures Association for registration as a leverage transaction merchant; (2... the spot, forward, and futures markets for the generic commodity; (3) Specify a commercial or retail...
Code of Federal Regulations, 2011 CFR
2011-04-01
..., commodity pool operators and leverage transaction merchants. 3.10 Section 3.10 Commodity and Securities..., commodity pool operators and leverage transaction merchants. (a) Application for registration. (1)(i) Except... merchant, retail foreign exchange dealers, introducing broker, commodity trading advisor, commodity pool...
13 CFR 107.1450 - Optional redemption of Preferred Securities.
Code of Federal Regulations, 2013 CFR
2013-01-01
... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...
13 CFR 107.1450 - Optional redemption of Preferred Securities.
Code of Federal Regulations, 2014 CFR
2014-01-01
... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...
13 CFR 107.1450 - Optional redemption of Preferred Securities.
Code of Federal Regulations, 2012 CFR
2012-01-01
... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...
13 CFR 107.1450 - Optional redemption of Preferred Securities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...
13 CFR 107.1530 - How a Licensee computes SBA's Profit Participation.
Code of Federal Regulations, 2011 CFR
2011-01-01
... steps in paragraphs (e) through (g) of this section. (e) Compute the “PLC ratio”—(1) General rule. The “PLC ratio” is the highest ratio of outstanding Participating Securities to Leverageable Capital that... reduced PLC ratio as follows: (i) Divide the highest dollar amount of Participating Securities you have...
13 CFR 107.1530 - How a Licensee computes SBA's Profit Participation.
Code of Federal Regulations, 2010 CFR
2010-01-01
... steps in paragraphs (e) through (g) of this section. (e) Compute the “PLC ratio”—(1) General rule. The “PLC ratio” is the highest ratio of outstanding Participating Securities to Leverageable Capital that... reduced PLC ratio as follows: (i) Divide the highest dollar amount of Participating Securities you have...
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-04-01
This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important tomore » leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.« less
13 CFR 107.1210 - Payment of leverage fee upon receipt of commitment.
Code of Federal Regulations, 2010 CFR
2010-01-01
... percent of the face amount of the Debentures or Participating Securities reserved under the commitment... this section by 5:00 P.M. Eastern Time on the 30th calendar day following the issuance of SBA's...
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-02-01
This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes.more » These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.« less
2009-04-01
terrorist social networks are quite vulnerable to penetration and exploitation by indigenous personnel working in the communities where the groups operate...LEVERAGING INDIGENOUS SECURITY FORCES by Mack-Jan H. Spencer, Maj, USAF A Research Report Submitted to the Faculty In Partial Fulfillment of the...4. TITLE AND SUBTITLE Connecting the Spots: Combating Transnational Terrorist Groups Through Leveraging Indigenous Security Forces 5a. CONTRACT
13 CFR 107.1400 - Dividends or partnership distributions on 4 percent Preferred Securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Dividends or partnership distributions on 4 percent Preferred Securities. 107.1400 Section 107.1400 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Redeeming 4 percent Preferred Securities with proceeds of non-subsidized Debentures. 107.1430 Section 107.1430 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for...
17 CFR 31.17 - Records of leverage transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Records of leverage... LEVERAGE TRANSACTIONS § 31.17 Records of leverage transactions. (a) Each leverage transaction merchant receiving a leverage customer's order shall immediately upon receipt thereof prepare a written record of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-04
.... Each applicant also distributed preferred shares of Dutch Auction Rate Transferable Securities (``DARTS'') of the acquiring fund to holders of applicants' Auction Rate Preferred Shares, DARTS, or Auction... distributed Dutch Auction Rate Transferable Securities (``DARTS'') of the acquiring fund to the holders of...
20 CFR 416.621 - What is our order of preference in selecting a representative payee for you?
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false What is our order of preference in selecting a representative payee for you? 416.621 Section 416.621 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Representative Payment § 416.621...
Yamasaki, Alisa; Mise, Yoshihiro; Mise, Yoko; Lee, Jeffrey E; Aloia, Thomas A; Katz, Matthew H; Chang, George J; Lillemoe, Keith D; Raut, Chandrajit P; Conrad, Claudius
2016-05-01
It is unclear whether music preferences and perceptions in the operating room (OR) differ by demographic and professional factors and how an improved understanding of these potential differences can be leveraged to enhance team dynamics and the OR work environment. Currently, there is limited knowledge regarding the impact of music on OR team concentration and communication. This study was a multicenter, cross-sectional study of 282 preoperative patients and 390 providers-attending physicians, residents, and nurses in anesthesiology and surgery. Patient and provider responses were measured using a newly developed questionnaire. Patients who highly enjoyed music felt music alleviated stress and enhanced concentration and communication and favored use of music in the OR. The genres favored most by patients were rock music (32%), classical music (28%), and top 40 hits (26%). All providers reported a high frequency of use of music during the operation. Nurses and residents were more likely than attendings to report high enjoyment of music in the OR (P < .02). Surgeons and anesthesiologists had high median scores for enjoyment of music and low median scores for music as distraction. Anesthesiologists preferred classical and jazz/blues at lower volumes compared with surgeons, who favored top 40 music at higher noise pressure levels. Patients and providers perceived music to improve provider concentration and team communication; nurses held the most positive views. Musical preferences and perceptions of the effect of music in the OR differ by both professional status and specialty and provide insight into broader team dynamics that could be leveraged potentially to optimize the OR environment. Copyright © 2016 Elsevier Inc. All rights reserved.
17 CFR 31.23 - Limited right to rescind first leverage contract.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Limited right to rescind first... COMMISSION LEVERAGE TRANSACTIONS § 31.23 Limited right to rescind first leverage contract. (a) A leverage... pursuant to the following provisions: (1) Such customer may be assessed actual price losses accruing to the...
Graetz, Ilana; Gordon, Nancy; Fung, Vick; Hamity, Courtnee; Reed, Mary E
2016-08-01
Online access to health records and the ability to exchange secure messages with physicians can improve patient engagement and outcomes; however, the digital divide could limit access to web-based portals among disadvantaged groups. To understand whether sociodemographic differences in patient portal use for secure messaging can be explained by differences in internet access and care preferences. Cross-sectional survey to examine the association between patient sociodemographic characteristics and internet access and care preferences; then, the association between sociodemographic characteristics and secure message use with and without adjusting for internet access and care preference. One thousand forty-one patients with chronic conditions in a large integrated health care delivery system (76% response rate). Internet access, portal use for secure messaging, preference for in-person or online care, and sociodemographic and health characteristics. Internet access and preference mediated some of the differences in secure message use by age, race, and income. For example, using own computer to access the internet explained 52% of the association between race and secure message use and 60% of the association between income and use (Sobel-Goodman mediation test, P<0.001 for both). Education and sex-related differences in portal use remained statistically significant when controlling for internet access and preference. As the availability and use of patient portals increase, it is important to understand which patients have limited access and the barriers they may face. Improving internet access and making portals available across multiple platforms, including mobile, may reduce some disparities in secure message use.
19 CFR 10.606 - Filing of claim for tariff preference level.
Code of Federal Regulations, 2010 CFR
2010-04-01
...-Central America-United States Free Trade Agreement Tariff Preference Level § 10.606 Filing of claim for... 19 Customs Duties 1 2010-04-01 2010-04-01 false Filing of claim for tariff preference level. 10.606 Section 10.606 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...
A Unified Approach to Intra-Domain Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shue, Craig A; Kalafut, Andrew J.; Gupta, Prof. Minaxi
2009-01-01
While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to secure prominent networking protocols within a single domain. We begin with a secure version of the DHCP protocol, which has the additional feature of providing each host with a certificate. We then leverage these certificates to secure ARP, prevent spoofing within the domain, and secure SSH and VPN connections between the domain and hosts which have previously interacted with it locally. In doing so, we also develop an incrementally deployable public key infrastructuremore » which can later be leveraged to support inter-domain authentication.« less
Code of Federal Regulations, 2010 CFR
2010-01-01
... face, in bold type: “This security is not a savings account or deposit and it is not insured by the... the same priority as savings accounts or a higher priority; (C) State that the security is not secured...) Except as provided in paragraph (c)(4)(ii) of this section, a savings association must use an indenture...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-14
... other things, the issuer of the debt security must have at least one class of common or preferred equity... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64287; File No. SR-NYSE-2011-15] Self... 1401 To Modify the Initial Trading Market Value for Debt Securities April 8, 2011. Pursuant to Section...
Leveraging Trade Agreements to Meet U.S. Security Aims
2016-04-08
NATIONAL DEFENSE UNIVERSITY JOINT FORCES STAFF COLLEGE JOINT ADVANCED WARFIGHTING SCHOOL LEVERAGING TRADE AGREEMENTS TO MEET U.S. SECURITY AIMS by...Forces Staff College Joint Advanced Warfighting School 7800 Hampton Blvd Norfolk, VA. 2351 1-1702 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES...my own personal views and are not necessarily endorsed by the Joint Forces Staff College or the Department of Defense. This paper is entirely my own
19 CFR 10.778 - Filing of claim for tariff preference level.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Filing of claim for tariff preference level. 10.778 Section 10.778 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Morocco...
19 CFR 10.881 - Filing of claim for tariff preference level.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 19 Customs Duties 1 2013-04-01 2013-04-01 false Filing of claim for tariff preference level. 10.881 Section 10.881 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Oman...
19 CFR 10.881 - Filing of claim for tariff preference level.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 19 Customs Duties 1 2012-04-01 2012-04-01 false Filing of claim for tariff preference level. 10.881 Section 10.881 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Oman...
19 CFR 10.881 - Filing of claim for tariff preference level.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false Filing of claim for tariff preference level. 10.881 Section 10.881 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Oman...
19 CFR 10.881 - Filing of claim for tariff preference level.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 19 Customs Duties 1 2014-04-01 2014-04-01 false Filing of claim for tariff preference level. 10.881 Section 10.881 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Oman...
Resident Use of Text Messaging for Patient Care: Ease of Use or Breach of Privacy?
Prochaska, Micah T; Bird, Amber-Nicole; Chadaga, Amar; Arora, Vineet M
2015-11-26
Short message service (SMS) text messaging is an efficient form of communication and pervasive in health care, but may not securely protect patient information. It is unclear if resident providers are aware of the security concerns of SMS text messaging when communicating about patient care. We sought to compare residents' preferences for SMS text messaging compared with other forms of in-hospital communication when considering security versus ease of use. This study was a cross-sectional multi-institutional survey of internal medicine residents. Residents ranked different communication modalities based on efficiency, ease of use, and security using a Likert scale. Communication options included telephone, email, hospital paging, and SMS text messaging. Respondents also reported whether they had received confidential patient identifiers through any of these modalities. SMS text messaging was preferred by 71.7% (94/131) of respondents because of its efficiency and by 79.8% (103/129) of respondents because of its ease of use. For security, 82.5% (104/126) of respondents preferred the hospital paging system, whereas only 20.6% (26/126) of respondents preferred SMS text messaging for secure communication. In all, 70.9% (93/131) of respondents reported having received patient identifiers (first and/or last name), 81.7% (107/131) reported receiving patient initials, and 50.4% (66/131) reported receiving a patient's medical record number through SMS text messages. Residents prefer in-hospital communication through SMS text messaging because of its ease of use and efficiency. Despite security concerns, the majority of residents reported receiving confidential patient information through SMS text messaging. For providers, it is possible that the benefits of improved in-hospital communication with SMS text messaging and the presumed improvement in the coordination and delivery of patient care outweigh security concerns they may have. The tension between the security and convenience of SMS text messaging may represent an educational opportunity to ensure the compliance of mobile technology in the health care setting.
Do, Nhan V; Barnhill, Rick; Heermann-Do, Kimberly A; Salzman, Keith L; Gimbel, Ronald W
2011-01-01
To design, build, implement, and evaluate a personal health record (PHR), tethered to the Military Health System, that leverages Microsoft® HealthVault and Google® Health infrastructure based on user preference. A pilot project was conducted in 2008-2009 at Madigan Army Medical Center in Tacoma, Washington. Our PHR was architected to a flexible platform that incorporated standards-based models of Continuity of Document and Continuity of Care Record to map Department of Defense-sourced health data, via a secure Veterans Administration data broker, to Microsoft® HealthVault and Google® Health based on user preference. The project design and implementation were guided by provider and patient advisory panels with formal user evaluation. The pilot project included 250 beneficiary users. Approximately 73.2% of users were < 65 years of age, and 38.4% were female. Of the users, 169 (67.6%) selected Microsoft® HealthVault, and 81 (32.4%) selected Google® Health as their PHR of preference. Sample evaluation of users reflected 100% (n = 60) satisfied with convenience of record access and 91.7% (n = 55) satisfied with overall functionality of PHR. Key lessons learned related to data-transfer decisions (push vs pull), purposeful delays in reporting sensitive information, understanding and mapping PHR use and clinical workflow, and decisions on information patients may choose to share with their provider. Currently PHRs are being viewed as empowering tools for patient activation. Design and implementation issues (eg, technical, organizational, information security) are substantial and must be thoughtfully approached. Adopting standards into design can enhance the national goal of portability and interoperability.
Leveraging the Power of Place: A New Commitment to Personalizing Learning
ERIC Educational Resources Information Center
Liebtag, Emily
2018-01-01
Personalized learning offers instruction that matches students' learning preferences and specific interests. Taking innovative approaches to engaging with students' individual contexts and interests through place-based education can be particularly meaningful. Place-based education (PBE) is anytime, anywhere learning that leverages the power of…
20 CFR 408.621 - What is our order of preference in selecting a representative payee for you?
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false What is our order of preference in selecting a representative payee for you? 408.621 Section 408.621 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Representative Payment § 408.621 What is our...
20 CFR 408.621 - What is our order of preference in selecting a representative payee for you?
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false What is our order of preference in selecting a representative payee for you? 408.621 Section 408.621 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Representative Payment § 408.621 What is our...
20 CFR 408.621 - What is our order of preference in selecting a representative payee for you?
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false What is our order of preference in selecting a representative payee for you? 408.621 Section 408.621 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Representative Payment § 408.621 What is our...
20 CFR 408.621 - What is our order of preference in selecting a representative payee for you?
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false What is our order of preference in selecting a representative payee for you? 408.621 Section 408.621 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Representative Payment § 408.621 What is our...
20 CFR 408.621 - What is our order of preference in selecting a representative payee for you?
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false What is our order of preference in selecting a representative payee for you? 408.621 Section 408.621 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Representative Payment § 408.621 What is our...
13 CFR 108.550 - Prior approval of secured third-party debt of NMVC companies.
Code of Federal Regulations, 2010 CFR
2010-01-01
... ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM Managing the Operations of a NMVC Company Borrowing... total outstanding borrowings (not including Leverage) to exceed 50 percent of your Leverageable Capital. Voluntary Decrease in Regulatory Capital ...
76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-13
..., cyber-security, knowledge management and how best to leverage related technologies funded by other... Science and Technology Advisory Committee (HSSTAC) ACTION: Committee Management; Notice of Federal... Committee Management Secretariat, General Services Administration. Name of Committee: Homeland Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-12
... these guidelines, DTC must, among other things, maintain a Total Risk-Based Capital Ratio of at least 10... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63254; File No. SR-DTC-2010-14] Self-Regulatory... Preferred Stock November 5, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act...
Expanding the role of unattended ground sensors to multi-tiered systems
NASA Astrophysics Data System (ADS)
Garrison, David R., II
2009-05-01
Unattended Ground Sensors (UGS) have recently gained momentum in surveillance and protection applications. Many of these Unattended Ground Sensors are deployed in current operations today across the Department of Defense (DoD) and Department of Homeland Security (DHS). In addition to UGS needs, there is a growing desire to leverage existing UGS for incorporation into higher level systems for a broadening role in defense and homeland security applications. The architecture to achieve this goal and examples of non-traditional scenarios that leverage higher level systems are discussed in this paper.
Barnhill, Rick; Heermann-Do, Kimberly A; Salzman, Keith L; Gimbel, Ronald W
2011-01-01
Objective To design, build, implement, and evaluate a personal health record (PHR), tethered to the Military Health System, that leverages Microsoft® HealthVault and Google® Health infrastructure based on user preference. Materials and methods A pilot project was conducted in 2008–2009 at Madigan Army Medical Center in Tacoma, Washington. Our PHR was architected to a flexible platform that incorporated standards-based models of Continuity of Document and Continuity of Care Record to map Department of Defense-sourced health data, via a secure Veterans Administration data broker, to Microsoft® HealthVault and Google® Health based on user preference. The project design and implementation were guided by provider and patient advisory panels with formal user evaluation. Results The pilot project included 250 beneficiary users. Approximately 73.2% of users were <65 years of age, and 38.4% were female. Of the users, 169 (67.6%) selected Microsoft® HealthVault, and 81 (32.4%) selected Google® Health as their PHR of preference. Sample evaluation of users reflected 100% (n=60) satisfied with convenience of record access and 91.7% (n=55) satisfied with overall functionality of PHR. Discussion Key lessons learned related to data-transfer decisions (push vs pull), purposeful delays in reporting sensitive information, understanding and mapping PHR use and clinical workflow, and decisions on information patients may choose to share with their provider. Conclusion Currently PHRs are being viewed as empowering tools for patient activation. Design and implementation issues (eg, technical, organizational, information security) are substantial and must be thoughtfully approached. Adopting standards into design can enhance the national goal of portability and interoperability. PMID:21292705
7 CFR 4290.1700 - Secretary's transfer of interest in a RBIC's Leverage security.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) RURAL BUSINESS-COOPERATIVE SERVICE AND RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE RURAL BUSINESS INVESTMENT COMPANY (âRBICâ) PROGRAM Financial Assistance for RBICs (Leverage) Miscellaneous § 4290.1700... consideration as he or she deems reasonable, the Secretary may sell, assign, transfer, or otherwise dispose of...
Leveraging brightness from transportation lighting systems through light source color.
DOT National Transportation Integrated Search
2013-11-01
Roadway transportation lighting is installed for multiple reasons including traffic safety and pedestrian : security. Judgments of pedestrian safety and security along roadways are not strictly correlated to : specified light levels, but the color of...
13 CFR 107.1580 - Special rules for In-Kind Distributions by Licensees.
Code of Federal Regulations, 2013 CFR
2013-01-01
... security as of the declaration date of the Distribution (if you are a Corporate Licensee) or the...) Participating Securities Leverage § 107.1580 Special rules for In-Kind Distributions by Licensees. (a) In-Kind Distributions while Licensee has outstanding Participating Securities. A Distribution under §§ 107.1540, 107...
13 CFR 107.1580 - Special rules for In-Kind Distributions by Licensees.
Code of Federal Regulations, 2010 CFR
2010-01-01
... security as of the declaration date of the Distribution (if you are a Corporate Licensee) or the...) Participating Securities Leverage § 107.1580 Special rules for In-Kind Distributions by Licensees. (a) In-Kind Distributions while Licensee has outstanding Participating Securities. A Distribution under §§ 107.1540, 107...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-26
... account in which a Member acting as a registered Market Maker, directly or indirectly, controls trading... the Exchange, or any act, condition, or cause beyond the reasonable control of the Exchange or its... FINRA members applicable to inverse, leveraged, and inverse leveraged securities and options on such...
Hybrid architecture for building secure sensor networks
NASA Astrophysics Data System (ADS)
Owens, Ken R., Jr.; Watkins, Steve E.
2012-04-01
Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.
78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-26
..., cyber-security, knowledge management and how best to leverage related technologies funded by other... duties. This determination follows consultation with the Committee Management Secretariat, General..., management processes, and organizational constructs as needed. Upon request, the committee provides...
The Leverage Effect on Wealth Distribution in a Controllable Laboratory Stock Market
Zhu, Chenge; Yang, Guang; An, Kenan; Huang, Jiping
2014-01-01
Wealth distribution has always been an important issue in our economic and social life, since it affects the harmony and stabilization of the society. Under the background of widely used financial tools to raise leverage these years, we studied the leverage effect on wealth distribution of a population in a controllable laboratory market in which we have conducted several human experiments, and drawn the conclusion that higher leverage leads to a higher Gini coefficient in the market. A higher Gini coefficient means the wealth distribution among a population becomes more unequal. This is a result of the ascending risk with growing leverage level in the market plus the diversified trading abilities and risk preference of the participants. This work sheds light on the effects of leverage and its related regulations, especially its impact on wealth distribution. It also shows the capability of the method of controllable laboratory markets which could be helpful in several fields of study such as economics, econophysics and sociology. PMID:24968222
The leverage effect on wealth distribution in a controllable laboratory stock market.
Zhu, Chenge; Yang, Guang; An, Kenan; Huang, Jiping
2014-01-01
Wealth distribution has always been an important issue in our economic and social life, since it affects the harmony and stabilization of the society. Under the background of widely used financial tools to raise leverage these years, we studied the leverage effect on wealth distribution of a population in a controllable laboratory market in which we have conducted several human experiments, and drawn the conclusion that higher leverage leads to a higher Gini coefficient in the market. A higher Gini coefficient means the wealth distribution among a population becomes more unequal. This is a result of the ascending risk with growing leverage level in the market plus the diversified trading abilities and risk preference of the participants. This work sheds light on the effects of leverage and its related regulations, especially its impact on wealth distribution. It also shows the capability of the method of controllable laboratory markets which could be helpful in several fields of study such as economics, econophysics and sociology.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Advertising. 17.540 Section 17.540 Domestic... in Employment in Education Programs or Activities Prohibited § 17.540 Advertising. A recipient shall not in any advertising related to employment indicate preference, limitation, specification, or...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Advertising. 17.540 Section 17.540 Domestic... in Employment in Education Programs or Activities Prohibited § 17.540 Advertising. A recipient shall not in any advertising related to employment indicate preference, limitation, specification, or...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Advertising. 17.540 Section 17.540 Domestic... in Employment in Education Programs or Activities Prohibited § 17.540 Advertising. A recipient shall not in any advertising related to employment indicate preference, limitation, specification, or...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Advertising. 17.540 Section 17.540 Domestic... in Employment in Education Programs or Activities Prohibited § 17.540 Advertising. A recipient shall not in any advertising related to employment indicate preference, limitation, specification, or...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Advertising. 17.540 Section 17.540 Domestic... in Employment in Education Programs or Activities Prohibited § 17.540 Advertising. A recipient shall not in any advertising related to employment indicate preference, limitation, specification, or...
DOT National Transportation Integrated Search
2003-03-17
The purpose of this effort is to independently evaluate the Battelle Operational Test Team to test methods for leveraging technology and operations to improve HAZMAT transport security, safety, and operational efficiency. As such, the preceding techn...
AMP: A platform for managing and mining data in the treatment of Autism Spectrum Disorder.
Linstead, Erik; Burns, Ryan; Duy Nguyen; Tyler, David
2016-08-01
We introduce AMP (Autism Management Platform), an integrated health care information system for capturing, analyzing, and managing data associated with the diagnosis and treatment of Autism Spectrum Disorder in children. AMP's mobile application simplifies the means by which parents, guardians, and clinicians can collect and share multimedia data with one another, facilitating communication and reducing data redundancy, while simplifying retrieval. Additionally, AMP provides an intelligent web interface and analytics platform which allow physicians and specialists to aggregate and mine patient data in real-time, as well as give relevant feedback to automatically learn data filtering preferences over time. Together AMP's mobile app, web client, and analytics engine implement a rich set of features that streamline the data collection and analysis process in the context of a secure and easy-to-use system so that data may be more effectively leveraged to guide treatment.
13 CFR 107.1610 - Effect of prepayment or early redemption of Leverage on a Trust Certificate.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Effect of prepayment or early... prepayment or early redemption of Leverage on a Trust Certificate. (a) The rights, if any, of a Licensee to prepay any Debenture or make early redemption of any Participating Security are established by the terms...
Leveraging the laboratory response network model for the global health security agenda.
Mangal, Chris N; Maryogo-Robinson, Lucy
2014-01-01
Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks-natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern.
Leveraging the Laboratory Response Network Model for the Global Health Security Agenda
Maryogo-Robinson, Lucy
2014-01-01
Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks—natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern. PMID:25254916
Using Public Network Infrastructures for UAV Remote Sensing in Civilian Security Operations
2011-03-01
leveraging public wireless communication networks for UAV-based sensor networks with respect to existing constraints and user requirements...Detection with an Autonomous Micro UAV Mesh Network . In the near future police departments, fire brigades and other homeland security ...UAV-based sensor networks with respect to existing constraints and user requirements. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION
77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-12
... developments in systems engineering, cyber- security, knowledge management and how best to leverage related... contribution to a diverse range of science and technology topic areas (including chemical, biological, and... technology capabilities and needs, and the latest thinking in systems engineering), and their depth of...
NASA Technical Reports Server (NTRS)
Sturm, Albert J. (Inventor); Marrinan, Thomas E. (Inventor)
1995-01-01
An extensible and retractable telescoping tube positions test devices that inspect large stationary objects. The tube has three dimensional adjustment capabilities and is vertically suspended from a frame. The tube sections are independently supported with each section comprising U-shaped housing secured to a thicker support plate. Guide mechanisms preferably mounted only to the thicker plates guide each tube section parallel to a reference axis with improved accuracy so that the position of the remote end of the telescoping tube is precisely known.
Challenges in Securing the Interface Between the Cloud and Pervasive Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lagesse, Brent J
2011-01-01
Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources andmore » issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-19
... issuer or two or more issuers which the Fund controls and which are engaged in the same, similar, or... is the multiple or inverse multiple (i.e., 2Xs and 3Xs) of the Fund's broad-based securities market index (as defined in Form N-1A).\\18\\ The Fund will not invest in leveraged or inverse leveraged...
20 CFR 435.15 - Metric system of measurement.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Metric system of measurement. 435.15 Section 435.15 Employees' Benefits SOCIAL SECURITY ADMINISTRATION UNIFORM ADMINISTRATIVE REQUIREMENTS FOR... metric system is the preferred measurement system for U.S. trade and commerce. The Act requires each...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rizzo, Davinia; Blackburn, Mark
Complex systems are comprised of technical, social, political and environmental factors as well as the programmatic factors of cost, schedule and risk. Testing these systems for enhanced security requires expert knowledge in many different fields. It is important to test these systems to ensure effectiveness, but testing is limited to due cost, schedule, safety, feasibility and a myriad of other reasons. Without an effective decision framework for Test and Evaluation (T&E) planning that can take into consideration technical as well as programmatic factors and leverage expert knowledge, security in complex systems may not be assessed effectively. Therefore, this paper coversmore » the identification of the current T&E planning problem and an approach to include the full variety of factors and leverage expert knowledge in T&E planning through the use of Bayesian Networks (BN).« less
Considering IIOT and security for the DoD
NASA Astrophysics Data System (ADS)
Klawon, Kevin; Gold, Josh; Bachman, Kristen; Landoll, Darren
2016-05-01
The Internet of Things (IoT) has come of age and domestic and industrial devices are all "smart". But how can they be universally classified and queried? How do we know that the underlying architecture is secure enough to deploy on a defense network? By leverage existing platforms designed for interoperability, extensibility, and security that can manage data across multiple domains and runs on any platform.
19 CFR 10.608 - Submission of certificate of eligibility.
Code of Federal Regulations, 2010 CFR
2010-04-01
...-Central America-United States Free Trade Agreement Tariff Preference Level § 10.608 Submission of... 19 Customs Duties 1 2010-04-01 2010-04-01 false Submission of certificate of eligibility. 10.608 Section 10.608 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...
Marine Corps Private Cloud Computing Environment Strategy
2012-05-15
leveraging economies of scale through the MCEITS PCCE, the Marine Corps will measure consumed IT resources more effectively, increase or decrease...flexible broad network access, resource pooling, elastic provisioning and measured services. By leveraging economies of scale the Marine Corps will be able...IaaS SaaS / IaaS 1 1 LCE I ACE Dets I I I I ------------------~ GIG / CJ Internet Security Boundary MCEN I DISN r :------------------ MCEN
ERIC Educational Resources Information Center
Levitt, Steven D.; List, John A.; Neckermann, Susanne; Sadoff, Sally
2012-01-01
A long line of research on behavioral economics has established the importance of factors that are typically absent from the standard economic framework: reference dependent preferences, hyperbolic preferences, and the value placed on non-financial rewards. To date, these insights have had little impact on the way the educational system operates.…
13 CFR 107.1710 - SBA authority to collect or compromise its claims.
Code of Federal Regulations, 2010 CFR
2010-01-01
... SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Miscellaneous... consideration as it deems reasonable, collect or compromise all claims relating to Preferred or Participating...
Code of Federal Regulations, 2010 CFR
2010-01-01
... NMVC Company-application procedure, amount, and term. 108.1200 Section 108.1200 Business Credit and... Assistance for NMVC Companies (Leverage) Conditional Commitments by Sba to Reserve Leverage for A Nmvc Company § 108.1200 SBA's Leverage commitment to a NMVC Company—application procedure, amount, and term. (a...
Code of Federal Regulations, 2010 CFR
2010-04-01
... financial, cover and segregation requirements by leverage transaction merchants. 31.7 Section 31.7 Commodity... of minimum financial, cover and segregation requirements by leverage transaction merchants. (a) Each... required by § 31.8, or that the amount of leverage customer funds in segregation is less than is required...
Code of Federal Regulations, 2011 CFR
2011-04-01
... financial, cover and segregation requirements by leverage transaction merchants. 31.7 Section 31.7 Commodity... of minimum financial, cover and segregation requirements by leverage transaction merchants. (a) Each... required by § 31.8, or that the amount of leverage customer funds in segregation is less than is required...
Leveraging the Security -- Development Nexus in East Africa
2012-02-28
THE SECURITY-DEVELOPMENT NEXUS IN EAST AFRICA America is in a state of hypnosis . Many outside the beltway do not know, and/or care, how reckless...invariably, what policy makers are implicitly tasked to do, because America will not come out of its hypnosis at the count of three. Endnotes 1 Susan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hamlet, Jason; Pierson, Lyndon; Bauer, Todd
Supply chain security to detect, deter, and prevent the counterfeiting of networked and stand-alone integrated circuits (ICs) is critical to cyber security. Sandia National Laboratory researchers have developed IC ID to leverage Physically Unclonable Functions (PUFs) and strong cryptographic authentication to create a unique fingerprint for each integrated circuit. IC ID assures the authenticity of ICs to prevent tampering or malicious substitution.
The Centurions vs. the Hydra: French Counterinsurgency in the Peninsular War (1808-1812)
2011-06-10
their operational dilemma in different manners. But the analysis also outlined a common denominator to their practices. Leverage of religion , build up...But the analysis also outlined a common denominator to their practices. Leverage of religion , build up of native security forces, and development...armada en los origenese de la Espana liberal, 1808-1823 [Cortes and Military Forces at the Origin of Liberal Spain] (Madrid, Spain: Siglo veintiuno
32 CFR 147.6 - Guidance D-Sexual behavior.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., exploitation, or duress, or reflects lack of judgment or discretion. 1 Sexual orientation or preference may not... 32 National Defense 1 2010-07-01 2010-07-01 false Guidance D-Sexual behavior. 147.6 Section 147.6... Guidance D—Sexual behavior. (a) The concern. Sexual behavior is a security concern if it involves a...
12 CFR 567.8 - Leverage ratio.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Leverage ratio. 567.8 Section 567.8 Banks and... § 567.8 Leverage ratio. (a) The minimum leverage capital requirement for a savings association assigned a composite rating of 1, as defined in § 516.3 of this chapter, shall consist of a ratio of core...
Democratizing Authority in the Built Environment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Andersen, Michael P; Kolb, John; Chen, Kaifei
Operating systems and applications in the built environment have relied upon central authorization and management mechanisms which restrict their scalability, especially with respect to administrative overhead. We propose a new set of primitives encompassing syndication, security, and service execution that unifies the management of applications and services across the built environment, while enabling participants to individually delegate privilege across multiple administrative domains with no loss of security or manageability. We show how to leverage a decentralized authorization syndication platform to extend the design of building operating systems beyond the single administrative domain of a building. The authorization system leveraged ismore » based on blockchain smart contracts to permit decentralized and democratized delegation of authorization without central trust. Upon this, a publish/subscribe syndication tier and a containerized service execution environment are constructed. Combined, these mechanisms solve problems of delegation, federation, device protection and service execution that arise throughout the built environment. We leverage a high-fidelity city-scale emulation to verify the scalability of the authorization tier, and briefly describe a prototypical democratized operating system for the built environment using this foundation.« less
Leveraging Trade Agreements to Meet U.S. Security Aims
2016-04-08
TO MEET U.S. SECURITY AIMS 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Sd. PROJECT NUMBER LTC Allysa A. Kropp (USARNG) Se. TASK NUMBER 5f...Sanctions Programs and Country Information,” under “Resource Center, Financial Sanctions, Programs ,” https’.//wwiv.treasurv.gov/resource center/sanctions... Program , and economic integration of former adversaries through U.S. trade policy.7 In the National Security Strategy, President Obama underscored the
Secure Learning and Learning for Security: Research in the Intersection
2010-05-13
researchers to consider how Machine Learning and Statistics might be leveraged for constructing intelli - gent attacks. In a similar vein, security...Quantiles S am pl e Q ua nt ile s...8217 Residuals in Flow 144 Theoretical Quantiles S am pl e Q ua nt ile s 0 1 2 3 4 5 6 7 5. 0e + 07 1. 0e + 08 1. 5e + 08 Comparing Actual and Synthetic
Leveraging State And Local Law Enforcement Maritime Homeland Security Practices
2016-03-01
ric-zai-inc.com/Publications/cops-p143-pub.pdf. 8 Yahoo News, “10 Years Later: The Rookie Police Officer Who Caught Eric Rudolph,” May 20, 2013, http...DC: White House, 2004. ———. Presidential Policy Directive 18 (PPD-18), Maritime Security. Washington, DC: White House, 2012. Yahoo News. “10
13 CFR 107.1610 - Effect of prepayment or early redemption of Leverage on a Trust Certificate.
Code of Federal Regulations, 2012 CFR
2012-01-01
... (Leverage) Funding Leverage by Use of Sba-Guaranteed Trust Certificates (âtcsâ) § 107.1610 Effect of... 13 Business Credit and Assistance 1 2012-01-01 2012-01-01 false Effect of prepayment or early redemption of Leverage on a Trust Certificate. 107.1610 Section 107.1610 Business Credit and Assistance SMALL...
13 CFR 107.1610 - Effect of prepayment or early redemption of Leverage on a Trust Certificate.
Code of Federal Regulations, 2010 CFR
2010-01-01
... (Leverage) Funding Leverage by Use of Sba-Guaranteed Trust Certificates (âtcsâ) § 107.1610 Effect of... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Effect of prepayment or early redemption of Leverage on a Trust Certificate. 107.1610 Section 107.1610 Business Credit and Assistance SMALL...
13 CFR 108.1610 - Effect of prepayment or early redemption of Leverage on a Trust Certificate.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Companies (Leverage) Funding Leverage by Use of Sba Guaranteed Trust Certificates (âtcsâ) § 108.1610 Effect... 13 Business Credit and Assistance 1 2012-01-01 2012-01-01 false Effect of prepayment or early redemption of Leverage on a Trust Certificate. 108.1610 Section 108.1610 Business Credit and Assistance SMALL...
13 CFR 108.1610 - Effect of prepayment or early redemption of Leverage on a Trust Certificate.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Companies (Leverage) Funding Leverage by Use of Sba Guaranteed Trust Certificates (âtcsâ) § 108.1610 Effect... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Effect of prepayment or early redemption of Leverage on a Trust Certificate. 108.1610 Section 108.1610 Business Credit and Assistance SMALL...
Leveraging Safety Programs to Improve and Support Security Programs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Leach, Janice; Snell, Mark K.; Pratt, R.
2015-10-01
There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.
13 CFR 108.1120 - General eligibility requirement for Leverage.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false General eligibility requirement for Leverage. 108.1120 Section 108.1120 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM SBA Financial Assistance for NMVC Companies (Leverage...
12 CFR 1270.5 - Leverage limit and credit rating requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Mortgage Association (Fannie Mae), or Collateralized Mortgage Obligations (CMOs), including Real Estate Mortgage Investment Conduits (REMICs), backed by such securities; (xi) Other MBS, CMOs, and REMICs rated in...
12 CFR 1270.5 - Leverage limit and credit rating requirements.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Mortgage Association (Fannie Mae), or Collateralized Mortgage Obligations (CMOs), including Real Estate Mortgage Investment Conduits (REMICs), backed by such securities; (xi) Other MBS, CMOs, and REMICs rated in...
12 CFR 1270.5 - Leverage limit and credit rating requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Mortgage Association (Fannie Mae), or Collateralized Mortgage Obligations (CMOs), including Real Estate Mortgage Investment Conduits (REMICs), backed by such securities; (xi) Other MBS, CMOs, and REMICs rated in...
Hamlet, Jason; Pierson, Lyndon; Bauer, Todd
2018-06-25
Supply chain security to detect, deter, and prevent the counterfeiting of networked and stand-alone integrated circuits (ICs) is critical to cyber security. Sandia National Laboratory researchers have developed IC ID to leverage Physically Unclonable Functions (PUFs) and strong cryptographic authentication to create a unique fingerprint for each integrated circuit. IC ID assures the authenticity of ICs to prevent tampering or malicious substitution.
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports
NASA Astrophysics Data System (ADS)
Auletta, Vincenzo; Blundo, Carlo; de Caro, Angelo; de Cristofaro, Emiliano; Persiano, Giuseppe; Visconti, Ivan
The recent introduction of electronic passports (e-Passports) motivates the need of a thorough investigation on potential security and privacy issues. In this paper, we focus on the e-Passport implementation adopted in Italy. Leveraging previous attacks to e-Passports adopted in other countries, we analyze (in)security of Italian e-Passports and we investigate additional critical issues.
THE EFFECT OF TAX PREFERENCES ON HEALTH SPENDING
Cogan, John F.; Hubbard, R. Glenn; Kessler, Daniel P.
2011-01-01
In this paper, we estimate the effect of the tax preference for health insurance on health care spending using data from the Medical Expenditure Panel Surveys from 1996–2005. We use the fact that Social Security taxes are only levied on earnings below a statutory threshold to identify the impact of the tax preference. Because employer-sponsored health insurance premiums are excluded from Social Security payroll taxes, workers who earn just below the Social Security tax threshold receive a larger tax preference for health insurance than workers who earn just above it. We find a significant effect of the tax preference, consistent with previous research. PMID:22500056
Bekemeier, Betty; Riley, Catharine M; Padgett, Stephen M; Berkowitz, Bobbie
2007-01-01
Leveraging funds to sustain the efforts of a grant-funded initiative is often an explicit, or implicit, expectation in philanthropy. However, the magnitude of funds leveraged and the factors that facilitate success in leveraging are rarely researched. An example of one of these grant-funded initiatives is the National Turning Point Initiative. Twenty-one states received funding from The Robert Wood Johnson Foundation as part of this initiative to establish and implement strategic goals for achieving significant statewide public health system improvement through diverse, cross-sector partnerships. Leaders from 17 of these 21 states participated in a two-phased study regarding the leveraging of additional funds for their public health infrastructure improvement activities. This article reports on the second phase of the study. In this phase, key informant interviews were conducted to examine how leveraging of resources occurred as part of this large national initiative. Findings indicate that the combination of a comprehensive planning process and a broad-based partnership was crucial in securing resources to expand their efforts. The ability to strategically respond to unexpected events and opportunities also helped states use their plans and partnerships to "make the case" for additional resources to improve their public health infrastructure.
13 CFR 107.1100 - Types of Leverage and application procedures.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Types of Leverage and application procedures. 107.1100 Section 107.1100 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) General Information About...
Biometrics in support of special forces medical operations.
Kershner, Michael R
2012-01-01
Recommendations on ways in which the ODA can leverage biometrics in medical operations to improve their security, improve relations with indigenous personnel, and contribute to the larger theater biometrics program. 2012.
45 CFR 96.87 - Leveraging incentive program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION BLOCK GRANTS Low-income... paragraphs (a)(2)(ii) and (a)(2)(iii) of this section. (ii) Indian tribes that received LIHEAP services under... resources leveraged by the tribe are reported, and the tribe receives LIHEAP services under section 2602(b...
45 CFR 96.87 - Leveraging incentive program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION BLOCK GRANTS Low-income... paragraphs (a)(2)(ii) and (a)(2)(iii) of this section. (ii) Indian tribes that received LIHEAP services under... resources leveraged by the tribe are reported, and the tribe receives LIHEAP services under section 2602(b...
13 CFR 107.1130 - Leverage fees and additional charges payable by Licensee.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Leverage fees and additional charges payable by Licensee. 107.1130 Section 107.1130 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) General...
13 CFR 107.1000 - Licensees without Leverage-exceptions to the regulations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Licensees without Leverage-exceptions to the regulations. 107.1000 Section 107.1000 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES Non-leveraged Licensees-Exceptions to Regulations § 107.1000...
13 CFR 107.1150 - Maximum amount of Leverage for a Section 301(c) Licensee.
Code of Federal Regulations, 2010 CFR
2010-01-01
... conservative investment strategy that limits downside risk. Any such Leverage request must be supported by an up-to-date business plan that reflects continuation of the Licensee's successful investment strategy... ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Maximum...
13 CFR 108.1130 - Leverage fees payable by NMVC Company.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Leverage fees payable by NMVC Company. 108.1130 Section 108.1130 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM SBA Financial Assistance for NMVC Companies (Leverage) General...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mendelsohn, Michael; Urdanick, Marley; Joshi, John
2015-02-01
Credit enhancements represent a variety of financial support structures that are designed to reduce risk to those holding the debt, including debt raised via a securitization process, and thus lower the required yield associated with the security. The purpose of all forms of credit enhancement is to increase the collateral against which notes are secured (Lin,1999). The following section evaluates is not guaranteed. Perceived risks of the solar asset class--including those related to technology, offtaker creditworthiness, and regulatory policy--can increase the required yield, increase probability of investor loss of interest and/or principal, or both. In many cases, this is amore » cyclical phenomenon: risk perception is fed by lack of historical knowledge, which is in turn fed by risk perception. Therefore, successful access to capital market investment in order to spur low-cost solar deployment depends on the success of this initial fledgling period.« less
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Inclusion of subordinated debt securities and... Borrowings § 563.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as..., subpart A seeking OTS approval of, or non-objection to, the inclusion of covered securities in...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Inclusion of subordinated debt securities and... Borrowings § 563.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as..., subpart A seeking OTS approval of, or non-objection to, the inclusion of covered securities in...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Inclusion of subordinated debt securities and... Borrowings § 563.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as..., subpart A seeking OTS approval of, or non-objection to, the inclusion of covered securities in...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Inclusion of subordinated debt securities and... Borrowings § 563.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as..., subpart A seeking OTS approval of, or non-objection to, the inclusion of covered securities in...
The use of specialty training to retain doctors in Malawi: A discrete choice experiment.
Mandeville, Kate L; Ulaya, Godwin; Lagarde, Mylène; Muula, Adamson S; Dzowela, Titha; Hanson, Kara
2016-11-01
Emigration has contributed to a shortage of doctors in many sub-Saharan African countries. Specialty training is highly valued by doctors and a potential tool for retention. Yet not all types of training may be valued equally. In the first study to examine preferences for postgraduate training in depth, we carried out a discrete choice experiment as part of a cross-sectional survey of all Malawian doctors within seven years of graduation and not yet in specialty training. Over August 2012 to March 2013, 148 doctors took part out of 153 eligible in Malawi. Despite evidence that specialty training is highly sought after, Malawian junior doctors would not accept all types of training. Doctors preferred timely training outside of Malawi in core specialties (internal medicine, general surgery, paediatrics, obstetrics & gynaecology). Specialty preferences are particularly strong, with most junior doctors requiring nearly double their monthly salary to accept training all in Malawi and over six-fold to accept training in ophthalmology (representing a bundle of unpopular but priority specialties). In contrast, the location of work before training did not significantly influence most doctors' choices when guaranteed specialty training. Using a latent class model, we identified four subgroups of junior doctors with distinct preferences. Policy simulations showed that these preferences could be leveraged by policymakers to improve retention in exchange for guaranteed specialty training, however incentivising the uptake of training in priority specialties will only be effective in those with more flexible preferences. These results indicate that indiscriminate expansion of postgraduate training to slow emigration of doctors from sub-Saharan African countries may not be effective unless doctors' preferences are taken into account. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.
Risk Assessment Methodology Based on the NISTIR 7628 Guidelines
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R
2013-01-01
Earlier work describes computational models of critical infrastructure that allow an analyst to estimate the security of a system in terms of the impact of loss per stakeholder resulting from security breakdowns. Here, we consider how to identify, monitor and estimate risk impact and probability for different smart grid stakeholders. Our constructive method leverages currently available standards and defined failure scenarios. We utilize the National Institute of Standards and Technology (NIST) Interagency or Internal Reports (NISTIR) 7628 as a basis to apply Cyberspace Security Econometrics system (CSES) for comparing design principles and courses of action in making security-related decisions.
2011-12-01
34 Figure 7. NASA Knowledge Management Environment (From Holm, 2009, p. 5). ......36 x...sharing That are not able to show measurable benefits Loose management support without demonstrating effectiveness Because users do not perceive value...explore KM in one form or another. Both are large agencies with annual budgets in the billions and manage multi -billion dollar projects, whose
1988-05-27
Competitive Strategies Individual Essay 6. PERFORMING ORG. REPORT NUMBER 7. AUTHOR(@) S. CONTRACT OR GRANT NUMBER( e ) Robert M. Davis, LTC, AD S...DO FOe 1473 emIotN or, Nov es IS OBSOLETE -JA I Unclassifi fed SECURITY CLASSIFICATION OF THIS PA7. E (Whrn Does Entered) Unclassified SECURITY...focus within the Department of Defense to provide technical and tactical leverage over the Soviets. Competitive Strategies are a management tool which
Wireless Technology Infrastructures for Authentication of Patients: PKI that Rings
Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D.
2005-01-01
As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system. PMID:15684133
Wireless technology infrastructures for authentication of patients: PKI that rings.
Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D
2005-01-01
As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system.
Code of Federal Regulations, 2010 CFR
2010-04-01
... under the Securities Act of 1933 of certain investment grade debt or investment grade preferred... Statements § 239.39 Form F-9, for registration under the Securities Act of 1933 of certain investment grade debt or investment grade preferred securities of certain Canadian issuers. (a) Form F-9 may be used for...
Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999
DOE Office of Scientific and Technical Information (OSTI.GOV)
HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.
This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, andmore » views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.« less
Center for Corporate Climate Leadership Building Internal Support in Supply Chain Management
Organizations build support for addressing GHG emissions by developing key allies in business units, leveraging one business unit to drive change across the organization, and securing executive support while communicating resource needs.
Leveraging Social Links for Trust and Privacy in Networks
NASA Astrophysics Data System (ADS)
Cutillo, Leucio Antonio; Molva, Refik; Strufe, Thorsten
Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows that they are subject to a number of vulnerabilities, ranging from cloning legitimate users to sybil attacks through privacy violations. Starting from these OSN vulnerabilities as the first step of a broader research activity, we came up with a new approach that is very promising in re-visiting security and privacy problems in distributed systems and networks. We suggest a solution that both aims at avoiding any centralized control and leverages on the real life trust between users, that is part of the social network application itself. An anonymization technique based on multi-hop routing among trusted nodes guarantees privacy in data access and, generally speaking, in all the OSN operations.
Improving the Automated Detection and Analysis of Secure Coding Violations
2014-06-01
eliminating software vulnerabilities and other flaws. The CERT Division produces books and courses that foster a security mindset in developers, and...website also provides a virtual machine containing a complete build of the Rosecheckers project on Linux . The Rosecheckers project leverages the...Compass/ROSE6 project developed at Law- rence Livermore National Laboratory. This project provides a high-level API for accessing the abstract syntax tree
2008-09-01
telephone, conference calls, emails, alert notifications, and blackberry . The RDTSF holds conference calls with its stakeholders to provide routine... tunnels ) is monitored by CCTV cameras with live feeds to WMATA’s Operations Control Center (OCC) to detect unauthorized entry into areas not intended for...message by email, blackberry and phone to the Security Coordinators. Dissemination of classified information however, is generally handled through the
International Outreach and Coordination Strategy for the National Strategy for Maritime Security
2005-11-01
economic stability of the international community, all nations have a vital interest in ensuring that the maritime domain remains secure and open for the free and legitimate use of all. Public and private entities must work in concert to succeed. Accordingly, in order to enhance global maritime security, the Department of State will leverage its diplomatic resources and influence, while coordinating closely with other components of the US Government, to promote and enhance close cooperation among sovereign nations, international and regional organizations and the maritime
Baye, Kaleab; Retta, Negussie; Abuye, Cherinet
2014-09-01
In light of the continuing rise in food prices during and after the 2008 world food crisis, whether food and cash transfers are equally effective in improving food security and diet quality is debatable. To compare the effects of conditional food and cash transfers of the Ethiopian Productive Safety Net Program (PSNP) on household food security and dietary diversity. Data on household dietary diversity, child anthropometry, food security, and preference of transfer modalities (food, cash, or mixed) were generated from a cross-sectional survey of 195 PSNP beneficiary households (67 receiving food and 128 receiving cash) in Hawella Tulla District, Sidama, southern Ethiopia. Most beneficiaries (96%) reported food shortages, and 47% reported food shortages that exceeded 3 months. Households receiving cash had better household dietary diversity scores (p = .02) and higher consumption of oils and fats (p = .003) and vitamin A-rich foods (p = .002). Compared with households receiving food, households receiving cash were more affected by increases in food prices that forced them to reduce their number of daily meals (p < .001) and spend less on nonstaples (p < .001). While most households receiving food (82%) preferred to continue receiving food, households receiving cash (56%) preferred a mix of food and cash. Households receiving cash had better household dietary diversity than households receiving food, a result suggesting that cash transfers may be more effective. However, the continuing rise infood prices may offset these benefits unless cash transfers are index-linked to food price fluctuations.
13 CFR 107.1160 - Maximum amount of Leverage for a Section 301(d) Licensee.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Leverage, you must maintain Venture Capital Financings (at cost) that equal at least 30 percent of your... maintain at least the same dollar amount of Venture Capital Financings (at cost). (e) Definition of “Total... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Maximum amount of Leverage for a...
13 CFR 108.1610 - Effect of prepayment or early redemption of Leverage on a Trust Certificate.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Effect of prepayment or early redemption of Leverage on a Trust Certificate. 108.1610 Section 108.1610 Business Credit and Assistance SMALL... of prepayment or early redemption of Leverage on a Trust Certificate. (a) The rights, if any, of a...
7 CFR 4290.1610 - Effect of prepayment or early redemption of Leverage on a Trust Certificate.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 15 2011-01-01 2011-01-01 false Effect of prepayment or early redemption of Leverage on a Trust Certificate. 4290.1610 Section 4290.1610 Agriculture Regulations of the Department of...) Funding Leverage by Use of Guaranteed Trust Certificates (âtcsâ) § 4290.1610 Effect of prepayment or early...
Residential Preferences: What's Terrorism Got to Do with It?
ERIC Educational Resources Information Center
Kay, David; Geisler, Charles; Bills, Nelson
2010-01-01
Security has long been recognized as an element in residential preference and its relative importance has risen with fear of extremist attacks on U.S. cities. Using polling data from 2004, this research investigates whether the security breaches of 9/11 in New York City influenced residential preferences in New York State. Our results confirm that…
Requirements Definition for ORNL Trusted Corridors Project
DOE Office of Scientific and Technical Information (OSTI.GOV)
Walker, Randy M; Hill, David E; Smith, Cyrus M
2008-02-01
The ORNL Trusted Corridors Project has several other names: SensorNet Transportation Pilot; Identification and Monitoring of Radiation (in commerce) Shipments (IMR(ic)S); and Southeastern Transportation Corridor Pilot (SETCP). The project involves acquisition and analysis of transportation data at two mobile and three fixed inspection stations in five states (Kentucky, Mississippi, South Carolina, Tennessee, and Washington DC). Collaborators include the State Police organizations that are responsible for highway safety, law enforcement, and incident response. The three states with fixed weigh-station deployments (KY, SC, TN) are interested in coordination of this effort for highway safety, law enforcement, and sorting/targeting/interdiction of potentially non-compliant vehicles/persons/cargo.more » The Domestic Nuclear Detection Office (DNDO) in the U.S. Department of Homeland Security (DHS) is interested in these deployments, as a Pilot test (SETCP) to identify Improvised Nuclear Devices (INDs) in highway transport. However, the level of DNDO integration among these state deployments is presently uncertain. Moreover, DHS issues are considered secondary by the states, which perceive this work as an opportunity to leverage these (new) dual-use technologies for state needs. In addition, present experience shows that radiation detectors alone cannot detect DHS-identified IND threats. Continued SETCP success depends on the level of integration of current state/local police operations with the new DHS task of detecting IND threats, in addition to emergency preparedness and homeland security. This document describes the enabling components for continued SETCP development and success, including: sensors and their use at existing deployments (Section 1); personnel training (Section 2); concept of operations (Section 3); knowledge discovery from the copious data (Section 4); smart data collection, integration and database development, advanced algorithms for multiple sensors, and network communications (Section 5); and harmonization of local, state, and Federal procedures and protocols (Section 6).« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine
The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention onmore » elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the option of evaluating equipment from Seagate/Xyratex.) Outline: The remainder of this report is structured as follows: - Section 1: Describes the growing importance of secure storage architectures and highlights some challenges for HPC. - Section 2: Provides background information on HPC storage architectures, relevant supporting technologies for secure storage and details on OpenStack components related to storage. Note, that background material on HPC storage architectures in this chapter can be skipped if the reader is already familiar with Lustre and GPFS. - Section 3: A review of protection mechanisms in two HPC filesystems; details about available isolation, authentication/authorization and performance capabilities are discussed. - Section 4: Describe technologies that can be used to bridge gaps in HPC storage and filesystems to facilitate...« less
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Inclusion of subordinated debt securities and... Borrowings § 163.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as... 12 CFR part 116, subpart A seeking the OCC's approval of, or non-objection to, the inclusion of...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Inclusion of subordinated debt securities and... Borrowings § 163.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as... 12 CFR part 116, subpart A seeking the OCC's approval of, or non-objection to, the inclusion of...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Inclusion of subordinated debt securities and... Borrowings § 163.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as... 12 CFR part 116, subpart A seeking the OCC's approval of, or non-objection to, the inclusion of...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-05
... common stocks; preferred securities; warrants to purchase common stocks or preferred securities... rated below investment grade at the time of purchase, or unrated securities deemed by the Fund's Adviser... contracts. The Fund may invest in such loans by purchasing assignments of all or a portion of loans or loan...
NASA Astrophysics Data System (ADS)
Graham, Christopher J.
2012-05-01
Success in the future battle space is increasingly dependent on rapid access to the right information. Faced with a shrinking budget, the Government has a mandate to improve intelligence productivity, quality, and reliability. To achieve increased ISR effectiveness, leverage of tactical edge mobile devices via integration with strategic cloud-based infrastructure is the single, most likely candidate area for dramatic near-term impact. This paper discusses security, collaboration, and usability components of this evolving space. These three paramount tenets outlined below, embody how mission information is exchanged securely, efficiently, with social media cooperativeness. Tenet 1: Complete security, privacy, and data integrity, must be ensured within the net-centric battle space. This paper discusses data security on a mobile device, data at rest on a cloud-based system, authorization and access control, and securing data transport between entities. Tenet 2: Lack of collaborative information sharing and content reliability jeopardizes mission objectives and limits the end user capability. This paper discusses cooperative pairing of mobile devices and cloud systems, enabling social media style interaction via tagging, meta-data refinement, and sharing of pertinent data. Tenet 3: Fielded mobile solutions must address usability and complexity. Simplicity is a powerful paradigm on mobile platforms, where complex applications are not utilized, and simple, yet powerful, applications flourish. This paper discusses strategies for ensuring mobile applications are streamlined and usable at the tactical edge through focused features sets, leveraging the power of the back-end cloud, minimization of differing HMI concepts, and directed end-user feedback.teInput=
Northern Command: A Relevant and Necessary Partner to Increase Security in Mexico
2010-10-27
month.19 Drug cartels leverage low pay and offer “ plato o plomo” or “silver or lead” which forces policemen to choose between taking a bribe or a...Scott Stewart, Hezbollah, Radical but Rational , Stratfor Security Weekly, (12 August 2010), http://www.stratfor.com/weekly...34Hezbollah, Radical but Rational ." Stratfor.com. August 12, 2010. http://www.stratfor.com/weekly/20100811_hezbollah_radical_rational (accessed 28
Public-Private Collaboration in the Department of Defense
2012-07-01
In his 2010 National Security Strategy, President Obama described partnerships between the public and private sector as critical to United States security at home and abroad. These Public-Private Collaborations (PPCs) offer potential opportunities to increase the Department s mission effectiveness by leveraging the capabilities, knowledge, processes, and infrastructure brought to bear by private sector entities. Additionally, given today s constrained budget environment, PPCs also provide opportunities for efficiency and cost reductions.
Boosting a Low-Cost Smart Home Environment with Usage and Access Control Rules.
Barsocchi, Paolo; Calabrò, Antonello; Ferro, Erina; Gennaro, Claudio; Marchetti, Eda; Vairo, Claudio
2018-06-08
Smart Home has gained widespread attention due to its flexible integration into everyday life. Pervasive sensing technologies are used to recognize and track the activities that people perform during the day, and to allow communication and cooperation of physical objects. Usually, the available infrastructures and applications leveraging these smart environments have a critical impact on the overall cost of the Smart Home construction, require to be preferably installed during the home construction and are still not user-centric. In this paper, we propose a low cost, easy to install, user-friendly, dynamic and flexible infrastructure able to perform runtime resources management by decoupling the different levels of control rules. The basic idea relies on the usage of off-the-shelf sensors and technologies to guarantee the regular exchange of critical information, without the necessity from the user to develop accurate models for managing resources or regulating their access/usage. This allows us to simplify the continuous updating and improvement, to reduce the maintenance effort and to improve residents’ living and security. A first validation of the proposed infrastructure on a case study is also presented.
Code of Federal Regulations, 2011 CFR
2011-01-01
... notified in writing and provided with the specific reasons for the rejection. (c) Selection for processing... applicants qualifying for a veterans preference. After selection for processing, loans are funded on a first...-approved Mutual Self-Help project or loans that will leverage funding or financing from other sources. (5...
Code of Federal Regulations, 2010 CFR
2010-01-01
... notified in writing and provided with the specific reasons for the rejection. (c) Selection for processing... applicants qualifying for a veterans preference. After selection for processing, loans are funded on a first...-approved Mutual Self-Help project or loans that will leverage funding or financing from other sources. (5...
Leveraging traffic and surveillance video cameras for urban traffic.
DOT National Transportation Integrated Search
2014-12-01
The objective of this project was to investigate the use of existing video resources, such as traffic : cameras, police cameras, red light cameras, and security cameras for the long-term, real-time : collection of traffic statistics. An additional ob...
Sen. Akaka, Daniel K. [D-HI
2011-11-10
Senate - 06/13/2012 Committee on Veterans' Affairs. Hearings held. Hearings printed: S.Hrg. 112-567. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Leveraging Global Maritime Partnerships to Increase Global Security in the Maritime Domain
2008-04-04
global interdependency (ways to counter the threat), along with the agility and elusiveness of the maritime threat to utilize the vastness of the...is that all of these costs cut into their profit margins and are therefore passed along by way of increased prices for goods purchased by the...costs of security measures and initiatives without cutting into their profit margins . Because of this they are more apt to take on the added risk
2014-09-01
power. The wireless infrastructure is an expansion of the current DOD IE which can be leveraged to connect mobile capabilities and technologies. The...DOD must focus on three critical areas central to mobility : the wireless infrastructure , the devices themselves, and the applications the devices use... infrastructure to support mobile devices. – The intent behind this goal is to improve the existing wireless backbone to support secure voice, data, and video
China’s Space Program: A New Tool for PRC Soft Power in International Relations?
2009-03-01
programs important and what is China doing to leverage them? A growing number of nations recognize the advantages of space applications. From the...as others far outside of its Asian backyard to market these services to and what it hopes to gain from them. Second, is America’s comparative...Freese, “Strategic Communication with China: What Message About Space?,” China Security, World Security Institute, 2:2 (2006): 45. 4 for
Savel, Thomas G; Bronstein, Alvin; Duck, William; Rhodes, M Barry; Lee, Brian; Stinn, John; Worthen, Katherine
2010-01-01
Real-time surveillance systems are valuable for timely response to public health emergencies. It has been challenging to leverage existing surveillance systems in state and local communities, and, using a centralized architecture, add new data sources and analytical capacity. Because this centralized model has proven to be difficult to maintain and enhance, the US Centers for Disease Control and Prevention (CDC) has been examining the ability to use a federated model based on secure web services architecture, with data stewardship remaining with the data provider. As a case study for this approach, the American Association of Poison Control Centers and the CDC extended an existing data warehouse via a secure web service, and shared aggregate clinical effects and case counts data by geographic region and time period. To visualize these data, CDC developed a web browser-based interface, Quicksilver, which leveraged the Google Maps API and Flot, a javascript plotting library. Two iterations of the NPDS web service were completed in 12 weeks. The visualization client, Quicksilver, was developed in four months. This implementation of web services combined with a visualization client represents incremental positive progress in transitioning national data sources like BioSense and NPDS to a federated data exchange model. Quicksilver effectively demonstrates how the use of secure web services in conjunction with a lightweight, rapidly deployed visualization client can easily integrate isolated data sources for biosurveillance.
Virtualized Multi-Mission Operations Center (vMMOC) and its Cloud Services
NASA Technical Reports Server (NTRS)
Ido, Haisam Kassim
2017-01-01
His presentation will cover, the current and future, technical and organizational opportunities and challenges with virtualizing a multi-mission operations center. The full deployment of Goddard Space Flight Centers (GSFC) Virtualized Multi-Mission Operations Center (vMMOC) is nearly complete. The Space Science Mission Operations (SSMO) organizations spacecraft ACE, Fermi, LRO, MMS(4), OSIRIS-REx, SDO, SOHO, Swift, and Wind are in the process of being fully migrated to the vMMOC. The benefits of the vMMOC will be the normalization and the standardization of IT services, mission operations, maintenance, and development as well as ancillary services and policies such as collaboration tools, change management systems, and IT Security. The vMMOC will also provide operational efficiencies regarding hardware, IT domain expertise, training, maintenance and support.The presentation will also cover SSMO's secure Situational Awareness Dashboard in an integrated, fleet centric, cloud based web services fashion. Additionally the SSMO Telemetry as a Service (TaaS) will be covered, which allows authorized users and processes to access telemetry for the entire SSMO fleet, and for the entirety of each spacecrafts history. Both services leverage cloud services in a secure FISMA High and FedRamp environment, and also leverage distributed object stores in order to house and provide the telemetry. The services are also in the process of leveraging the cloud computing services elasticity and horizontal scalability. In the design phase is the Navigation as a Service (NaaS) which will provide a standardized, efficient, and normalized service for the fleet's space flight dynamics operations. Additional future services that may be considered are Ground Segment as a Service (GSaaS), Telemetry and Command as a Service (TCaaS), Flight Software Simulation as a Service, etc.
Model-Driven Configuration of SELinux Policies
NASA Astrophysics Data System (ADS)
Agreiter, Berthold; Breu, Ruth
The need for access control in computer systems is inherent. However, the complexity to configure such systems is constantly increasing which affects the overall security of a system negatively. We think that it is important to define security requirements on a non-technical level while taking the application domain into respect in order to have a clear and separated view on security configuration (i.e. unblurred by technical details). On the other hand, security functionality has to be tightly integrated with the system and its development process in order to provide comprehensive means of enforcement. In this paper, we propose a systematic approach based on model-driven security configuration to leverage existing operating system security mechanisms (SELinux) for realising access control. We use UML models and develop a UML profile to satisfy these needs. Our goal is to exploit a comprehensive protection mechanism while rendering its security policy manageable by a domain specialist.
13 CFR 107.1585 - Exchange of Debentures for Participating Securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Capital Investments (at cost) equal to the amount of the Debenture being refinanced; and (d) Classify all your existing Loans and Investments as Earmarked Assets. [63 FR 5869, Feb. 5, 1998] ... SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Participating...
Africa Command: U.S. Strategic Interests and the Role of the U.S. Military in Africa
2010-04-03
Charles Wald , “The Phase Zero Campaign,” Joint Force Quarterly, Issue 43, 4th Quarter 2006, available at http://www.ndu.edu/inss. 12 DOD, The Quadrennial...Deputy Under Secretary Henry From the Pentagon,” February 7, 2007. 19 See, for example, Lisa Schirch and Aaron Kishbaugh, “Leveraging ‘3D’ Security...Testimony of General Charles Wald , Member, Military Advisory Board, at a hearing on Climate Change and National Security Threats by the Senate Foreign
The Landscape of International Biosurveillance
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hartley, David M.; Nelson, Noele P.; Walters, Ronald A.
2010-02-01
Event-based biosurveillance is a scientific discipline in which diverse streams of data, available from the Internet, are characterized prospectively to provide information on infectious disease events. Biosurveillance complements traditional public health surveillance to provide both early warning of infectious disease events as well as situational awareness. The Global Health Security Action Group (GHSAG) of the Global Health Security Initiative is developing a biosurveillance capability that integrates and leverages component systems from member nations. This work discusses these biosurveillance systems and identifies needed future studies.
Leveraging up Summers on Campus; Avoiding Lost Opportunities
ERIC Educational Resources Information Center
Gross, Karen
2014-01-01
New England's long winter and seemingly interminable wait for spring has this author thinking about what colleges could do with their campuses during the summer. The options are almost infinite, although the cost-benefit analysis clearly varies. For some students, being on campus in the summer is preferable to going home, where the environments…
On Measuring and Reducing Selection Bias with a Quasi-Doubly Randomized Preference Trial
ERIC Educational Resources Information Center
Joyce, Ted; Remler, Dahlia K.; Jaeger, David A.; Altindag, Onur; O'Connell, Stephen D.; Crockett, Sean
2017-01-01
Randomized experiments provide unbiased estimates of treatment effects, but are costly and time consuming. We demonstrate how a randomized experiment can be leveraged to measure selection bias by conducting a subsequent observational study that is identical in every way except that subjects choose their treatment--a quasi-doubly randomized…
13 CFR 107.1500 - General description of Participating Securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... in Equity Capital Investments, as defined in § 107.50. (c) Special features of Participating... SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Participating... rules on: (1) Minimum capital (see § 107.210). (2) Liquidity (see § 107.1505). (3) Non-SBA borrowing...
45 CFR 96.87 - Leveraging incentive program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... energy, or the purchase of items that help these households meet the cost of home energy, at commonly... fees, application fees, late payment charges, bulk fuel tank rental or purchase costs, and security...; space cooling devices, equipment, and systems; and other tangible items that help low-income households...
45 CFR 96.87 - Leveraging incentive program.
Code of Federal Regulations, 2014 CFR
2014-10-01
... energy, or the purchase of items that help these households meet the cost of home energy, at commonly... fees, application fees, late payment charges, bulk fuel tank rental or purchase costs, and security...; space cooling devices, equipment, and systems; and other tangible items that help low-income households...
45 CFR 96.87 - Leveraging incentive program.
Code of Federal Regulations, 2012 CFR
2012-10-01
... energy, or the purchase of items that help these households meet the cost of home energy, at commonly... fees, application fees, late payment charges, bulk fuel tank rental or purchase costs, and security...; space cooling devices, equipment, and systems; and other tangible items that help low-income households...
Global Situational Awareness with Free Tools
2015-01-15
Client Technical Solutions • Software Engineering Measurement and Analysis • Architecture Practices • Product Line Practice • Team Software Process...multiple data sources • Snort (Snorby on Security Onion ) • Nagios • SharePoint RSS • Flow • Others • Leverage standard data formats • Keyhole Markup Language
Landman, Adam; Emani, Srinivas; Carlile, Narath; Rosenthal, David I; Semakov, Simon; Pallin, Daniel J; Poon, Eric G
2015-01-02
Photographs are important tools to record, track, and communicate clinical findings. Mobile devices with high-resolution cameras are now ubiquitous, giving clinicians the opportunity to capture and share images from the bedside. However, secure and efficient ways to manage and share digital images are lacking. The aim of this study is to describe the implementation of a secure application for capturing and storing clinical images in the electronic health record (EHR), and to describe initial user experiences. We developed CliniCam, a secure Apple iOS (iPhone, iPad) application that allows for user authentication, patient selection, image capture, image annotation, and storage of images as a Portable Document Format (PDF) file in the EHR. We leveraged our organization's enterprise service-oriented architecture to transmit the image file from CliniCam to our enterprise clinical data repository. There is no permanent storage of protected health information on the mobile device. CliniCam also required connection to our organization's secure WiFi network. Resident physicians from emergency medicine, internal medicine, and dermatology used CliniCam in clinical practice for one month. They were then asked to complete a survey on their experience. We analyzed the survey results using descriptive statistics. Twenty-eight physicians participated and 19/28 (68%) completed the survey. Of the respondents who used CliniCam, 89% found it useful or very useful for clinical practice and easy to use, and wanted to continue using the app. Respondents provided constructive feedback on location of the photos in the EHR, preferring to have photos embedded in (or linked to) clinical notes instead of storing them as separate PDFs within the EHR. Some users experienced difficulty with WiFi connectivity which was addressed by enhancing CliniCam to check for connectivity on launch. CliniCam was implemented successfully and found to be easy to use and useful for clinical practice. CliniCam is now available to all clinical users in our hospital, providing a secure and efficient way to capture clinical images and to insert them into the EHR. Future clinical image apps should more closely link clinical images and clinical documentation and consider enabling secure transmission over public WiFi or cellular networks.
Code of Federal Regulations, 2010 CFR
2010-04-01
... considered an affordable housing activity? 1000.122 Section 1000.122 Housing and Urban Development... Housing Activities § 1000.122 May NAHASDA grant funds be used as matching funds to obtain and leverage...
24 CFR 970.19 - Disposition of property; use of proceeds.
Code of Federal Regulations, 2010 CFR
2010-04-01
... fair market value before the property is advertised for bid, the PHA shall have one independent... advertised for bid, HUD may accept a reasonable valuation of the property. (e) A PHA shall use net proceeds... housing; or (ii) Leveraging amounts for securing commercial enterprises, on-site in public housing...
77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-27
..., knowledge management and how best to leverage related technologies funded by other Federal agencies and by the private sector. It also advises the Under Secretary on policies, management processes, and... management; notice of Federal Advisory Committee meeting. SUMMARY: On September 13, 2012, the Department of...
Savel, Thomas G; Bronstein, Alvin; Duck, William; Rhodes, M. Barry; Lee, Brian; Stinn, John; Worthen, Katherine
2010-01-01
Objectives Real-time surveillance systems are valuable for timely response to public health emergencies. It has been challenging to leverage existing surveillance systems in state and local communities, and, using a centralized architecture, add new data sources and analytical capacity. Because this centralized model has proven to be difficult to maintain and enhance, the US Centers for Disease Control and Prevention (CDC) has been examining the ability to use a federated model based on secure web services architecture, with data stewardship remaining with the data provider. Methods As a case study for this approach, the American Association of Poison Control Centers and the CDC extended an existing data warehouse via a secure web service, and shared aggregate clinical effects and case counts data by geographic region and time period. To visualize these data, CDC developed a web browser-based interface, Quicksilver, which leveraged the Google Maps API and Flot, a javascript plotting library. Results Two iterations of the NPDS web service were completed in 12 weeks. The visualization client, Quicksilver, was developed in four months. Discussion This implementation of web services combined with a visualization client represents incremental positive progress in transitioning national data sources like BioSense and NPDS to a federated data exchange model. Conclusion Quicksilver effectively demonstrates how the use of secure web services in conjunction with a lightweight, rapidly deployed visualization client can easily integrate isolated data sources for biosurveillance. PMID:23569581
ERIC Educational Resources Information Center
Chang, Yi-Hsing; Chen, Yen-Yi; Chen, Nian-Shing; Lu, You-Te; Fang, Rong-Jyue
2016-01-01
This study designs and implements an adaptive learning management system based on Felder and Silverman's Learning Style Model and the Mashup technology. In this system, Felder and Silverman's Learning Style model is used to assess students' learning styles, in order to provide adaptive learning to leverage learners' learning preferences.…
47 CFR 64.1190 - Preferred carrier freezes.
Code of Federal Regulations, 2010 CFR
2010-10-01
... or social security number) and the information required in §§ 64.1190(d)(3)(ii)(A) through (D... subscriber's date of birth or social security number) and the information required in § 64.1190(d)(3)(ii)(A... or the carrier's marketing agent; must not have any financial incentive to confirm preferred carrier...
Ury, M.; Sowers, F.; Harper, C.; Love, W.
1998-11-24
A microwave powered electrodeless lamp includes an improved screen unit having mesh and solid sections with an internal reflector secured at the juncture of the two sections to reflect light into a light-transmitting chamber defined in the lamp microwave cavity by the reflector and the mesh section. A discharge envelope of a bulb is disposed in the light-transmitting chamber. Light emitted from the envelope is prevented by the reflector from entering the cavity portion bounded by the solid section of the screen. The reflector is mounted in the cavity by tabs formed in the screen unit and bendable into the cavity to define support planes abutting respective surfaces of the reflector. The mesh section and tabs are preferably formed by etching a thin metal sheet. 7 figs.
Ury, Michael; Sowers, Frank; Harper, Curt; Love, Wayne
1998-01-01
A microwave powered electrodeless lamp includes an improved screen unit having mesh and solid sections with an internal reflector secured at the juncture of the two sections to reflect light into a light-transmitting chamber defined in the lamp microwave cavity by the reflector and the mesh section. A discharge envelope of a bulb is disposed in the light-transmitting chamber. Light emitted from the envelope is prevented by the reflector from entering the cavity portion bounded by the solid section of the screen. The reflector is mounted in the cavity by tabs formed in the screen unit and bendable into the cavity to define support planes abutting respective surfaces of the reflector. The mesh section and tabs are preferably formed by etching a thin metal sheet.
13 CFR 107.1120 - General eligibility requirements for Leverage.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Enterprises in § 107.710(b). (h) Show, to the satisfaction of SBA, that your management is qualified and has... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false General eligibility requirements for Leverage. 107.1120 Section 107.1120 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION...
17 CFR 31.8 - Cover of leverage contracts.
Code of Federal Regulations, 2011 CFR
2011-04-01
... this section. (2) Permissible cover for a long leverage contract is limited to: (i) Warehouse receipts... and accrued interest on any loan against such warehouse receipts does not exceed 70 percent of the current market value of the commodity represented by each receipt. (ii) Warehouse receipts for gold...
Data-Driven Software Framework for Web-Based ISS Telescience
NASA Technical Reports Server (NTRS)
Tso, Kam S.
2005-01-01
Software that enables authorized users to monitor and control scientific payloads aboard the International Space Station (ISS) from diverse terrestrial locations equipped with Internet connections is undergoing development. This software reflects a data-driven approach to distributed operations. A Web-based software framework leverages prior developments in Java and Extensible Markup Language (XML) to create portable code and portable data, to which one can gain access via Web-browser software on almost any common computer. Open-source software is used extensively to minimize cost; the framework also accommodates enterprise-class server software to satisfy needs for high performance and security. To accommodate the diversity of ISS experiments and users, the framework emphasizes openness and extensibility. Users can take advantage of available viewer software to create their own client programs according to their particular preferences, and can upload these programs for custom processing of data, generation of views, and planning of experiments. The same software system, possibly augmented with a subset of data and additional software tools, could be used for public outreach by enabling public users to replay telescience experiments, conduct their experiments with simulated payloads, and create their own client programs and other custom software.
de Fuentes, Jose Maria; Gonzalez-Manzano, Lorena; Ribagorda, Arturo
2018-04-16
Smartphones are equipped with a set of sensors that describe the environment (e.g., GPS, noise, etc.) and their current status and usage (e.g., battery consumption, accelerometer readings, etc.). Several works have already addressed how to leverage such data for user-in-a-context continuous authentication, i.e., determining if the porting user is the authorized one and resides in his regular physical environment. This can be useful for an early reaction against robbery or impersonation. However, most previous works depend on assisted sensors, i.e., they rely upon immutable elements (e.g., cell towers, satellites, magnetism), thus being ineffective in their absence. Moreover, they focus on accuracy aspects, neglecting usability ones. For this purpose, in this paper, we explore the use of four non-assisted sensors, namely battery, transmitted data, ambient light and noise. Our approach leverages data stream mining techniques and offers a tunable security-usability trade-off. We assess the accuracy, immediacy, usability and readiness of the proposal. Results on 50 users over 24 months show that battery readings alone achieve 97.05% of accuracy and 81.35% for audio, light and battery all together. Moreover, when usability is at stake, robbery is detected in 100 s for the case of battery and in 250 s when audio, light and battery are applied. Remarkably, these figures are obtained with moderate training and storage needs, thus making the approach suitable for current devices.
Gonzalez-Manzano, Lorena; Ribagorda, Arturo
2018-01-01
Smartphones are equipped with a set of sensors that describe the environment (e.g., GPS, noise, etc.) and their current status and usage (e.g., battery consumption, accelerometer readings, etc.). Several works have already addressed how to leverage such data for user-in-a-context continuous authentication, i.e., determining if the porting user is the authorized one and resides in his regular physical environment. This can be useful for an early reaction against robbery or impersonation. However, most previous works depend on assisted sensors, i.e., they rely upon immutable elements (e.g., cell towers, satellites, magnetism), thus being ineffective in their absence. Moreover, they focus on accuracy aspects, neglecting usability ones. For this purpose, in this paper, we explore the use of four non-assisted sensors, namely battery, transmitted data, ambient light and noise. Our approach leverages data stream mining techniques and offers a tunable security-usability trade-off. We assess the accuracy, immediacy, usability and readiness of the proposal. Results on 50 users over 24 months show that battery readings alone achieve 97.05% of accuracy and 81.35% for audio, light and battery all together. Moreover, when usability is at stake, robbery is detected in 100 s for the case of battery and in 250 s when audio, light and battery are applied. Remarkably, these figures are obtained with moderate training and storage needs, thus making the approach suitable for current devices. PMID:29659542
Mittan, Margaret Birmingham [Oakland, CA; Miros, Robert H. J. [Fairfax, CA; Brown, Malcolm P [San Francisco, CA; Stancel, Robert [Loss Altos Hills, CA
2012-06-05
A photovoltaic panel clamp includes an upper and lower section. The interface between the assembled clamp halves and the module edge is filled by a flexible gasket material, such as EPDM rubber. The gasket preferably has small, finger like protrusions that allow for easy insertion onto the module edge while being reversed makes it more difficult to remove them from the module once installed. The clamp includes mounting posts or an integral axle to engage a bracket. The clamp also may include a locking tongue to secure the clamp to a bracket.
Brown, Malcolm P.; Mittan, Margaret Birmingham; Miros, Robert H. J.; Stancel, Robert
2013-03-19
A photovoltaic panel clamp includes an upper and lower section. The interface between the assembled clamp halves and the module edge is filled by a flexible gasket material, such as EPDM rubber. The gasket preferably has small, finger like protrusions that allow for easy insertion onto the module edge while being reversed makes it more difficult to remove them from the module once installed. The clamp includes mounting posts or an integral axle to engage a bracket. The clamp also may include a locking tongue to secure the clamp to a bracket.
Cyber Security and Resilient Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson
2009-07-01
The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments tomore » date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.« less
Secure Borders and Open Doors: Preserving Our Welcome to the World in an Age of Terrorism
2008-01-01
maura harty, have made efforts to leverage america’s vast academic assets for public diplomacy. however, the president’s commitment to strike the...robert gluck, walt disney parks and resorts; John hamilton, electronic data Systems corporation; matthew howe, Border trade alliance; Kelly hunt, u.S
2010-03-01
are turning out to be counterproductive because they are culturally anathema (Wollman, 2009). A consideration of psychological tenets by Sigmund ... Freud suggests a principle aspect of dysfunction in collaboration. He reasoned that An Ego governed by social convention and a Superego governed by
Using Social Media to Support the Learning Needs of Future IS Security Professionals
ERIC Educational Resources Information Center
Neville, Karen; Heavin, Ciara
2013-01-01
The emergence of social media has forced educators to think differently about the way learning occurs. Students and practitioners alike are using new technologies to connect with peers/colleagues, share ideas, resources and experiences for extracurricular activities. The social business gaming platform considered in this study leverages the social…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-23
... third party at par at a specified date, and leveraged inverse floating rate instruments (``inverse..., master demand notes, fixed and variable rate loan participations and assignments, inverse floaters, and... securities of other regulated investment companies), (2) two or more issuers that the Fund controls and which...
12 CFR Appendix C to Subpart A to... - Concentration Measures
Code of Federal Regulations, 2012 CFR
2012-01-01
.../publications/handbook/LeveragedLending.pdf, but do not include all of the criteria in the handbook. • Loans or...; or 6 Earnings before interest, taxes, depreciation, and amortization. • Loans or securities that are... residential loan products that allow the borrower to defer repayment of principal or interest and includes all...
Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach
NASA Astrophysics Data System (ADS)
Naik, R. Lalu; Reddy, P. Chenna
2015-12-01
The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.
PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension.
Chen, Feng; Wang, Chenghong; Dai, Wenrui; Jiang, Xiaoqian; Mohammed, Noman; Al Aziz, Md Momin; Sadat, Md Nazmus; Sahinalp, Cenk; Lauter, Kristin; Wang, Shuang
2017-07-26
Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research. However, privacy and security concerns have emerged as a challenge for utilizing cloud computing to handle sensitive genomic data. We present one of the first implementations of Software Guard Extension (SGX) based securely outsourced genetic testing framework, which leverages multiple cryptographic protocols and minimal perfect hash scheme to enable efficient and secure data storage and computation outsourcing. We compared the performance of the proposed PRESAGE framework with the state-of-the-art homomorphic encryption scheme, as well as the plaintext implementation. The experimental results demonstrated significant performance over the homomorphic encryption methods and a small computational overhead in comparison to plaintext implementation. The proposed PRESAGE provides an alternative solution for secure and efficient genomic data outsourcing in an untrusted cloud by using a hybrid framework that combines secure hardware and multiple crypto protocols.
Applying your corporate compliance skills to the HIPAA security standard.
Carter, P I
2000-01-01
Compliance programs are an increasingly hot topic among healthcare providers. These programs establish policies and procedures covering billing, referrals, gifts, confidentiality of patient records, and many other areas. The purpose is to help providers prevent and detect violations of the law. These programs are voluntary, but are also simply good business practice. Any compliance program should now incorporate the Health Insurance Portability and Accountability Act (HIPAA) security standard. Several sets of guidelines for development of compliance programs have been issued by the federal government, and each is directed toward a different type of healthcare provider. These guidelines share certain key features with the HIPAA security standard. This article examines the common areas between compliance programs and the HIPAA security standard to help you to do two very important things: (1) Leverage your resources by combining compliance with the security standard with other legal and regulatory compliance efforts, and (2) apply the lessons learned in developing your corporate compliance program to developing strategies for compliance with the HIPAA security standard.
Geothermal expansion spool piston
DOE Office of Scientific and Technical Information (OSTI.GOV)
Reed, L. T.
1985-08-06
A packing supporting piston assembly removably securable to an end section of a production casing of a geothermal well, which end section is disposed above a well head. The piston assembly when so mounted has packing in abutting sealing contact with the end section of the production casing and also has packing that is in slidable sealing contact with the interior surface of the expansion spool. The piston assembly is of such structure that the pressures exerted by the packing on the end section of the casing and on the interior surface of the expansion spool are independently adjustable tomore » desired magnitudes. The degree of pressure exerted by the packing on the interior surface of the expansion spool is adjustable after the packing has been disposed within the confines of the spool. The piston assembly in a preferred form includes a circumferentially extending high temperature resisting grease seal situated within the confines of the piston assembly. In addition to the preferred form of the piston assembly, alternate forms of the piston assembly are provided, each of which permits the pressure exerted by the packing on the interior surface of the expansion spool to be adjusted to a desired magnitude and periodically varied as the same becomes necessary to maintain an effective seal.« less
Meyer, Adrian; Green, Laura; Faulk, Ciearro; Galla, Stephen; Meyer, Anne-Marie
2016-01-01
Introduction: Large amounts of health data generated by a wide range of health care applications across a variety of systems have the potential to offer valuable insight into populations and health care systems, but robust and secure computing and analytic systems are required to leverage this information. Framework: We discuss our experiences deploying a Secure Data Analysis Platform (SeDAP), and provide a framework to plan, build and deploy a virtual desktop infrastructure (VDI) to enable innovation, collaboration and operate within academic funding structures. It outlines 6 core components: Security, Ease of Access, Performance, Cost, Tools, and Training. Conclusion: A platform like SeDAP is not simply successful through technical excellence and performance. It’s adoption is dependent on a collaborative environment where researchers and users plan and evaluate the requirements of all aspects. PMID:27683665
2006-04-26
technologies might offer us those means. The Means – Securing the Battlespace by Leveraging Information Dominance A suicide bomber intent on achieving his...be a watershed for netcentric warfare – the transition of information dominance from force multiplier to new capability. 67 It would serve as a prime
2002-09-01
customs checkpoints. In 2000, customs officials had already deployed these body scanners at JFK Airport in New York, Miami International, Chicago’s... JFK Airport in New York City and Dulles Airport in Washington, D.C. are also considering JetStream trials (Guevin, 9 Apr 2002). Although six of the
List, John A; Samek, Anya Savikhin
2015-01-01
We leverage behavioral economics to explore new approaches to tackling child food choice and consumption. Using a field experiment with >1500 children, we report several key insights. We find that incentives have large influences: in the control, 17% of children prefer the healthy snack, whereas introduction of small incentives increases take-up of the healthy snack to ∼75%. There is some evidence that the effects continue post-treatment, consistent with a model of habit formation. We find little evidence that the framing of incentives (loss vs. gain) matters. Educational messaging alone has little effect, but we observe a combined effect of messaging and incentives: together they provide an important influence on food choice. Copyright © 2014 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Yan, Wanfeng; Woodard, Ryan; Sornette, Didier
2012-01-01
Leverage is strongly related to liquidity in a market and lack of liquidity is considered a cause and/or consequence of the recent financial crisis. A repurchase agreement is a financial instrument where a security is sold simultaneously with an agreement to buy it back at a later date. Repurchase agreement (repo) market size is a very important element in calculating the overall leverage in a financial market. Therefore, studying the behavior of repo market size can help to understand a process that can contribute to the birth of a financial crisis. We hypothesize that herding behavior among large investors led to massive over-leveraging through the use of repos, resulting in a bubble (built up over the previous years) and subsequent crash in this market in early 2008. We use the Johansen-Ledoit-Sornette (JLS) model of rational expectation bubbles and behavioral finance to study the dynamics of the repo market that led to the crash. The JLS model qualifies a bubble by the presence of characteristic patterns in the price dynamics, called log-periodic power law (LPPL) behavior. We show that there was significant LPPL behavior in the market before that crash and that the predicted range of times predicted by the model for the end of the bubble is consistent with the observations.
System and method for leveraging human physiological traits to control microprocessor frequency
Shye, Alex; Pan, Yan; Scholbrock, Benjamin; Miller, J. Scott; Memik, Gokhan; Dinda, Peter A; Dick, Robert P
2014-03-25
A system and method for leveraging physiological traits to control microprocessor frequency are disclosed. In some embodiments, the system and method may optimize, for example, a particular processor-based architecture based on, for example, end user satisfaction. In some embodiments, the system and method may determine, for example, whether their users are satisfied to provide higher efficiency, improved reliability, reduced power consumption, increased security, and a better user experience. The system and method may use, for example, biometric input devices to provide information about a user's physiological traits to a computer system. Biometric input devices may include, for example, one or more of the following: an eye tracker, a galvanic skin response sensor, and/or a force sensor.
Lemnos interoperable security project.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Halbgewachs, Ronald D.
2010-03-01
With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance inmore » a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.« less
Zhang, Xing; Ran, Guangming; Xu, Wenjian; Ma, Yuanxiao; Chen, Xu
2018-01-01
Humans are highly social animals, and the ability to cater to the preferences of other individuals is encouraged by society. Preference-inferring is an important aspect of the theory of mind (TOM). Many previous studies have shown that attachment style is closely related to TOM ability. However, little is known about the effects of adult attachment style on preferences inferring under different levels of certainty. Here, we investigated how adult attachment style affects neural activity underlying preferences inferred under different levels of certainty by using functional magnetic resonance imaging (fMRI). The fMRI results demonstrated that adult attachment influenced the activation of anterior insula (AI) and inferior parietal lobule (IPL) in response to ambiguous preference-inferring. More specifically, in the ambiguous preference condition, the avoidant attached groups exhibited a significantly enhanced activation than secure and anxious attached groups in left IPL; the anxious attached groups exhibited a significantly reduced activation secure attached group in left IPL. In addition, the anxious attached groups exhibited a significantly reduced activation than secure and avoidant attached groups in left AI. These results were also further confirmed by the subsequent PPI analysis. The results from current study suggest that, under ambiguous situations, the avoidant attached individuals show lower sensitivity to the preference of other individuals and need to invest more cognitive resources for preference-reasoning; while compared with avoidant attached group, the anxious attached individuals express high tolerance for uncertainty and a higher ToM proficiency. Results from the current study imply that differences in preference-inferring under ambiguous conditions associated with different levels of individual attachment may explain the differences in interpersonal interaction. PMID:29559932
Duncan, R G; Shabot, M M
2000-01-01
TCP/IP and World-Wide-Web (WWW) technology have become the universal standards for networking and delivery of information. Personal digital assistants (PDAs), cellular telephones, and alphanumeric pagers are rapidly converging on a single pocket device that will leverage wireless TCP/IP networks and WWW protocols and can be used to deliver clinical information and alerts anytime, anywhere. We describe a wireless interface to clinical information for physicians based on Palm Corp.'s Palm VII pocket computer, a wireless digital network, encrypted data transmission, secure web servers, and a clinical data repository (CDR).
Duncan, R. G.; Shabot, M. M.
2000-01-01
TCP/IP and World-Wide-Web (WWW) technology have become the universal standards for networking and delivery of information. Personal digital assistants (PDAs), cellular telephones, and alphanumeric pagers are rapidly converging on a single pocket device that will leverage wireless TCP/IP networks and WWW protocols and can be used to deliver clinical information and alerts anytime, anywhere. We describe a wireless interface to clinical information for physicians based on Palm Corp.'s Palm VII pocket computer, a wireless digital network, encrypted data transmission, secure web servers, and a clinical data repository (CDR). PMID:11079875
Recent work on network application layer: MioNet, the virtual workplace for small businesses
NASA Astrophysics Data System (ADS)
Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric; Miller, Brian; Chan, Keith
2005-11-01
Small businesses must be extremely efficient and smartly leverage their resources, suppliers, and partners to successfully compete with larger firms. A successful small business requires a set of companies with interlocking business relationships that are dynamic and needs-based. There has been no software solution that creates a secure and flexible way to efficiently connect small business computer-based employees and partners. In this invited paper, we discuss MioNet, a secure and powerful data management platform which may provide millions of small businesses with a virtual workplace and help them to succeed.
SNL Five-Year Facilities & Infrastructure Plan FY2015-2019
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cipriani, Ralph J.
2014-12-01
Sandia’s development vision is to provide an agile, flexible, safer, more secure, and efficient enterprise that leverages the scientific and technical capabilities of the workforce and supports national security requirements in multiple areas. Sandia’s Five-Year Facilities & Infrastructure Planning program represents a tool to budget and prioritize immediate and short-term actions from indirect funding sources in light of the bigger picture of proposed investments from direct-funded, Work for Others and other funding sources. As a complementary F&I investment program, Sandia’s indirect investment program supports incremental achievement of the development vision within a constrained resource environment.
Interface Evaluation for Open System Architectures
2014-03-01
maker (SDM) is responsible for balancing all of the influences of the IPT when making decisions. Coalescing the IPT perspectives for a single IIM...factors are considered in IIM decisions and that decisions are consistent with the preferences of the SDM, ultimately leading to a balance of schedule... board to perform ranking and weighting determinations. Rank sum, rank exponent, rank reciprocal and ROC leverage a subjective assessment of the
Sen, Gita; Iyer, Aditi
2012-06-01
This paper argues that a focus on the middle groups in a multi-dimensional socioeconomic ordering can provide valuable insights into how different axes of advantage and disadvantage intersect with each other. It develops the elements of a framework to analyse the middle groups through an intersectional analysis, and uses it to explore how such groups leverage economic class or gender advantages to secure entitlements to treatment for long-term illness. The study draws upon household survey data on health-seeking for long-term ailments from 60 villages of Koppal district, Karnataka (India). The survey was designed to capture gender, economic class, caste, age and life stage-based inequalities in access to health care during pregnancy and for short and long-term illnesses. There were striking similarities between two important middle groups--non-poor women and poor men--in some key outcomes: their rates of non-treatment when ill, treatment discontinuation and treatment continuation, and the amounts they spent for treatment. These two groups are the obverse of each other in terms of gender and economic class advantage and disadvantage. Non-poor women have an economic advantage and a gender disadvantage, while poor men have the exact opposite. However, despite the similarities in outcomes, the processes by which gender and class advantage were leveraged by each of the groups varied sharply. Similar patterns held for the poorest men except that the class disadvantage they had to overcome was greater, and the results are modified by this. Copyright © 2011 Elsevier Ltd. All rights reserved.
Gender difference in preference of specialty as a career choice among Japanese medical students.
Kawamoto, Ryuichi; Ninomiya, Daisuke; Kasai, Yoshihisa; Kusunoki, Tomo; Ohtsuka, Nobuyuki; Kumagi, Teru; Abe, Masanori
2016-11-10
In Japan, the absolute deficiency of doctors and maldistribution of doctors by specialty is a significant problem in the Japanese health care system. The purpose of this study was to investigate the factors contributing to specialty preference in career choice among Japanese medical students. A total of 368 medical students completed the survey giving an 88.2 % response rate. The subjects comprised 141 women aged 21 ± 3 (range, 18-34) years and 227 men aged 22 ± 4 (range, 18-44) years. Binary Logistic regression analysis was performed using specialty preferences as the criterion variable and the factors in brackets as six motivational variables (e.g., Factor 1: educational experience; Factor 2: job security; Factor 3: advice from others; Factor 4: work-life balance; Factor 5: technical and research specialty; and Factor 6: personal reasons). Women significantly preferred pediatrics, obstetrics & gynecology, and psychology than the men. Men significantly preferred surgery and orthopedics than the women. For both genders, a high odds ratio (OR) of "technical & research specialty" and a low OR for "personal reasons" were associated with preference for surgery. "Technical & research specialty" was positively associated with preference for special internal medicine and negatively for pediatrics. "Work-life balance" was positively associated with preference for psychology and negatively for emergency medicine. Among the women only, "technical & research specialty" was negatively associated with preference for general medicine/family medicine and obstetrics & gynecology, and "job security" was positively associated for general medicine/family medicine and negatively for psychology. Among men only, "educational experience" and "personal reasons" were positively, and "job security" was negatively associated with preference for pediatrics. For both genders, "work-life balance" was positively associated with preference for controllable lifestyle specialties. We must acknowledge that Japanese medical students have dichotomized some motivations for their specialty preference based on gender. Systematic improvements in the working environment are necessary to solve these issues.
ERIC Educational Resources Information Center
Nilsson, Fredrik
2004-01-01
In response to this growing trend, an increasing number of schools nationwide are implementing video surveillance systems in an effort to improve student and faculty safety. The United States currently has about 100,000 schools, and only 16% of these facilities have some form of video surveillance system in place. While this figure demonstrates…
Moving Target Techniques: Leveraging Uncertainty for Cyber Defense
2015-08-24
vulnerability (a flaw or bug that an attacker can exploit to penetrate or disrupt a system) to successfully compromise systems. Defenders, however...device drivers, numerous software applications, and hardware components. Within the cyberspace, this imbalance between a simple, one- bug attack...parsing code itself could have security-relevant software bugs . Dynamic Network Techniques in the dynamic network domain change the properties
Indonesian Maritime Security Cooperation In the Malacca Straits
2015-06-01
archipelagic doctrine was an “unrealistic” decision, one driven by “excessive political emotions.”51 He also argued that the Indonesian Navy was incapable...the archipelagic state doctrine was codified as Indonesian law on 18 February 48 Djalal...Therefore, the Wawasan Nusantara concept has leveraged the archipelagic state doctrine into a geopolitical concept. As a result, Indonesia asserted that
DOE Office of Scientific and Technical Information (OSTI.GOV)
Misra, Shashank
2017-11-01
The digital electronics at the atomic limit (DEAL) project seeks to leverage Sandia's atomic-precision fabrication capability to realize the theorized orders-of-magnitude improvement in operating voltage for tunnel field effect transistors (TFETs) compared to CMOS. Not only are low-power digital circuits a critical element of many national security systems (e.g. satellites), TFETs can perform circuit functions inaccessible to CMOS (e.g. polymorphism).
2009 Tactical Wheeled Vehicles Conference (TWV)
2009-02-03
Concept / Status / Joint Effort Between TARDEC & CERDEC • Leverage Military / Commercial vehicular technologies to equip tactical vehicles with a common... Vehicles Trailer (HEMAT) Heavy Equipment Transport (HETS) Container Handling Unit (CHU) Armored Security Vehicle Over 1200 systems fielded 978...Important Note: While EMIP is an excellent means to introduce new technologies to the Military , it can not change vehicle systems. Army PM’s are
The Freedom to Choose Secure Attachment Relationships in Adulthood
ERIC Educational Resources Information Center
Keren, Einat; Mayseless, Ofra
2013-01-01
This study was based on the attachment-security hypothesis (H. Latty-Mann & K. E. Davis, 1996) that predicts that all individuals, regardless of attachment style, should demonstrate a preference for secure partners who are most likely to offer attachment security. It was therefore expected that with the transfer of attachment functions from…
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.
Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675
Tartakovsky, Eugene; Abu Kheit, Ayat
2017-01-01
The present study investigates the connection between personal value preferences, group identifications, and cultural practices among Palestinian Israelis working in close contact with the Jewish population in Israel. One hundred twenty-two Palestinian Israelis participated in the study. The participants were employed in different professional positions in the Tel Aviv Metropolitan area and were recruited to the study using the snowball technique. A stronger national identification was associated with a higher preference for the security and conformity values, and a lower preference for the humility values. A stronger ethnic identification was associated with a lower preference for the security, power, and stimulation values. Group identifications mediated the connection between personal value preferences and cultural practices. A longer time working in close contact with the majority group and less frequent visits home were associated with a greater adherence to the majority group's cultural practices but not with adherence to the ethnic group's practices and not with the group identifications.
NASA Astrophysics Data System (ADS)
Lachapelle, Erick
Why do countries tax the same fuels at widely different rates, even among similarly situated countries in the global political economy? Given the potentially destabilizing effects of climate change, and the political and economic risks associated with a reliance on geographically concentrated, finite fossil fuels, International Organizations and economists of all political stripes have consistently called for increasing tax rates on fossil-based energy. Despite much enthusiasm among policy experts, however, politicians concerned with distributional consequences, economic performance and competitiveness impacts continue to be wary of raising taxes on carbon-based fuels. In this context, this thesis investigates the political economy of tax rates affecting the price of fossil fuels in advanced capitalist democracies. Through an examination of the political limits of government capacity to implement stricter carbon-energy policy, as well as the identification of the correlates of higher carbon-based energy taxes, it throws new light on the conditions under which carbon-energy tax reform becomes politically possible. Based on recent data collected from the OECD, EEA and IEA, I develop an estimate of the relative size of implicit carbon taxes across OECD member countries on six carbon-based fuels and across the household and industrial sectors. I exploit large cross-national differences in these carbon-energy tax rates in order to identify the correlates of, and constraints on, carbon-energy tax reform. Applying multiple regression analysis to both cross-section and time-series cross-sectional (TSCS) data, this thesis leverages considerable empirical evidence to demonstrate how and why electoral systems matter for energy and environmental tax policy outcomes. In particular, I find considerable empirical evidence to support the claim that systems of proportional representation (PR), in addition to the partisan preferences of the electorate, work together to explain differential rates of carbon-energy taxation. By opening up the ideological space to a broader spectrum of "green" parties, I argue that PR systems create a favourable institutional context within which higher rates of carbon-energy taxation become politically possible. After specifying a key causal mechanism within different types of electoral systems -- the seat-vote elasticity -- I argue further that, voters in disproportional systems actually have more leverage over politicians, and that an increase in environmental voting can have an impact on rates of carbon energy taxation, even in the absence of PR. While the accession to power of green political parties in PR systems is more likely to lead to higher rates of carbon energy taxation, voting for green parties in highly disproportional systems creates incentives for other parties to adopt "green" policies, leading to a similar outcome. In this way, the effect of green votes and green seats will have the opposite effect on policy according to the type of electoral system in use.
Leveraging Gaming Technology to Deliver Effective Training
NASA Technical Reports Server (NTRS)
Cimino, James D.
2011-01-01
The best way to engage a soldier is to present them with training content consistent with their learning preference. Blended Interactive Multimedia Instruction (IMI) can be used to leach soldiers what they need to do, how to do each step, and utilize a COTS game engine to actually practices the skills learned. Blended IMI provides an enjoyable experience for the soldier, thereby increasing retention rates and motivation while decreasing the time to subject mastery. And now mobile devices have emerged as an exciting new platform, literally placing the training into the soldier's hands. In this paper, we will discuss how we leveraged commercial game engine technology, tightly integrated with the Blended IMI, to train soldiers on both laptops and mobile devices. We will provide a recent case study of how this training is being utilized, benefits and student/instructor feedback.
NASA Astrophysics Data System (ADS)
Landsfeld, M. F.; Daudert, B.; Friedrichs, M.; Morton, C.; Hegewisch, K.; Husak, G. J.; Funk, C. C.; Peterson, P.; Huntington, J. L.; Abatzoglou, J. T.; Verdin, J. P.; Williams, E. L.
2015-12-01
The Famine Early Warning Systems Network (FEWS NET) focuses on food insecurity in developing nations and provides objective, evidence based analysis to help government decision-makers and relief agencies plan for and respond to humanitarian emergencies. The Google Earth Engine (GEE) is a platform provided by Google Inc. to support scientific research and analysis of environmental data in their cloud environment. The intent is to allow scientists and independent researchers to mine massive collections of environmental data and leverage Google's vast computational resources to detect changes and monitor the Earth's surface and climate. GEE hosts an enormous amount of satellite imagery and climate archives, one of which is the Climate Hazards Group Infrared Precipitation with Stations dataset (CHIRPS). The CHIRPS dataset is land based, quasi-global (latitude 50N-50S), 0.05 degree resolution, and has a relatively long term period of record (1981-present). CHIRPS is on a continuous monthly feed into the GEE as new data fields are generated each month. This precipitation dataset is a key input for FEWS NET monitoring and forecasting efforts. FEWS NET intends to leverage the GEE in order to provide analysts and scientists with flexible, interactive tools to aid in their monitoring and research efforts. These scientists often work in bandwidth limited regions, so lightweight Internet tools and services that bypass the need for downloading massive datasets to analyze them, are preferred for their work. The GEE provides just this type of service. We present a tool designed specifically for FEWS NET scientists to be utilized interactively for investigating and monitoring for agro-climatological issues. We are able to utilize the enormous GEE computing power to generate on-the-fly statistics to calculate precipitation anomalies, z-scores, percentiles and band ratios, and allow the user to interactively select custom areas for statistical time series comparisons and predictions.
Maroukis, Brianna L; Shauver, Melissa J; Nishizuka, Takanobu; Hirata, Hitoshi; Chung, Kevin C
2016-04-01
Treatment decisions after an injury like finger amputation are made based on injury and patient factors. However, decisions can also be influenced by provider and patient preferences. We compared hand surgeon and societal preferences and attitudes regarding finger amputation treatment in Japan and the US. We performed a cross-sectional survey with subjects derived from large tertiary care academic institutions in the US and Japan. We secured 100% participation of American hand surgeon members of the Finger Replantation and Amputation Multicenter Study and presenting hand surgeons at the 32nd Annual meeting of the Central Japanese Society for Surgery of the Hand. Societal preferences were gathered from volunteers at the 2 universities in the US and Japan. There were no significant differences in estimations of function, sensation, or appearance after replantation; American and Japanese societal participants preferred replantation compared to surgeons, although this was more pronounced in Japan. The Japanese society displayed more negative attitudes toward finger amputees than did Japanese surgeons. American respondents anticipated more public stigmatisation of amputees than did American surgeons. Societal preference for replantation was not caused by inflated expectations of outcomes after replantation. Japanese societal preference was likely driven by negative views of finger amputees. American society noted no decrease in physical health after amputation, but did note a quality of life decrease attributed to public stigmatisation. Japanese society and surgeons had a stronger preference for replantation than American society and surgeons, possibly attributed to cultural differences. Copyright © 2016 Elsevier Ltd. All rights reserved.
Understanding How the "Open" of Open Source Software (OSS) Will Improve Global Health Security.
Hahn, Erin; Blazes, David; Lewis, Sheri
2016-01-01
Improving global health security will require bold action in all corners of the world, particularly in developing settings, where poverty often contributes to an increase in emerging infectious diseases. In order to mitigate the impact of emerging pandemic threats, enhanced disease surveillance is needed to improve early detection and rapid response to outbreaks. However, the technology to facilitate this surveillance is often unattainable because of high costs, software and hardware maintenance needs, limited technical competence among public health officials, and internet connectivity challenges experienced in the field. One potential solution is to leverage open source software, a concept that is unfortunately often misunderstood. This article describes the principles and characteristics of open source software and how it may be applied to solve global health security challenges.
Policy Effects in Hyperbolic vs. Exponential Models of Consumption and Retirement
Gustman, Alan L.; Steinmeier, Thomas L.
2012-01-01
This paper constructs a structural retirement model with hyperbolic preferences and uses it to estimate the effect of several potential Social Security policy changes. Estimated effects of policies are compared using two models, one with hyperbolic preferences and one with standard exponential preferences. Sophisticated hyperbolic discounters may accumulate substantial amounts of wealth for retirement. We find it is frequently difficult to distinguish empirically between models with the two types of preferences on the basis of asset accumulation paths or consumption paths around the period of retirement. Simulations suggest that, despite the much higher initial time preference rate, individuals with hyperbolic preferences may actually value a real annuity more than individuals with exponential preferences who have accumulated roughly equal amounts of assets. This appears to be especially true for individuals with relatively high time preference rates or who have low assets for whatever reason. This affects the tradeoff between current benefits and future benefits on which many of the retirement incentives of the Social Security system rest. Simulations involving increasing the early entitlement age and increasing the delayed retirement credit do not show a great deal of difference whether exponential or hyperbolic preferences are used, but simulations for eliminating the earnings test show a non-trivially greater effect when exponential preferences are used. PMID:22711946
Policy Effects in Hyperbolic vs. Exponential Models of Consumption and Retirement.
Gustman, Alan L; Steinmeier, Thomas L
2012-06-01
This paper constructs a structural retirement model with hyperbolic preferences and uses it to estimate the effect of several potential Social Security policy changes. Estimated effects of policies are compared using two models, one with hyperbolic preferences and one with standard exponential preferences. Sophisticated hyperbolic discounters may accumulate substantial amounts of wealth for retirement. We find it is frequently difficult to distinguish empirically between models with the two types of preferences on the basis of asset accumulation paths or consumption paths around the period of retirement. Simulations suggest that, despite the much higher initial time preference rate, individuals with hyperbolic preferences may actually value a real annuity more than individuals with exponential preferences who have accumulated roughly equal amounts of assets. This appears to be especially true for individuals with relatively high time preference rates or who have low assets for whatever reason. This affects the tradeoff between current benefits and future benefits on which many of the retirement incentives of the Social Security system rest.Simulations involving increasing the early entitlement age and increasing the delayed retirement credit do not show a great deal of difference whether exponential or hyperbolic preferences are used, but simulations for eliminating the earnings test show a non-trivially greater effect when exponential preferences are used.
Preferred Supportive Services for Middle to Higher Income Retirement Housing.
ERIC Educational Resources Information Center
Regnier, Victor; Gelwicks, Louis E.
1981-01-01
Reports the service and facility feature preferences for retirement housing of middle and upper income elderly. Mandatory services and activities which require physical exertion were rejected, while security, convenient retail services, public transportation, and emergency health services are preferred. Underscores the importance of supportive…
Chen, Liwei; Pye, Jessica; Baird, Aaron
2013-01-01
Background Consumer use of mobile devices as health service delivery aids (mHealth) is growing, especially as smartphones become ubiquitous. However, questions remain as to how consumer traits, health perceptions, situational characteristics, and demographics may affect consumer mHealth usage intentions, assimilation, and channel preferences. Objective We examine how consumers’ personal innovativeness toward mobile services (PIMS), perceived health conditions, health care availability, health care utilization, demographics, and socioeconomic status affect their (1) mHealth usage intentions and extent of mHealth assimilation, and (2) preference for mHealth as a complement or substitute for in-person doctor visits. Methods Leveraging constructs from research in technology acceptance, technology assimilation, consumer behavior, and health informatics, we developed a cross-sectional online survey to study determinants of consumers’ mHealth usage intentions, assimilation, and channel preferences. Data were collected from 1132 nationally representative US consumers and analyzed by using moderated multivariate regressions and ANOVA. Results The results indicate that (1) 430 of 1132 consumers in our sample (37.99%) have started using mHealth, (2) a larger quantity of consumers are favorable to using mHealth as a complement to in-person doctor visits (758/1132, 66.96%) than as a substitute (532/1132, 47.00%), and (3) consumers’ PIMS and perceived health conditions have significant positive direct influences on mHealth usage intentions, assimilation, and channel preferences, and significant positive interactive influences on assimilation and channel preferences. The independent variables within the moderated regressions collectively explained 59.70% variance in mHealth usage intentions, 60.41% in mHealth assimilation, 34.29% in preference for complementary use of mHealth, and 45.30% in preference for substitutive use of mHealth. In a follow-up ANOVA examination, we found that those who were more favorable toward using mHealth as a substitute for in-person doctor visits than as a complement indicated stronger intentions to use mHealth (F 1,702=20.14, P<.001) and stronger assimilation of mHealth (F 1,702=41.866, P<.001). Conclusions Multiple predictors are shown to have significant associations with mHealth usage intentions, assimilation, and channel preferences. We suggest that future initiatives to promote mHealth should shift targeting of consumers from coarse demographics to nuanced considerations of individual dispositions toward mobile service innovations, complementary or substitutive channel use preferences, perceived health conditions, health services availability and utilization, demographics, and socioeconomic characteristics. PMID:23912839
Rai, Arun; Chen, Liwei; Pye, Jessica; Baird, Aaron
2013-08-02
Consumer use of mobile devices as health service delivery aids (mHealth) is growing, especially as smartphones become ubiquitous. However, questions remain as to how consumer traits, health perceptions, situational characteristics, and demographics may affect consumer mHealth usage intentions, assimilation, and channel preferences. We examine how consumers' personal innovativeness toward mobile services (PIMS), perceived health conditions, health care availability, health care utilization, demographics, and socioeconomic status affect their (1) mHealth usage intentions and extent of mHealth assimilation, and (2) preference for mHealth as a complement or substitute for in-person doctor visits. Leveraging constructs from research in technology acceptance, technology assimilation, consumer behavior, and health informatics, we developed a cross-sectional online survey to study determinants of consumers' mHealth usage intentions, assimilation, and channel preferences. Data were collected from 1132 nationally representative US consumers and analyzed by using moderated multivariate regressions and ANOVA. The results indicate that (1) 430 of 1132 consumers in our sample (37.99%) have started using mHealth, (2) a larger quantity of consumers are favorable to using mHealth as a complement to in-person doctor visits (758/1132, 66.96%) than as a substitute (532/1132, 47.00%), and (3) consumers' PIMS and perceived health conditions have significant positive direct influences on mHealth usage intentions, assimilation, and channel preferences, and significant positive interactive influences on assimilation and channel preferences. The independent variables within the moderated regressions collectively explained 59.70% variance in mHealth usage intentions, 60.41% in mHealth assimilation, 34.29% in preference for complementary use of mHealth, and 45.30% in preference for substitutive use of mHealth. In a follow-up ANOVA examination, we found that those who were more favorable toward using mHealth as a substitute for in-person doctor visits than as a complement indicated stronger intentions to use mHealth (F₁,₇₀₂=20.14, P<.001) and stronger assimilation of mHealth (F₁,₇₀₂=41.866, P<.001). Multiple predictors are shown to have significant associations with mHealth usage intentions, assimilation, and channel preferences. We suggest that future initiatives to promote mHealth should shift targeting of consumers from coarse demographics to nuanced considerations of individual dispositions toward mobile service innovations, complementary or substitutive channel use preferences, perceived health conditions, health services availability and utilization, demographics, and socioeconomic characteristics.
Lawlis, Tanya; Islam, Wasima; Upton, Penney
2018-04-01
Food security is defined by four dimensions: food availability, access, utilisation and stability. Resettled refugees face unique struggles securing these dimensions and, thus, food security when moving to a new country. This systematic review aimed to identify the challenges Australian refugees experience in achieving the four dimensions of food security. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines were followed; the SPIDER tool was used to determine eligibility criteria. Three databases were searched using terms relating to food in/security and refugees from 2000 to 20 May 2017. Seven articles were retained for analysis. Studies were categorised against the four dimensions, with four studies identifying challenges against all dimensions. Challenges contributing to high levels of food insecurity in each dimension included: availability and cost of traditional foods, difficulty in accessing preferred food outlets, limited food knowledge and preparation skills and food stability due to low income and social support. Food insecurity adversely impacts refugee health and integration. Methodical research framed by the four dimensions of food security is imperative to address challenges to securing food security in refugee groups and assisting in the development of sustainable interventions. © 2017 Dietitians Association of Australia.
Scudder, Joseph N; Lamude, Kevin G
2009-04-01
Following past findings on employment interviews, this study hypothesized applicants would have a preference for using self-promoting tactics of impression management over other focuses. Self-reports of impression management tactics were collected from 124 applicants who had interviews for screener positions with the Transportation Security Administration. Contrary to the hypothesis, analysis indicated participants reported they used more ingratiation tactics attempting to praise the interviewer than self-promotion tactics which focused on their own accomplishments. Special qualifications for security jobs which required well-developed perceptual abilities and the controlling structure of the interview context were perhaps responsible for present results differing from prior findings.
Motion/imagery secure cloud enterprise architecture analysis
NASA Astrophysics Data System (ADS)
DeLay, John L.
2012-06-01
Cloud computing with storage virtualization and new service-oriented architectures brings a new perspective to the aspect of a distributed motion imagery and persistent surveillance enterprise. Our existing research is focused mainly on content management, distributed analytics, WAN distributed cloud networking performance issues of cloud based technologies. The potential of leveraging cloud based technologies for hosting motion imagery, imagery and analytics workflows for DOD and security applications is relatively unexplored. This paper will examine technologies for managing, storing, processing and disseminating motion imagery and imagery within a distributed network environment. Finally, we propose areas for future research in the area of distributed cloud content management enterprises.
NASA Astrophysics Data System (ADS)
Landsfeld, M. F.; Hegewisch, K.; Daudert, B.; Morton, C.; Husak, G. J.; Friedrichs, M.; Funk, C. C.; Huntington, J. L.; Abatzoglou, J. T.; Verdin, J. P.
2016-12-01
The Famine Early Warning Systems Network (FEWS NET) focuses on food insecurity in developing nations and provides objective, evidence-based analysis to help government decision-makers and relief agencies plan for and respond to humanitarian emergencies. The network of FEWS NET analysts and scientists require flexible, interactive tools to aid in their monitoring and research efforts. Because they often work in bandwidth-limited regions, lightweight Internet tools and services that bypass the need for downloading massive datasets are preferred for their work. To support food security analysis FEWS NET developed a custom interface for the Google Earth Engine (GEE). GEE is a platform developed by Google to support scientific analysis of environmental data in their cloud computing environment. This platform allows scientists and independent researchers to mine massive collections of environmental data, leveraging Google's vast computational resources for purposes of detecting changes and monitoring the Earth's surface and climate. GEE hosts an enormous amount of satellite imagery and climate archives, one of which is the Climate Hazards Group Infrared Precipitation with Stations dataset (CHIRPS). CHIRPS precipitation dataset is a key input for FEWS NET monitoring and forecasting efforts. In this talk we introduce the FEWS Engine interface. We present an application that highlights the utility of FEWS Engine for forecasting the upcoming seasonal precipitation of southern Africa. Specifically, the current state of ENSO is assessed and used to identify similar historical seasons. The FEWS Engine compositing tool is used to examine rainfall and other environmental data for these analog seasons. The application illustrates the unique benefits of using FEWS Engine for on-the-fly food security scenario development.
Bowman, Calvin; Barnett, Daniel J.; Resnick, Beth A.; Frattaroli, Shannon; Rutkow, Lainie
2014-01-01
Regional collaboration has been identified as a potential facilitator of public health preparedness efforts. The Urban Area Security Initiative (UASI) grant program, administered by the Federal Emergency Management Agency (FEMA) since 2003, has provided 64 high-risk metropolitan areas funding to enhance their regional preparedness capabilities. This study describes informal and formal regional collaboration infrastructure, as well as regional collaboration–related activities and assessment methods, in FFY2010 UASI regions. A cross-sectional online survey was administered via Survey Monkey from September through December 2013. Points of contact from FFY2010 funded UASI metropolitan areas completed the survey, with a response rate of 77.8% (n=49). Summary statistics were calculated to describe the current informal and formal regional collaboration infrastructure. Additionally, the cross-sectional survey collected rates of agreement with 8 collaborative preparedness statements at 3 time points. The survey found that UASI regions are engaging in collaborative activities and investments to build capabilities, with most collaboration occurring in the prevention, protection, and response mission areas. Collaborative relationships in preparedness among emergency managers and municipal chief executive officers improved during the FFY2010 UASI performance period compared to the pre-UASI award period, with lasting effects. The majority of UASI regions reported conducting independent assessments of capabilities and their measurement at the UASI region level. Urban areas that received a FFY2010 UASI grant award are engaging in collaborative activities and have established interjurisdictional relationships in preparedness. The use of grant funds to encourage collaboration in preparedness has the potential to leverage limited resources and promote informed investments. PMID:25398073
Errett, Nicole A; Bowman, Calvin; Barnett, Daniel J; Resnick, Beth A; Frattaroli, Shannon; Rutkow, Lainie
2014-01-01
Regional collaboration has been identified as a potential facilitator of public health preparedness efforts. The Urban Area Security Initiative (UASI) grant program, administered by the Federal Emergency Management Agency (FEMA) since 2003, has provided 64 high-risk metropolitan areas funding to enhance their regional preparedness capabilities. This study describes informal and formal regional collaboration infrastructure, as well as regional collaboration-related activities and assessment methods, in FFY2010 UASI regions. A cross-sectional online survey was administered via Survey Monkey from September through December 2013. Points of contact from FFY2010 funded UASI metropolitan areas completed the survey, with a response rate of 77.8% (n=49). Summary statistics were calculated to describe the current informal and formal regional collaboration infrastructure. Additionally, the cross-sectional survey collected rates of agreement with 8 collaborative preparedness statements at 3 time points. The survey found that UASI regions are engaging in collaborative activities and investments to build capabilities, with most collaboration occurring in the prevention, protection, and response mission areas. Collaborative relationships in preparedness among emergency managers and municipal chief executive officers improved during the FFY2010 UASI performance period compared to the pre-UASI award period, with lasting effects. The majority of UASI regions reported conducting independent assessments of capabilities and their measurement at the UASI region level. Urban areas that received a FFY2010 UASI grant award are engaging in collaborative activities and have established interjurisdictional relationships in preparedness. The use of grant funds to encourage collaboration in preparedness has the potential to leverage limited resources and promote informed investments.
What lies behind crop decisions?Coming to terms with revealing farmers' preferences
NASA Astrophysics Data System (ADS)
Gomez, C.; Gutierrez, C.; Pulido-Velazquez, M.; López Nicolás, A.
2016-12-01
The paper offers a fully-fledged applied revealed preference methodology to screen and represent farmers' choices as the solution of an optimal program involving trade-offs among the alternative welfare outcomes of crop decisions such as profits, income security and management easiness. The recursive two-stage method is proposed as an alternative to cope with the methodological problems inherent to common practice positive mathematical program methodologies (PMP). Differently from PMP, in the model proposed in this paper, the non-linear costs that are required for both calibration and smooth adjustment are not at odds with the assumptions of linear Leontief technologies and fixed crop prices and input costs. The method frees the model from ad-hoc assumptions about costs and then recovers the potential of economic analysis as a means to understand the rationale behind observed and forecasted farmers' decisions and then to enhance the potential of the model to support policy making in relevant domains such as agricultural policy, water management, risk management and climate change adaptation. After the introduction, where the methodological drawbacks and challenges are set up, section two presents the theoretical model, section three develops its empirical application and presents its implementation to a Spanish irrigation district and finally section four concludes and makes suggestions for further research.
Leveraging Non-Cognitive Testing to Predict Success at USMC Scout Sniper Course
2017-03-01
sniper, noncognitive, Grit Scale, Big Five, predictions, surveys , military training 15. NUMBER OF PAGES 81 16. PRICE CODE 17. SECURITY...11 LITERATURE REVIEW II. This chapter surveys research previously conducted regarding predictors of success for various military occupational...Course. Furthermore, this research seeks to gain insight into the correlation between “grit” and the different infantry MOSs and the correlation
Data to DecisionsTerminate, Tolerate, Transfer, or Treat
2016-07-25
and patching, a risk-based cyber - security decision model that enables a pre- dictive capability to respond to impending cyber -attacks is needed...States. This sensitive data includes business proprietary information on key programs of record and infrastructure, including government documents at...leverage nationally. The Institute for Defense Analyses (IDA) assisted the DoD CIO in formalizing a proof of concept for cyber initiatives and
Moving Target Techniques: Leveraging Uncertainty for CyberDefense
2015-12-15
cyberattacks is a continual struggle for system managers. Attackers often need only find one vulnerability (a flaw or bug that an attacker can exploit...additional parsing code itself could have security-relevant software bugs . Dynamic Network Techniques in the dynamic network domain change the...evaluation of MT techniques can benefit from a variety of evaluation approaches, including abstract analysis, modeling and simulation, test bed
Clean Cities: Building Partnerships to Cut Petroleum Use in Transportation
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2016-01-07
This brochure provides an overview of the U.S. Department of Energy's (DOE's) Clean Cities program, which advances the nation's economic, environmental, and energy security by supporting local actions to cut petroleum use in transportation. At the national level, the program develops and promotes publications, tools, and other unique resources. At the local level, nearly 100 coalitions leverage these resources to create networks of stakeholders.
Clean Cities: Building Partnerships to Cut Petroleum Use in Transportation
DOE Office of Scientific and Technical Information (OSTI.GOV)
2016-01-01
This brochure provides an overview of the U.S. Department of Energy's (DOE's) Clean Cities program, which advances the nation's economic, environmental, and energy security by supporting local actions to cut petroleum use in transportation. At the national level, the program develops and promotes publications, tools, and other unique resources. At the local level, nearly 100 coalitions leverage these resources to create networks of stakeholders.
Movement and Maneuver in Deep Space: A Framework to Leverage Advanced Propulsion
2017-04-01
array of benefits for the current National Security Enterprise, and for this reason alone demands attention in the form of disciplined investment...discusses a theoretical organization formed and chartered to develop, test, and acquire deep space propulsion technology and includes what the...different forms , particularly via multi-mode propulsion where both chemical thrusters and electric propulsion devices operate on a common
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-23
...-capitalized'' under these guidelines, DTC must, among other things, maintain a Total Risk-Based Capital Ratio of at least 10%, a Leverage Ratio of at least 5%, and a Tier 1 Risk-Based Capital Ratio of at least 6... securities and funds which are in the custody or control of the clearing agency or for which it is...
Globus | Informatics Technology for Cancer Research (ITCR)
Globus software services provide secure cancer research data transfer, synchronization, and sharing in distributed environments at large scale. These services can be integrated into applications and research data gateways, leveraging Globus identity management, single sign-on, search, and authorization capabilities. Globus Genomics integrates Globus with the Galaxy genomics workflow engine and Amazon Web Services to enable cancer genomics analysis that can elastically scale compute resources with demand.
Department of Defense International Space Cooperation Strategy
2017-01-01
Secretary of Defense on .January 18. 2017. the unclassified version provides DoD’s approach for invigorating cooperation and collaboration with trusted ...Cooperation Strategy (ISCS) establishes DoD’ s approach for invigorating cooperation and collaboration with trusted allies and partners across the...collaborating with trusted allies and partners to address shared security challenges by leveraging allies’ and partners ’ capabilities to enhance space mission
Novel Therapeutics for Addiction: Behavioral and Neuroeconomic Approaches
Bickel, Warren K.; Mellis, Alexandra M.; Snider, Sarah E.; Moody, Lara; Stein, Jeffrey S.; Quisenberry, Amanda J.
2016-01-01
The maturing fields of behavioral- and neuro-economics provides conceptual understanding of the Competing Neurobehavioral Decision Systems theory (CNDS) and reinforcer pathology (i.e. high valuation of and excessive preference for drug reinforcers) allowing us to coherently categorize treatments into a theoretically comprehensive framework of addiction. In this chapter, we identify and clarify how existing and novel interventions can ameliorate reinforcer pathology in light of the CNDS and be leveraged to treat addiction. PMID:28018836
ERIC Educational Resources Information Center
Umemura, Tomo; Lacinová, Lenka; Macek, Petr; Kunnen, E. Saskia
2017-01-01
Only a few studies have longitudinally explored to whom emerging adults prefer to turn to seek closeness, comfort, and security (called "attachment preferences"), and previous studies on attachment preferences in emerging adults have focused only on the beginning of romantic relationships but not on the end of relationships. Czech…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-02
...; (b) The term ``Auction Rate Security'' or ``ARS'' means a security: (1) That is either a debt... Securities (ARS). The applicant describes ARS and the arrangement by which ARS are bought and sold as follows. ARS are securities (issued as debt or preferred stock) with an interest rate or dividend that is reset...
Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy
2011-05-15
attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks
75 FR 78768 - Proposed Exemptions From Certain Prohibited Transaction Restrictions
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-16
... Securities, as discussed herein. 2. The Applicant describes Auction Rate Securities (or ARS) and the arrangement by which ARS are bought and sold as follows. Auction Rate Securities are preferred stock or bonds... to perpetuity. ARS interest rates or dividend yields are determined and periodically reset at...
Career Placement of Doctor of Pharmacy Graduates at Eight U.S. Midwestern Schools
Sweet, Burgunda V.; Janke, Kristin K.; Kuba, Sarah E.; Plake, Kimberly S.; Stanke, Luke D; Yee, Gary C.
2015-01-01
Objective. To characterize postgraduation placement plans of 2013 doctor of pharmacy (PharmD) graduates. Methods. A cross-sectional survey of PharmD graduates from 8 midwestern colleges of pharmacy was designed to capture a comprehensive picture of graduating students’ experiences and outcomes of their job search. Results. At graduation, 81% of 2013 respondents had postgraduate plans, with approximately 40% accepting jobs and 40% accepting residencies or fellowships. Eighty-four percent of graduates reported being pleased with offers received, and 86% received placement in their preferred practice setting. Students perceived that securing residencies was more difficult than securing jobs. Students who participated in key activities had a nearly sevenfold increase in successful residency placement. Conclusion. While the demand for pharmacists decreased in recent years, responses indicated successful placement by the majority of 2013 graduates at the time of graduation. PMID:26430275
Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.
Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian
2016-03-01
Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.
Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chard, Kyle; Lidman, Mattias; McCollam, Brendan
Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus,more » describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.« less
Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management
Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian
2015-01-01
Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability. PMID:26688598
2017-03-01
daunt- ing security challenges facing the United States and the North Atlantic Treaty Organization (NATO). Project 1721 would not be possible without...America’s Commitment to the North Atlantic Treaty Organization (NATO) Alliance..................................................xix Russia’s...43 Chapter 5: The North Atlantic Treaty Organization (NATO) and the New Russian Strategic Environment
2013-09-01
Estrella et al., Learning from Change: Issues and Experiences in Participatory Monitoring and Evaluation (Ottawa, ON, CAN: IDRC Books, 2000); John Denton...afford:60 59 Estrella et al., Learning from Change: Issues and Experiences in...Administrator’s Companion: A Practical Guide. CQ Press, 2010. Estrella , Marisol, with Jutta Blauert, Dindo Campilan, John Gaventa, Julian Gonsalves
2017-09-01
well as a study of the organizational strategies, psychologies , and application techniques, point to the feasibility of gamification features toward...data collection systems and requirements, as well as a study of the organizational strategies, psychologies , and application techniques, point to the...associated with the psychological elements in use and evaluates how people think. Among research reviewed are the work of Csikszzentmihalyi on flow
CrossTalk: The Journal of Defense Software Engineering. Volume 23, Number 2, March/April 2010
2010-04-01
SDLC phase. 4. Developing secure software depends on understanding the operational con- text in which it will be used. This con- text includes... its development . BSI leverages the Common Weakness Enumeration (CWE) and the Common Attack Pattern Enumeration and Classification (CAPEC) efforts. To...system integrators providing sys- tems (both IT and warfighting) to the Concept Refinement Technology Development System Development and
Department of Defense Chemical and Biological Defense Program. Annual Report to Congress
2008-05-01
defense system acquisition costs through collaboration in the areas of development, production , and support, and to enhance interoperability with...security area leverages S&T efforts of the other product areas. Where unmet requirements are identified and where S&T is required to meet cost ...Defense Program Inventory Requirements The industrial base, which has scaled down since the end of the Cold War, has stabilized. Ongoing military
DOE Office of Scientific and Technical Information (OSTI.GOV)
Punnoose, Ratish J.; Armstrong, Robert C.; Wong, Matthew H.
Formal methods have come into wide use because of their effectiveness in verifying "safety and security" requirements of digital systems; a set of requirements for which testing is mostly ineffective. Formal methods are routinely used in the design and verification of high-consequence digital systems in industry. This report outlines our work in assessing the capabilities of commercial and open source formal tools and the ways in which they can be leveraged in digital design workflows.
Leveraging Observations of Security Force Assistance in Afghanistan for Global Operations
2013-01-01
commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under...copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use . For...contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of
Network Data: Statistical Theory and New Models
2016-02-17
SECURITY CLASSIFICATION OF: During this period of review, Bin Yu worked on many thrusts of high-dimensional statistical theory and methodologies. Her...research covered a wide range of topics in statistics including analysis and methods for spectral clustering for sparse and structured networks...2,7,8,21], sparse modeling (e.g. Lasso) [4,10,11,17,18,19], statistical guarantees for the EM algorithm [3], statistical analysis of algorithm leveraging
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-25
... product users and they have indicated a preference that premium pricing for mini-options match what is... market participants clarity as to the minimum pricing increments for mini-options, the filing would harmonize penny pricing between mini-options and standard options on the same security. \\3\\ See Securities...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Inclusion of subordinated debt securities and... FROM THE OFFICE OF THRIFT SUPERVISION State Savings Associations-Operations § 390.341 Inclusion of... seeking FDIC approval of, or non-objection to, the inclusion of covered securities in supplementary...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Inclusion of subordinated debt securities and... FROM THE OFFICE OF THRIFT SUPERVISION State Savings Associations-Operations § 390.341 Inclusion of... seeking FDIC approval of, or non-objection to, the inclusion of covered securities in supplementary...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Inclusion of subordinated debt securities and... FROM THE OFFICE OF THRIFT SUPERVISION State Savings Associations-Operations § 390.341 Inclusion of... seeking FDIC approval of, or non-objection to, the inclusion of covered securities in supplementary...
USign--a security enhanced electronic consent model.
Li, Yanyan; Xie, Mengjun; Bian, Jiang
2014-01-01
Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.
IT Data Mining Tool Uses in Aerospace
NASA Technical Reports Server (NTRS)
Monroe, Gilena A.; Freeman, Kenneth; Jones, Kevin L.
2012-01-01
Data mining has a broad spectrum of uses throughout the realms of aerospace and information technology. Each of these areas has useful methods for processing, distributing, and storing its corresponding data. This paper focuses on ways to leverage the data mining tools and resources used in NASA's information technology area to meet the similar data mining needs of aviation and aerospace domains. This paper details the searching, alerting, reporting, and application functionalities of the Splunk system, used by NASA's Security Operations Center (SOC), and their potential shared solutions to address aircraft and spacecraft flight and ground systems data mining requirements. This paper also touches on capacity and security requirements when addressing sizeable amounts of data across a large data infrastructure.
Leveraging Client-Side DNS Failure Patterns to Identify Malicious Behaviors
2015-09-28
malicious behavior found in our dataset and (ii) to create ground truth to evaluate the system proposed in Section V. We begin by removing those cases that...2011. [10] S. Hao, N. Feamster, and R. Pandrangi, “Monitoring the Initial DNS Behavior of Malicious Domains,” in ACM IMC , 2011. [11] R. Perdisci et...distribution is unlimited. Leveraging Client-Side DNS Failure Patterns to Identify Malicious Behaviors The views, opinions and/or findings contained in
Public perspectives on nuclear security. US national security surveys, 1993--1997
DOE Office of Scientific and Technical Information (OSTI.GOV)
Herron, K.G.; Jenkins-Smith, H.C.
This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between USmore » and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.« less
Security proof of continuous-variable quantum key distribution using three coherent states
NASA Astrophysics Data System (ADS)
Brádler, Kamil; Weedbrook, Christian
2018-02-01
We introduce a ternary quantum key distribution (QKD) protocol and asymptotic security proof based on three coherent states and homodyne detection. Previous work had considered the binary case of two coherent states and here we nontrivially extend this to three. Our motivation is to leverage the practical benefits of both discrete and continuous (Gaussian) encoding schemes creating a best-of-both-worlds approach; namely, the postprocessing of discrete encodings and the hardware benefits of continuous ones. We present a thorough and detailed security proof in the limit of infinite signal states which allows us to lower bound the secret key rate. We calculate this is in the context of collective eavesdropping attacks and reverse reconciliation postprocessing. Finally, we compare the ternary coherent state protocol to other well-known QKD schemes (and fundamental repeaterless limits) in terms of secret key rates and loss.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
... Securities outside of the Offer and may otherwise buy, sell, hold or seek to restructure, redeem or otherwise....1 trillion. Citigroup's consumer and corporate banking business is a global franchise encompassing... bought and sold as follows. Auction Rate Securities are securities (issued as debt or preferred stock...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-09
.... Subordinated Debt Securities/ Notice of Issuance of Subordinated Debt or Mandatorily Redeemable Preferred Stock. 1550-0032 Interagency Notice of Change in 1557-0272 1557-0014. Control. 1550-0035 Securities Offering... to that Transferred to the Transferred to the FRB. FRB. 1550-0062 Minimum Security Devices and 1557...
76 FR 49698 - Covered Securities Pursuant to Section 18 of the Securities Act of 1933
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-11
... [Release No. 33-9251; File No. S7-31-11] RIN 3235-AL20 Covered Securities Pursuant to Section 18 of the... under Section 18 of the Securities Act of 1933 (``Securities Act''), as amended, to designate certain securities on BATS Exchange, Inc. (``BATS'' or ``Exchange'') as covered securities for purposes of Section 18...
Pandora’s Box: The Key to Close It
1995-01-01
security interests. Current nonproliferation efforts have failed to deter nations from seeclng and ootaining WJ- D . Evidenced by discoveries in Iraq and...acversary wA0 aiso Chllders 7 believes in seecing a X& D -free resolution. Preemptive strikes and defensive shields rely on the U.S. developing complete...the specter of ’nuclear winter’.. .perceptions of strategic leverage had to be dramatically adlusted." ( Moffis -,: 6-7; Nitze: 152: A paradox has
Leveraging Social Media to Engage the Public in Homeland Security
2009-09-01
are so preoccupied that they have tunnel visions – you never really hear much from them. 10. The key is engaging the public before disaster...organized group). This is info coming from someone on their blackberry or pda. 87 New Zealand – focus is on citizen participation. Building a culture...dynamic information systems (temperature readings, blackberry or iphone network systems). Need guidelines, a primer on how to use it effectively
Review of intelligent video surveillance with single camera
NASA Astrophysics Data System (ADS)
Liu, Ying; Fan, Jiu-lun; Wang, DianWei
2012-01-01
Intelligent video surveillance has found a wide range of applications in public security. This paper describes the state-of- the-art techniques in video surveillance system with single camera. This can serve as a starting point for building practical video surveillance systems in developing regions, leveraging existing ubiquitous infrastructure. In addition, this paper discusses the gap between existing technologies and the requirements in real-world scenario, and proposes potential solutions to reduce this gap.
United States National Security Interests and North Korea: Leveraging Common Interests
2007-06-15
Initiative ROK Republic of Korea (South Korea) SPOT State Sponsor of Terrorism list WMD Weapons of Mass Destruction WTO World Trade Organization x...Economic dependence has unwittingly tied Japan, South Korea, China, and the US together, binding these nations together by trade . On the other hand...missiles and missile technology a central part of their export trade . 10 Though solid figures are not available for the value of the missile trade , it
Strategy or No Strategy: Explaining the Absence of a Danish National Security Strategy
2013-06-13
the very people who are trying to protect and advance Danish interests. These experiences have led me to explore and try to understand the absence...France (Jackson and Soerensen 2007). 4These effects are thoroughly described in complexity theory as in systems thinking . 8...literature fails to examine how alliance policies interact with strategic thinking , or how small states can apply strategy as a leverage to maximize
A Next Generation Repository for Sharing Sensitive Network and Security Data
2018-01-01
submission, and 5 yearly IRB reviews d. Provided legal support for MOA data provider and host agreements and amendments e. Feedback and bug reporting...intrusion detection methods and systems , b) event- reconstruction and evidence-based insights into global trends (e.g., DDoS attacks and malware...propagation), and c) situational awareness (e.g., outage detection). We have leveraged IMPACT’s policy and legal framework to minimize any risks associated
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wilson, David G.; Cook, Marvin A.
This report summarizes collaborative efforts between Secure Scalable Microgrid and Korean Institute of Energy Research team members . The efforts aim to advance microgrid research and development towards the efficient utilization of networked microgrids . The collaboration resulted in the identification of experimental and real time simulation capabilities that may be leveraged for networked microgrids research, development, and demonstration . Additional research was performed to support the demonstration of control techniques within real time simulation and with hardware in the loop for DC microgrids .
Effective coordination and communication between the Department of Energy (DOE) and the Department of Defense (DoD) is necessary to ensure that the... nuclear weapons stockpile remains safe, secure, and effective without nuclear testing. The science-based Stockpile Sustainment Program (SSP) is the...method used to sustain and maintain the nuclear stockpile throughout the weapons life cycle. A comprehensive review was conducted of the joint
Quality and efficiency successes leveraging IT and new processes.
Chaiken, Barry P; Christian, Charles E; Johnson, Liz
2007-01-01
Today, healthcare annually invests billions of dollars in information technology, including clinical systems, electronic medical records and interoperability platforms. While continued investment and parallel development of standards are critical to secure exponential benefits from clinical information technology, intelligent and creative redesign of processes through path innovation is necessary to deliver meaningful value. Reports from two organizations included in this report review the steps taken to reinvent clinical processes that best leverage information technology to deliver safer and more efficient care. Good Samaritan Hospital, Vincennes, Indiana, implemented electronic charting, point-of-care bar coding of medications prior to administration, and integrated clinical documentation for nursing, laboratory, radiology and pharmacy. Tenet Healthcare, during its implementation and deployment of multiple clinical systems across several hospitals, focused on planning that included team-based process redesign. In addition, Tenet constructed valuable and measurable metrics that link outcomes with its strategic goals.
Cattle site preference in northeastern Oregon
USDA-ARS?s Scientific Manuscript database
Free-roaming beef cattle naturally gravitate to locations on the landscape that provide them food, water, shelter, and security. In mountainous environments, animals are also sensitive to land physiography, generally preferring level terrain near established trails and travel routes. Our study was...
Bak, Jia; Pyeon, Hae-In; Seok, Jin-I; Choi, Yun-Sik
2017-03-01
Y maze has been used to test spatial working memory in rodents. To this end, the percentage of spontaneous alternation has been employed. Alternation indicates sequential entries into all three arms; e.g., when an animal visits all three arms clockwise or counterclockwise sequentially, alternation is achieved. Interestingly, animals have a tendency to rotate or turn to a preferred side. Thus, when an animal has a high rotation preference, this may influence their alternation behavior. Here, we have generated a new analytical method, termed entropy of spontaneous alternation, to offset the effect of rotation preference on Y maze. To validate the entropy of spontaneous alternation, we employed a free rotation test using a cylinder and a spatial working memory test on Y maze. We identified that mice showed 65.1% rotation preference on average. Importantly, the percentage of spontaneous alternation in the high preference group (more than 70% rotation to a preferred side) was significantly higher than that in the no preference group (<55%). In addition, there was a clear correlation between rotation preference on cylinder and turning preference on Y maze. On the other hand, this potential leverage effect that arose from rotation preference disappeared when the animal behavior on Y maze was analyzed with the entropy of spontaneous alternation. Further, entropy of spontaneous alternation significantly determined the loss of spatial working memory by scopolamine administration. Combined, these data indicate that the entropy of spontaneous alternation provides higher credibility when spatial working memory is evaluated using Y maze. Copyright © 2016 Elsevier B.V. All rights reserved.
Doctors' experience with handheld computers in clinical practice: qualitative study.
McAlearney, Ann Scheck; Schweikhart, Sharon B; Medow, Mitchell A
2004-05-15
To examine doctors' perspectives about their experiences with handheld computers in clinical practice. Qualitative study of eight focus groups consisting of doctors with diverse training and practice patterns. Six practice settings across the United States and two additional focus group sessions held at a national meeting of general internists. 54 doctors who did or did not use handheld computers. Doctors who used handheld computers in clinical practice seemed generally satisfied with them and reported diverse patterns of use. Users perceived that the devices helped them increase productivity and improve patient care. Barriers to use concerned the device itself and personal and perceptual constraints, with perceptual factors such as comfort with technology, preference for paper, and the impression that the devices are not easy to use somewhat difficult to overcome. Participants suggested that organisations can help promote handheld computers by providing advice on purchase, usage, training, and user support. Participants expressed concern about reliability and security of the device but were particularly concerned about dependency on the device and over-reliance as a substitute for clinical thinking. Doctors expect handheld computers to become more useful, and most seem interested in leveraging (getting the most value from) their use. Key opportunities with handheld computers included their use as a stepping stone to build doctors' comfort with other information technology and ehealth initiatives and providing point of care support that helps improve patient care.
COVERING THE SEAMS IN U.S. NATIONAL SECURITY BY APPLYING NETWORK AND TEAM ATTRIBUTES
2017-04-06
Today, one such weakness is the seams that exist in the system . Organizational criteria like geography , functions, and responsibilities often create...establishment by the National Security Act of 1947, the modern U.S. national security system has evolved as a result of legislation, presidential preference...and because of changes in the U.S. and international security environments. With each evolution, the system has found ways to function in dealing
Neurobehavioral determinants of nutritional security in fetal growth-restricted individuals.
Portella, André Krumel; Silveira, Patrícia Pelufo
2014-12-01
Fetal growth restriction results from a failure to achieve a higher growth potential and has been associated with many maternal conditions, such as chronic diseases (infections, hypertension, and some cases of diabetes and obesity), exposures (tobacco smoke, drugs), and malnutrition. This early adversity induces a series of adaptive physiological responses aimed at improving survival, but imposing increased risk for developing chronic nontransmittable diseases (obesity, type II diabetes, cardiovascular disease) in the long term. Recently, mounting evidence has shown that fetal growth impairment is related to altered feeding behavior and preferences through the life course. When living in countries undergoing nutritional transition, in which individuals experience the coexistence of underweight and overweight problems (the "double burden of malnutrition"), fetal growth-restricted children can be simultaneously growth restricted and overweight-a double burden of malnutrition at the individual level. Considering food preferences as an important aspect of nutrition security, we will summarize the putative neurobiological mechanisms at the core of the relationship between fetal growth and nutrition security over the life course and the evidence linking early life adversity to later food preferences. © 2014 New York Academy of Sciences.
Protecting Sensitive Information in Directory Services Using Virtual Directories
NASA Astrophysics Data System (ADS)
Claycomb, William; Shin, Dongwan
Directory services are commonly used to store information related to individuals, and often act as a source for security services, such as authentication and access control, in collaborative applications within/across organizations. Hence, there is an urgent need to protect the sensitive information they contain. Existing solutions offer minimal protection against insider attacks, a growing threat to both government and industry data services. In this paper we present a solution for data protection that leverages virtual directories and data encryption to provide a user-centric approach to data protection, delegation, and collaboration. A security architecture is presented, along with the discussion of the benefits and vulnerabilities of our approach. We also discuss a proof-of-concept implementation and performance testing results.
Code of Federal Regulations, 2010 CFR
2010-01-01
... adjustable rate preferred stock, money market (auction rate) preferred stock, or other newly developed...) and the National Market System, i.e., the top tier of the National Association of Securities Dealers... shall be understood to be present whenever the FDIC determines there is a high probability that the...
2013-02-14
the NGB and Combatant Commanders seek to formalize increased funding for SPP engagements via the Future Years Defense Program...shoulder a larger portion of their security burden in the future . The challenge for American diplomats, in and out of uniform, is to reassure our...rebalance? The National Guard’s State Partnership Program (SPP) has a 20-year history of cementing alliances between America and partner nations for
Leveraging Peacekeeping Partners: African Continental Progress One Sub-Region at a Time
2012-11-01
mass atrocities, the members of ECOWAS were effectively forced to shift their security stance from conflict management to conflict prevention. 8 In...tack with regards to their role in conflict management across the continent. Following the formation of the AU in the early 2000’s, the AU’s new...Washington, DC: GPO, June 2012). 2 Ibid., 2. 3 Williams, Paul D, “The African Union’s Conflict Management Capabilities,” Council on Foreign
Independent Assessment of the Afghan National Security Forces
2014-02-01
of operational objectives for the ANSF that support the U.S. policy goal in Afghanistan through 2018 ; con- ducted a troop-to-task analysis of ANSF...stability in the 2015– 2018 timeframe than it is now. The insurgency has been considerably weakened since the surge of U.S. and NATO forces in 2009, but...conduct high-profile attacks in Kabul and other urban areas, and gain leverage for reconciliation negotiations. In 2016– 2018 , once the insurgency has
The VIDA Framework as an Education Tool: Leveraging Volcanology Data for Educational Purposes
NASA Astrophysics Data System (ADS)
Faied, D.; Sanchez, A.
2009-04-01
The VIDA Framework as an Education Tool: Leveraging Volcanology Data for Educational Purposes Dohy Faied, Aurora Sanchez (on behalf of SSP08 VAPOR Project Team) While numerous global initiatives exist to address the potential hazards posed by volcanic eruption events and assess impacts from a civil security viewpoint, there does not yet exist a single, unified, international system of early warning and hazard tracking for eruptions. Numerous gaps exist in the risk reduction cycle, from data collection, to data processing, and finally dissemination of salient information to relevant parties. As part of the 2008 International Space University's Space Studies Program, a detailed gap analysis of the state of volcano disaster risk reduction was undertaken, and this paper presents the principal results. This gap analysis considered current sensor technologies, data processing algorithms, and utilization of data products by various international organizations. Recommendations for strategies to minimize or eliminate certain gaps are also provided. In the effort to address the gaps, a framework evolved at system level. This framework, known as VIDA, is a tool to develop user requirements for civil security in hazardous contexts, and a candidate system concept for a detailed design phase. While the basic intention of VIDA is to support disaster risk reduction efforts, there are several methods of leveraging raw science data to support education across a wide demographic. Basic geophysical data could be used to educate school children about the characteristics of volcanoes, satellite mappings could support informed growth and development of societies in at-risk areas, and raw sensor data could contribute to a wide range of university-level research projects. Satellite maps, basic geophysical data, and raw sensor data are combined and accessible in a way that allows the relationships between these data types to be explored and used in a training environment. Such a resource naturally lends itself to research efforts in the subject but also research in operational tools, system architecture, and human/machine interaction in civil protection or emergency scenarios.
Dweik, Diána; Girasek, Edmond; Töreki, Annamária; Mészáros, Gyula; Pál, Attila
2014-04-01
To assess birth preferences in a sample of Hungarian pregnant women and identify determinants of ambivalence or clear choices for cesarean section throughout pregnancy. Follow-up two-point questionnaire survey. University Department of Obstetrics and Gynecology in Hungary. A total of 413 women with singleton pregnancies where there was no awareness of medical contradictions to vaginal delivery, attending for routine ultrasound examination in mid-pregnancy from November 2011 to March 2012. Questionnaires completed in mid- and late pregnancy (gestational weeks 18-22 and 35-37) including the Wijma Delivery Expectancy/Experience Questionnaire A. Prevalence of women preferring cesarean section or being uncertain about what delivery route to choose, in case they had the choice; their demographic characteristics, attitudes toward birth issues and their Wijma Delivery Expectancy/Experience Questionnaire A scores, compared with women consistent in their preference for vaginal delivery. Of the 413 respondents, 365 (88.4%) were consistent in their preference for vaginal delivery. In logistic regression models the important contributors to describing preferences for cesarean section or uncertain preferences were previous cesarean section and maternal belief that cesarean section is more beneficial than vaginal delivery. The majority of pregnant women preferred vaginal delivery to cesarean section. Neither a higher Wijma Delivery Expectancy/Experience Questionnaire A score nor sociodemographic differences were important determinants of a preference for cesarean section or for an uncertain preference. On the other hand, previous cesarean section and certain preconceived maternal attitudes towards delivery were characteristic for these women. © 2014 Nordic Federation of Societies of Obstetrics and Gynecology.
Performance Analysis of Cyber Security Awareness Delivery Methods
NASA Astrophysics Data System (ADS)
Abawajy, Jemal; Kim, Tai-Hoon
In order to decrease information security threats caused by human-related vulnerabilities, an increased concentration on information security awareness and training is necessary. There are numerous information security awareness training delivery methods. The purpose of this study was to determine what delivery method is most successful in providing security awareness training. We conducted security awareness training using various delivery methods such as text based, game based and a short video presentation with the aim of determining user preference delivery methods. Our study suggests that a combined delvery methods are better than individual secrity awareness delivery method.
Shift scheduling model considering workload and worker’s preference for security department
NASA Astrophysics Data System (ADS)
Herawati, A.; Yuniartha, D. R.; Purnama, I. L. I.; Dewi, LT
2018-04-01
Security department operates for 24 hours and applies shift scheduling to organize its workers as well as in hotel industry. This research has been conducted to develop shift scheduling model considering the workers physical workload using rating of perceived exertion (RPE) Borg’s Scale and workers’ preference to accommodate schedule flexibility. The mathematic model is developed in integer linear programming and results optimal solution for simple problem. Resulting shift schedule of the developed model has equally distribution shift allocation among workers to balance the physical workload and give flexibility for workers in working hours arrangement.
Leveraging Knowledge: Impact on Low Cost Planetary Mission Design.
ERIC Educational Resources Information Center
Momjian, Jennifer
This paper discusses innovations developed by the Jet Propulsion Laboratory (JPL) librarians to reduce the information query cycle time for teams planning low-cost, planetary missions. The first section provides background on JPL and its library. The second section addresses the virtual information environment, including issues of access, content,…
Creation of security engineering programs by the Southwest Surety Institute
NASA Astrophysics Data System (ADS)
Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn
1998-12-01
The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.
Evolution of consumer information preferences with market maturity in solar PV adoption
DOE Office of Scientific and Technical Information (OSTI.GOV)
Reeves, D. Cale; Rai, Varun; Margolis, Robert
Residential adoption of solar photovoltaics (PV) is spreading rapidly, supported by policy initiatives at the federal, state, and local levels. Potential adopters navigate increasingly complex decision-making landscapes in their path to adoption. Much is known about the individual-level drivers of solar PV diffusion that steer adopters through this process, but relatively little is known about the evolution of these drivers as solar PV markets mature. By understanding the evolution of emerging solar PV markets over time, stakeholders in the diffusion of solar PV can increase policy effectiveness and reduce costs. This analysis uses survey data to compare two adjacent marketsmore » across a range of relevant characteristics, then models changes in the importance of local vs cosmopolitan information sources by combining theory relating market maturity to adopter behavior with event-history techniques. In younger markets, earlier, innovative adoptions that are tied to a preference for cosmopolitan information sources are more prevalent than expected, suggesting a frustrated demand for solar PV that segues into adoptions fueled by local information preferences contemporary with similar adoptions in older markets. Furthermore, the analysis concludes with policy recommendations to leverage changing consumer information preferences as markets mature.« less
Evolution of consumer information preferences with market maturity in solar PV adoption
Reeves, D. Cale; Rai, Varun; Margolis, Robert
2017-07-04
Residential adoption of solar photovoltaics (PV) is spreading rapidly, supported by policy initiatives at the federal, state, and local levels. Potential adopters navigate increasingly complex decision-making landscapes in their path to adoption. Much is known about the individual-level drivers of solar PV diffusion that steer adopters through this process, but relatively little is known about the evolution of these drivers as solar PV markets mature. By understanding the evolution of emerging solar PV markets over time, stakeholders in the diffusion of solar PV can increase policy effectiveness and reduce costs. This analysis uses survey data to compare two adjacent marketsmore » across a range of relevant characteristics, then models changes in the importance of local vs cosmopolitan information sources by combining theory relating market maturity to adopter behavior with event-history techniques. In younger markets, earlier, innovative adoptions that are tied to a preference for cosmopolitan information sources are more prevalent than expected, suggesting a frustrated demand for solar PV that segues into adoptions fueled by local information preferences contemporary with similar adoptions in older markets. Furthermore, the analysis concludes with policy recommendations to leverage changing consumer information preferences as markets mature.« less
Evolution of consumer information preferences with market maturity in solar PV adoption
NASA Astrophysics Data System (ADS)
Cale Reeves, D.; Rai, Varun; Margolis, Robert
2017-07-01
Residential adoption of solar photovoltaics (PV) is spreading rapidly, supported by policy initiatives at the federal, state, and local levels. Potential adopters navigate increasingly complex decision-making landscapes in their path to adoption. Much is known about the individual-level drivers of solar PV diffusion that steer adopters through this process, but relatively little is known about the evolution of these drivers as solar PV markets mature. By understanding the evolution of emerging solar PV markets over time, stakeholders in the diffusion of solar PV can increase policy effectiveness and reduce costs. This analysis uses survey data to compare two adjacent markets across a range of relevant characteristics, then models changes in the importance of local vs cosmopolitan information sources by combining theory relating market maturity to adopter behavior with event-history techniques. In younger markets, earlier, innovative adoptions that are tied to a preference for cosmopolitan information sources are more prevalent than expected, suggesting a frustrated demand for solar PV that segues into adoptions fueled by local information preferences contemporary with similar adoptions in older markets. The analysis concludes with policy recommendations to leverage changing consumer information preferences as markets mature.
CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks
Cui, Weirong; Du, Chenglie; Chen, Jinchao
2016-01-01
Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant’s profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes. PMID:27337001
CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.
Cui, Weirong; Du, Chenglie; Chen, Jinchao
2016-01-01
Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.
Reasoning about Probabilistic Security Using Task-PIOAs
NASA Astrophysics Data System (ADS)
Jaggard, Aaron D.; Meadows, Catherine; Mislove, Michael; Segala, Roberto
Task-structured probabilistic input/output automata (Task-PIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framework for the universal composability paradigms of protocol security. One of their advantages is that that they allow one to distinguish high-level nondeterminism that can affect the outcome of the protocol, from low-level choices, which can't. We present an alternative approach to analyzing the structure of Task-PIOAs that relies on ordered sets. We focus on two of the components that are required to define and apply Task-PIOAs: discrete probability theory and automata theory. We believe our development gives insight into the structure of Task-PIOAs and how they can be utilized to model crypto-protocols. We illustrate our approach with an example from anonymity, an area that has not previously been addressed using Task-PIOAs. We model Chaum's Dining Cryptographers Protocol at a level that does not require cryptographic primitives in the analysis. We show via this example how our approach can leverage a proof of security in the case a principal behaves deterministically to prove security when that principal behaves probabilistically.
Kluge, Hans; Martín-Moreno, Jose Maria; Emiroglu, Nedret; Rodier, Guenael; Kelley, Edward; Vujnovic, Melitta; Permanand, Govin
2018-01-01
The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote this approach, more specifically around how to better embed the IHR (2005) core capacities into the main health system functions. This paper looks at how and where the intersections between the IHR and the health system can be best leveraged towards developing greater health system resilience. This merging of approaches is a key component in pursuit of Universal Health Coverage and strengthened global health security as two mutually reinforcing agendas. PMID:29379650
Kluge, Hans; Martín-Moreno, Jose Maria; Emiroglu, Nedret; Rodier, Guenael; Kelley, Edward; Vujnovic, Melitta; Permanand, Govin
2018-01-01
The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote this approach, more specifically around how to better embed the IHR (2005) core capacities into the main health system functions. This paper looks at how and where the intersections between the IHR and the health system can be best leveraged towards developing greater health system resilience. This merging of approaches is a key component in pursuit of Universal Health Coverage and strengthened global health security as two mutually reinforcing agendas.
Harding, David J.; Wyse, Jessica J.B.; Dobson, Cheyney; Morenoff, Jeffrey D.
2014-01-01
Former prisoners are at high risk of economic insecurity due to the challenges they face in finding employment and to the difficulties of securing and maintaining public assistance while incarcerated. This study examines the processes through which former prisoners attain economic security, examining how they meet basic material needs and achieve upward mobility over time. It draws on unique qualitative data from in-depth, unstructured interviews with a sample of former prisoners followed over a two to three year period to assess how subjects draw upon a combination of employment, social supports, and public benefits to make ends meet. Findings reveal considerable struggle among our subjects to meet even minimal needs for shelter and food, although economic security and stability could be attained when employment or public benefits were coupled with familial social support. Sustained economic security was rarely achieved absent either strong social support or access to long-term public benefits. However, a select few were able to leverage material support and social networks into trajectories of upward mobility and economic independence. Policy implications are discussed. PMID:25584015
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Reporting regarding certain securities underlying asset-backed securities under section 15(d) of the Act. 240.15d-23 Section 240.15d-23 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND...
An evaluation of authentication methods for smartphone based on users’ preferences
NASA Astrophysics Data System (ADS)
Sari, P. K.; Ratnasari, G. S.; Prasetio, A.
2016-04-01
This study discusses about smartphone screen lock preferences using some types of authentication methods. The purpose is to determine the user behaviours based on the perceived security and convenience, as well as the preferences for different types of authentication methods. Variables used are the considerations for locking the screens and the types of authentication methods. The population consists of the smartphone users with the total samples of 400 respondents within a nonprobability sampling method. Data analysis method used is the descriptive analysis. The results showed that the convenience factor is still the major consideration for locking the smartphone screens. Majority of the users chose the pattern unlock as the most convenient method to use. Meanwhile, fingerprint unlock becomes the most secure method in the users’ perceptions and as the method chosen to be used in the future.
Code of Federal Regulations, 2011 CFR
2011-01-01
... certain derivative third and sixth preference and nonpreference immigrants. 1212.9 Section 1212.9 Aliens... Applicability of section 212(a)(32) to certain derivative third and sixth preference and nonpreference immigrants. A derivative beneficiary who is the spouse or child of a qualified third or sixth preference or...
Gender Differences in Work Values: Perpetuating the Myth.
ERIC Educational Resources Information Center
Rowe, Reba; Snizek, William E.
1995-01-01
General Social Survey data from 1973-90 were analyzed to identify the work value preferences of 7,436 full-time workers (income, security, working hours, advancement opportunities, accomplishment). No support was found for differences between men's and women's work values. Preferences depended more on age, education, and occupational prestige. (SK)
2005-09-01
squad training, team training, dismounted training, video games , computer games, multiplayer games. 16. PRICE CODE 17. SECURITY CLASSIFICATION OF...Multiplayer - mode of play for computer and video games in which multiple people can play the same game at the same time (Wikipedia, 2005) D...that “improvements in 3-D image generation on the PC and the speed of the internet” have increased the military’s interest in the use of video games as
An Algorithm to Identify and Localize Suitable Dock Locations from 3-D LiDAR Scans
2013-05-10
Locations from 3-D LiDAR Scans 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Graves, Mitchell Robert 5d. PROJECT NUMBER...Ranging ( LiDAR ) scans. A LiDAR sensor is a sensor that collects range images from a rotating array of vertically aligned lasers. Our solution leverages...Algorithm, Dock, Locations, Point Clouds, LiDAR , Identify 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a
Africa Command: U.S. Strategic Interests and the Role of the U.S. Military in Africa
2009-01-05
conflict. For more information on the Phase Zero strategy and TSC, also known as peacetime engagement, see General Charles Wald , “The Phase Zero...Principal Deputy Under Secretary Henry From the Pentagon,” February 7, 2007. 16 See, for example, Lisa Schirch and Aaron Kishbaugh, “Leveraging ‘3D...significant climate change.” Testimony of General Charles Wald , Member, Military Advisory Board, at a hearing on Climate Change and National Security
2013-12-01
Protective Equipment Sizing and Design ,” Human Factors: The Journal of the Human Factors and Ergonomics Society 55, no. 1 (2013): 6–35; Hsiao...firefighters. The information will be used to improve apparatus design , revise NFPA 1901 Standard for Automotive Fire Apparatus, and improve cab, seat ... Design .” Human Factors: The Journal of the Human Factors and Ergonomics Society 55, no. 1 (2013): 6–35. ———. Sizing Firefighters and Fire Apparatus
CrossTalk: The Journal of Defense Software Engineering. Volume 26, Number 6, November/December 2013
2013-12-01
requirements during sprint planning. Automated scanning, which includes automated code-review tools, allows the expert to monitor the system... sprint . This enables the validator to leverage the test results for formal validation and verification, and perform a shortened “hybrid” style of IV&V...per SPRINT (1-4 weeks) 1 week 1 Month Up to four months Ø Deliverable product to user Ø Security posture assessed Ø Accredited to field/operate
2011-01-01
infonnation on the use of social media, . social networking sites were searched to review online forwns. These forums assisted in identifying some of the...tools such as social networking sites , social media, user-generated contentj social softwC\\.fe, email, instant messaging, and discussion forums (e.g...social media on official computers. The ban was put into effect because, as was stated, "[social media and social networking sites ] in general are a
Autonomic Recovery: HyperCheck: A Hardware-Assisted Integrity Monitor
2013-08-01
system (OS). HyperCheck leverages the CPU System Management Mode ( SMM ), present in x86 systems, to securely generate and transmit the full state of the...HyperCheck harnesses the CPU System Management Mode ( SMM ) which is present in all x86 commodity systems to create a snapshot view of the current state of the...protect the software above it. Our assumptions are that the attacker does not have physical access to the machine and that the SMM BIOS is locked and
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of certain securities of cooperative apartment houses from section 15(a). 240.15a-2 Section 240.15a-2 Commodity and... Securities from Section 15(a) § 240.15a-2 Exemption of certain securities of cooperative apartment houses...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Exemption of certain securities of cooperative apartment houses from section 15(a). 240.15a-2 Section 240.15a-2 Commodity and... Securities from Section 15(a) § 240.15a-2 Exemption of certain securities of cooperative apartment houses...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Herron, Kerry Gale; Jenkins-Smith, Hank C.
2008-01-01
We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support formore » domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.« less
International quality improvement initiatives.
Hickey, Patricia A; Connor, Jean A; Cherian, Kotturathu M; Jenkins, Kathy; Doherty, Kaitlin; Zhang, Haibo; Gaies, Michael; Pasquali, Sara; Tabbutt, Sarah; St Louis, James D; Sarris, George E; Kurosawa, Hiromi; Jonas, Richard A; Sandoval, Nestor; Tchervenkov, Christo I; Jacobs, Jeffery P; Stellin, Giovanni; Kirklin, James K; Garg, Rajnish; Vener, David F
2017-12-01
Across the globe, the implementation of quality improvement science and collaborative learning has positively affected the care and outcomes for children born with CHD. These efforts have advanced the collective expertise and performance of inter-professional healthcare teams. In this review, we highlight selected quality improvement initiatives and strategies impacting the field of cardiovascular care and describe implications for future practice and research. The continued leveraging of technology, commitment to data transparency, focus on team-based practice, and recognition of cultural norms and preferences ensure the success of sustainable models of global collaboration.
LaCava, John; Molloy, Kelly R.; Taylor, Martin S.; Domanski, Michal; Chait, Brian T.; Rout, Michael P.
2015-01-01
Dissecting and studying cellular systems requires the ability to specifically isolate distinct proteins along with the co-assembled constituents of their associated complexes. Affinity capture techniques leverage high affinity, high specificity reagents to target and capture proteins of interest along with specifically associated proteins from cell extracts. Affinity capture coupled to mass spectrometry (MS)-based proteomic analyses has enabled the isolation and characterization of a wide range of endogenous protein complexes. Here, we outline effective procedures for the affinity capture of protein complexes, highlighting best practices and common pitfalls. PMID:25757543
Leveraging Python Interoperability Tools to Improve Sapphire's Usability
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gezahegne, A; Love, N S
2007-12-10
The Sapphire project at the Center for Applied Scientific Computing (CASC) develops and applies an extensive set of data mining algorithms for the analysis of large data sets. Sapphire's algorithms are currently available as a set of C++ libraries. However many users prefer higher level scripting languages such as Python for their ease of use and flexibility. In this report, we evaluate four interoperability tools for the purpose of wrapping Sapphire's core functionality with Python. Exposing Sapphire's functionality through a Python interface would increase its usability and connect its algorithms to existing Python tools.
Code of Federal Regulations, 2010 CFR
2010-04-01
... securities issued by persons engaged in securities related businesses. 270.12d3-1 Section 270.12d3-1... in securities related businesses. (a) Notwithstanding section 12(d)(3) of the Act, a registered... securities related business, the determination required by paragraph (b) of this section shall be made as...
24 CFR 884.118 - Responsibilities of the owner.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Responsibilities of the owner. (a) The Owner shall be responsible (subject to post-review or audit by HUD or the... Federal selection preferences in accordance with 24 CFR part 5, obtaining and verifying Social Security... this title; obtaining and verifying Social Security Numbers submitted by participants, as provided by...
24 CFR 884.118 - Responsibilities of the owner.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Responsibilities of the owner. (a) The Owner shall be responsible (subject to post-review or audit by HUD or the... Federal selection preferences in accordance with 24 CFR part 5, obtaining and verifying Social Security... this title; obtaining and verifying Social Security Numbers submitted by participants, as provided by...
Falcão-Reis, Filipa; Correia, Manuel E
2010-01-01
With the advent of more sophisticated and comprehensive healthcare information systems, system builders are becoming more interested in patient interaction and what he can do to help to improve his own health care. Information systems play nowadays a crucial and fundamental role in hospital work-flows, thus providing great opportunities to introduce and improve upon "patient empowerment" processes for the personalization and management of Electronic Health Records (EHRs). In this paper, we present a patient's privacy generic control mechanisms scenarios based on the Extended OpenID (eOID), a user centric digital identity provider previously developed by our group, which leverages a secured OpenID 2.0 infrastructure with the recently released Portuguese Citizen Card (CC) for secure authentication in a distributed health information environment. eOID also takes advantage of Oauth assertion based mechanisms to implement patient controlled secure qualified role based access to his EHR, by third parties.
A Hybrid Authentication and Authorization Process for Control System Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Manz, David O.; Edgar, Thomas W.; Fink, Glenn A.
2010-08-25
Convergence of control system and IT networks require that security, privacy, and trust be addressed. Trust management continues to plague traditional IT managers and is even more complex when extended into control system networks, with potentially millions of entities, a mission that requires 100% availability. Yet these very networks necessitate a trusted secure environment where controllers and managers can be assured that the systems are secure and functioning properly. We propose a hybrid authentication management protocol that addresses the unique issues inherent within control system networks, while leveraging the considerable research and momentum in existing IT authentication schemes. Our hybridmore » authentication protocol for control systems provides end device to end device authentication within a remote station and between remote stations and control centers. Additionally, the hybrid protocol is failsafe and will not interrupt communication or control of vital systems in a network partition or device failure. Finally, the hybrid protocol is resilient to transitory link loss and can operate in an island mode until connectivity is reestablished.« less
Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD
NASA Astrophysics Data System (ADS)
Länger, Thomas; Lenhart, Gaby
2009-05-01
In recent years, quantum key distribution (QKD) has been the object of intensive research activities and of rapid progress, and it is now developing into a competitive industry with commercial products. Once QKD systems are transferred from the controlled environment of physical laboratories into a real-world environment for practical use, a number of practical security, compatibility and connectivity issues need to be resolved. In particular, comprehensive security evaluation and watertight security proofs need to be addressed to increase trust in QKD. System interoperability with existing infrastructures and applications as well as conformance with specific user requirements have to be assured. Finding common solutions to these problems involving all actors can provide an advantage for the commercialization of QKD as well as for further technological development. The ETSI industry specification group for QKD (ISG-QKD) offers a forum for creating such universally accepted standards and will promote significant leverage effects on coordination, cooperation and convergence in research, technical development and business application of QKD.
NASA Astrophysics Data System (ADS)
Jimenez, Edward S.; Thompson, Kyle R.; Stohn, Adriana; Goodner, Ryan N.
2017-09-01
Sandia National Laboratories has recently developed the capability to acquire multi-channel radio- graphs for multiple research and development applications in industry and security. This capability allows for the acquisition of x-ray radiographs or sinogram data to be acquired at up to 300 keV with up to 128 channels per pixel. This work will investigate whether multiple quality metrics for computed tomography can actually benefit from binned projection data compared to traditionally acquired grayscale sinogram data. Features and metrics to be evaluated include the ability to dis- tinguish between two different materials with similar absorption properties, artifact reduction, and signal-to-noise for both raw data and reconstructed volumetric data. The impact of this technology to non-destructive evaluation, national security, and industry is wide-ranging and has to potential to improve upon many inspection methods such as dual-energy methods, material identification, object segmentation, and computer vision on radiographs.
26 CFR 1.165-5 - Worthless securities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 26 Internal Revenue 2 2014-04-01 2014-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...
26 CFR 1.165-5 - Worthless securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...
26 CFR 1.165-5 - Worthless securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 26 Internal Revenue 2 2011-04-01 2011-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...
26 CFR 1.165-5 - Worthless securities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 26 Internal Revenue 2 2013-04-01 2013-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...
Quandt, Sara A.; Grzywacz, Joseph G.; Trejo, Grisel; Arcury, Thomas A.
2014-01-01
Obesity and overweight are significant problems for children in the US, particularly for Hispanic children. This paper focuses on the children in families of immigrant Hispanic farmworkers, as farm work is the portal though which many immigrants come to the US. This paper (1) describes a model of the nutritional strategies of child feeding in farmworker families; and (2) uses this model to identify leverage points for efforts to improve the nutritional status of these children. In-depth interviews were conducted in Spanish with 33 mothers of 2–5 year old children in farmworker families recruited in North Carolina in 2010–2011. The purposive sample was balanced by farmworker status (migrant or seasonal), child age, and child gender. Interviews were transcribed and translated. Multiple coders and a team approach to analysis were used. Nutritional strategies centered on domains of procuring food, using food, and maintaining food security. The content of these domains reflected environmental factors (e.g., rural isolation, shared housing), contextual factors (e.g., beliefs about appropriate food, parenting style), and available resources (e.g., income, government programs). Environmental isolation and limited access to resources decrease the amount and diversity of household food supplies. Parental actions (parental sacrifices, reduced dietary variety) attempt to buffer children. Use of government food sources is valuable for eligible families. Leverage points are suggested that would change nutritional strategy components and lower the risk of overweight and obesity. Further prospective research is needed to verify the nutritional strategy identified and to test the ability of leverage points to prevent childhood obesity in this vulnerable population. PMID:25462607
Ozmen, Ozgur; Yilmaz, Levent; Smith, Jeffrey
2016-02-09
Emerging cyber-infrastructure tools are enabling scientists to transparently co-develop, share, and communicate about real-time diverse forms of knowledge artifacts. In these environments, communication preferences of scientists are posited as an important factor affecting innovation capacity and robustness of social and knowledge network structures. Scientific knowledge creation in such communities is called global participatory science (GPS). Recently, using agent-based modeling and collective action theory as a basis, a complex adaptive social communication network model (CollectiveInnoSim) is implemented. This work leverages CollectiveInnoSim implementing communication preferences of scientists. Social network metrics and knowledge production patterns are used as proxy metrics to infer innovationmore » potential of emergent knowledge and collaboration networks. The objective is to present the underlying communication dynamics of GPS in a form of computational model and delineate the impacts of various communication preferences of scientists on innovation potential of the collaboration network. Ultimately, the insight gained can help policy-makers to design GPS environments and promote innovation.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ozmen, Ozgur; Yilmaz, Levent; Smith, Jeffrey
Emerging cyber-infrastructure tools are enabling scientists to transparently co-develop, share, and communicate about real-time diverse forms of knowledge artifacts. In these environments, communication preferences of scientists are posited as an important factor affecting innovation capacity and robustness of social and knowledge network structures. Scientific knowledge creation in such communities is called global participatory science (GPS). Recently, using agent-based modeling and collective action theory as a basis, a complex adaptive social communication network model (CollectiveInnoSim) is implemented. This work leverages CollectiveInnoSim implementing communication preferences of scientists. Social network metrics and knowledge production patterns are used as proxy metrics to infer innovationmore » potential of emergent knowledge and collaboration networks. The objective is to present the underlying communication dynamics of GPS in a form of computational model and delineate the impacts of various communication preferences of scientists on innovation potential of the collaboration network. Ultimately, the insight gained can help policy-makers to design GPS environments and promote innovation.« less
The Modern Research Data Portal: A Design Pattern for Networked, Data-Intensive Science
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chard, Kyle; Dart, Eli; Foster, Ian
Here we describe best practices for providing convenient, high-speed, secure access to large data via research data portals. We capture these best practices in a new design pattern, the Modern Research Data Portal, that disaggregates the traditional monolithic web-based data portal to achieve orders-of-magnitude increases in data transfer performance, support new deployment architectures that decouple control logic from data storage, and reduce development and operations costs. We introduce the design pattern; explain how it leverages high-performance Science DMZs and cloud-based data management services; review representative examples at research laboratories and universities, including both experimental facilities and supercomputer sites; describe howmore » to leverage Python APIs for authentication, authorization, data transfer, and data sharing; and use coding examples to demonstrate how these APIs can be used to implement a range of research data portal capabilities. Sample code at a companion web site, https://docs.globus.org/mrdp, provides application skeletons that readers can adapt to realize their own research data portals.« less
The Modern Research Data Portal: a design pattern for networked, data-intensive science
Chard, Kyle; Dart, Eli; Foster, Ian; ...
2018-01-15
We describe best practices for providing convenient, high-speed, secure access to large data via research data portals. Here, we capture these best practices in a new design pattern, the Modern Research Data Portal, that disaggregates the traditional monolithic web-based data portal to achieve orders-of-magnitude increases in data transfer performance, support new deployment architectures that decouple control logic from data storage, and reduce development and operations costs. We introduce the design pattern; explain how it leverages high-performance data enclaves and cloud-based data management services; review representative examples at research laboratories and universities, including both experimental facilities and supercomputer sites; describe howmore » to leverage Python APIs for authentication, authorization, data transfer, and data sharing; and use coding examples to demonstrate how these APIs can be used to implement a range of research data portal capabilities. Sample code at a companion web site,https://docs.globus.org/mrdp, provides application skeletons that readers can adapt to realize their own research data portals.« less
The Modern Research Data Portal: a design pattern for networked, data-intensive science
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chard, Kyle; Dart, Eli; Foster, Ian
We describe best practices for providing convenient, high-speed, secure access to large data via research data portals. Here, we capture these best practices in a new design pattern, the Modern Research Data Portal, that disaggregates the traditional monolithic web-based data portal to achieve orders-of-magnitude increases in data transfer performance, support new deployment architectures that decouple control logic from data storage, and reduce development and operations costs. We introduce the design pattern; explain how it leverages high-performance data enclaves and cloud-based data management services; review representative examples at research laboratories and universities, including both experimental facilities and supercomputer sites; describe howmore » to leverage Python APIs for authentication, authorization, data transfer, and data sharing; and use coding examples to demonstrate how these APIs can be used to implement a range of research data portal capabilities. Sample code at a companion web site,https://docs.globus.org/mrdp, provides application skeletons that readers can adapt to realize their own research data portals.« less
Lorden, Andrea L; Radcliff, Tiffany A; Jiang, Luohua; Horel, Scott A; Smith, Matthew L; Lorig, Kate; Howell, Benjamin L; Whitelaw, Nancy; Ory, Marcia
2016-06-01
In community-based wellness programs, Social Security Numbers (SSNs) are rarely collected to encourage participation and protect participant privacy. One measure of program effectiveness includes changes in health care utilization. For the 65 and over population, health care utilization is captured in Medicare administrative claims data. Therefore, methods as described in this article for linking participant information to administrative data are useful for program evaluations where unique identifiers such as SSN are not available. Following fuzzy matching methodologies, participant information from the National Study of the Chronic Disease Self-Management Program was linked to Medicare administrative data. Linking variables included participant name, date of birth, gender, address, and ZIP code. Seventy-eight percent of participants were linked to their Medicare claims data. Linking program participant information to Medicare administrative data where unique identifiers are not available provides researchers with the ability to leverage claims data to better understand program effects. © The Author(s) 2014.
FACE-IT. A Science Gateway for Food Security Research
DOE Office of Scientific and Technical Information (OSTI.GOV)
Montella, Raffaele; Kelly, David; Xiong, Wei
Progress in sustainability science is hindered by challenges in creating and managing complex data acquisition, processing, simulation, post-processing, and intercomparison pipelines. To address these challenges, we developed the Framework to Advance Climate, Economic, and Impact Investigations with Information Technology (FACE-IT) for crop and climate impact assessments. This integrated data processing and simulation framework enables data ingest from geospatial archives; data regridding, aggregation, and other processing prior to simulation; large-scale climate impact simulations with agricultural and other models, leveraging high-performance and cloud computing; and post-processing to produce aggregated yields and ensemble variables needed for statistics, for model intercomparison, and to connectmore » biophysical models to global and regional economic models. FACE-IT leverages the capabilities of the Globus Galaxies platform to enable the capture of workflows and outputs in well-defined, reusable, and comparable forms. We describe FACE-IT and applications within the Agricultural Model Intercomparison and Improvement Project and the Center for Robust Decision-making on Climate and Energy Policy.« less
77 FR 20281 - Designation of Product Categories for Federal Procurement
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-04
... Security and Rural Investment Act of 2002, as amended by the Food, Conservation, and Energy Act of 2008.... Information regarding the Federal biobased preferred procurement program (one part of the BioPreferred Program... of 2002 (FSRIA), as amended by the Food, Conservation, and Energy Act of 2008 (FCEA), 7 U.S.C. 8102...
ERIC Educational Resources Information Center
Aman, Mohammed; Sitotaw, Melese
2014-01-01
Meeting the needs of employers and equipping graduates with employability skills are considered as among the shared responsibilities of Universities and different organizations. This study intends to assess the perception of summer cooperative graduates on their employers' preference for generic skills to secure employment, based on their…
US public perspectives on security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Herron, Kerry Gale; Jenkins-Smith, Hank C.; Silva, Carol L.
2012-02-01
We report findings from a national Internet survey and a subset of questions administered by telephone in mid-2011 on public assessments of contemporary and emerging interstate nuclear threats, support for strategic arms control, and preferences for responding to limited nuclear attacks on the United States. Additionally, we analyze public views of the threat of terrorism, including cyber attacks, assessments of progress in the struggle against terrorism, and preferences for responding to an act of radiological terrorism against the United States. Also, we report findings from an Internet survey and a subset of questions administered by telephone among the American publicmore » in mid-2011 on US energy and environmental security. Key areas of investigation include public views on energy requirements, preferences for energy sources, energy conservation versus development, energy independence, implications of events at Fukushima, Japan, for US public support of nuclear generation, preferences for managing used nuclear fuel, and trust in nuclear risk assessments from government and other public sources. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.« less
Abdulrahman, Mahera; Makki, Maryam; Shaaban, Sami; Al Shamsi, Maryam; Venkatramana, Manda; Sulaiman, Nabil; Sami, Manal M; Abdelmannan, Dima K; Salih, AbdulJabbar M A; AlShaer, Laila
2016-01-01
Workforce planning is critical for being able to deliver appropriate health service and thus is relevant to medical education. It is, therefore, important to understand medical students' future specialty choices and the factors that influence them. This study was conducted to identify, explore, and analyze the factors influencing specialty preferences among medical students of the United Arab Emirates (UAE). A multiyear, multicenter survey of medical student career choice was conducted with all five UAE medical schools. The questionnaire consisted of five sections. Chi-squared tests, regression analysis, and stepwise logistic regression were performed. The overall response rate was 46% (956/2079). Factors that students reported to be extremely important when considering their future career preferences were intellectual satisfaction (87%), work-life balance (71%), having the required talent (70%), and having a stable and secure future (69%). The majority of students (60%) preferred internal medicine, surgery, emergency medicine, or family Medicine. The most common reason given for choosing a particular specialty was personal interest (21%), followed by flexibility of working hours (17%). The data show that a variety of factors inspires medical students in the UAE in their choice of a future medical specialty. These factors can be used by health policymakers, university mentors, and directors of residency training programs to motivate students to choose specialties that are scarce in the UAE and therefore better serve the health-care system and the national community.
2014-01-01
Background This study aimed to examine whether a mismatch between a woman’s preferred and actual mode of delivery increases the risk of post-traumatic stress symptoms after childbirth. Methods The study sample consisted of 1,700 women scheduled to give birth between 2009 and 2010 at Akershus University Hospital, Norway. Questionnaire data from pregnancy weeks 17 and 32 and from 8 weeks postpartum were used along with data obtained from hospital birth records. Post-traumatic stress symptoms were measured with the Impact of Event Scale. Based on the women’s preferred and actual mode of delivery, four groups were established: Match 1 (no preference for cesarean section, no elective cesarean section, N = 1,493); Match 2 (preference for cesarean section, elective cesarean section, N = 53); Mismatch 1 (no preference for cesarean section, elective cesarean section, N = 42); and Mismatch 2 (preference for cesarean section, no elective cesarean section, N = 112). Analysis of variance (ANOVA) and analysis of covariance (ANCOVA) were conducted to examine whether the level of post-traumatic stress symptoms differed significantly among these four groups. Results Examining differences for all four groups, ANOVA yielded significant overall group differences (F = 11.96, p < 0.001). However, Bonferroni post-hoc tests found significantly higher levels of post-traumatic stress symptoms only in Mismatch 2 compared to Match 1. This difference could be partly explained by a number of risk factors, particularly psychological risk factors such as fear of childbirth, depression, and anxiety. Conclusions The results suggest increased post-traumatic stress symptoms in women who preferred delivery by cesarean section but delivered vaginally compared to women who both preferred vaginal delivery and delivered vaginally. In psychologically vulnerable women, such mismatch may threaten their physical integrity and, in turn, result in post-traumatic stress symptoms. These women, who often fear childbirth, may prefer a cesarean section even though vaginal delivery is usually the best option in the absence of medical indications. To avoid potential trauma, fear of childbirth and maternal requests for a cesarean section should be taken seriously and responded to adequately. PMID:24898436
Garthus-Niegel, Susan; von Soest, Tilmann; Knoph, Cecilie; Simonsen, Tone Breines; Torgersen, Leila; Eberhard-Gran, Malin
2014-06-05
This study aimed to examine whether a mismatch between a woman's preferred and actual mode of delivery increases the risk of post-traumatic stress symptoms after childbirth. The study sample consisted of 1,700 women scheduled to give birth between 2009 and 2010 at Akershus University Hospital, Norway. Questionnaire data from pregnancy weeks 17 and 32 and from 8 weeks postpartum were used along with data obtained from hospital birth records. Post-traumatic stress symptoms were measured with the Impact of Event Scale. Based on the women's preferred and actual mode of delivery, four groups were established: Match 1 (no preference for cesarean section, no elective cesarean section, N = 1,493); Match 2 (preference for cesarean section, elective cesarean section, N = 53); Mismatch 1 (no preference for cesarean section, elective cesarean section, N = 42); and Mismatch 2 (preference for cesarean section, no elective cesarean section, N = 112). Analysis of variance (ANOVA) and analysis of covariance (ANCOVA) were conducted to examine whether the level of post-traumatic stress symptoms differed significantly among these four groups. Examining differences for all four groups, ANOVA yielded significant overall group differences (F = 11.96, p < 0.001). However, Bonferroni post-hoc tests found significantly higher levels of post-traumatic stress symptoms only in Mismatch 2 compared to Match 1. This difference could be partly explained by a number of risk factors, particularly psychological risk factors such as fear of childbirth, depression, and anxiety. The results suggest increased post-traumatic stress symptoms in women who preferred delivery by cesarean section but delivered vaginally compared to women who both preferred vaginal delivery and delivered vaginally. In psychologically vulnerable women, such mismatch may threaten their physical integrity and, in turn, result in post-traumatic stress symptoms. These women, who often fear childbirth, may prefer a cesarean section even though vaginal delivery is usually the best option in the absence of medical indications. To avoid potential trauma, fear of childbirth and maternal requests for a cesarean section should be taken seriously and responded to adequately.
BALKANS SECURITY. Current and Projected Factors Affecting Regional Stability
2000-04-01
Security Briefing Section II Current Situation in Kosovo and Bosnia primary responsibility for public security in Kosovo. 6 According to a senior KFOR...Integrity * Reliability GAO/NSIAD-00-125BR „.c-miBUTION STATEMENT A ApSwed for Public Release Contents Letter Briefing Section Appendixes Tables...Figures Briefing Section I: Background Briefing Section II: Current Situation in Kosovo and Bosnia Briefing Section III: Projected Security Situation
Leveraging electronic health records for clinical research.
Raman, Sudha R; Curtis, Lesley H; Temple, Robert; Andersson, Tomas; Ezekowitz, Justin; Ford, Ian; James, Stefan; Marsolo, Keith; Mirhaji, Parsa; Rocca, Mitra; Rothman, Russell L; Sethuraman, Barathi; Stockbridge, Norman; Terry, Sharon; Wasserman, Scott M; Peterson, Eric D; Hernandez, Adrian F
2018-04-30
Electronic health records (EHRs) can be a major tool in the quest to decrease costs and timelines of clinical trial research, generate better evidence for clinical decision making, and advance health care. Over the past decade, EHRs have increasingly offered opportunities to speed up, streamline, and enhance clinical research. EHRs offer a wide range of possible uses in clinical trials, including assisting with prestudy feasibility assessment, patient recruitment, and data capture in care delivery. To fully appreciate these opportunities, health care stakeholders must come together to face critical challenges in leveraging EHR data, including data quality/completeness, information security, stakeholder engagement, and increasing the scale of research infrastructure and related governance. Leaders from academia, government, industry, and professional societies representing patient, provider, researcher, industry, and regulator perspectives convened the Leveraging EHR for Clinical Research Now! Think Tank in Washington, DC (February 18-19, 2016), to identify barriers to using EHRs in clinical research and to generate potential solutions. Think tank members identified a broad range of issues surrounding the use of EHRs in research and proposed a variety of solutions. Recognizing the challenges, the participants identified the urgent need to look more deeply at previous efforts to use these data, share lessons learned, and develop a multidisciplinary agenda for best practices for using EHRs in clinical research. We report the proceedings from this think tank meeting in the following paper. Copyright © 2018 Elsevier, Inc. All rights reserved.
7 CFR 1467.9 - Wetlands Reserve Enhancement Program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... purpose of WREP is to target and leverage resources to address high priority wetlands protection...) Section 1467.8(a)(3)(i) is adjusted to reduce the fair market value of the land by an amount equal to the... Practices appraisal or a market survey; and (ii) Section 1467.8(a)(3)(ii) is adjusted to reduce the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-22
... customer bases of potential product users have indicated a preference that premium pricing for Mini Options... market participants clarity as to the minimum pricing increments for Mini Options, the filing would harmonize penny pricing between Mini Options and standard options on the same security. \\4\\ See Securities...
7 CFR 765.303 - Use of proceeds from chattel security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... fed to the borrower's livestock, if this is preferable to marketing, provided the Agency obtains a lien or assignment on the livestock, and livestock products, at least equal to the lien on the crops...) Security may be consumed as follows: (i) Livestock may be used by the borrower's family for subsistence...
ERIC Educational Resources Information Center
Stalker, Joshua Dylan
2012-01-01
The protection of proprietary information that users print from their information systems is a significant and relevant concern in the field of information security to both researchers and practitioners. Information security researchers have repeatedly indicated that human behaviors and perception are important factors influencing the information…
Doctors' experience with handheld computers in clinical practice: qualitative study
McAlearney, Ann Scheck; Schweikhart, Sharon B; Medow, Mitchell A
2004-01-01
Objective To examine doctors' perspectives about their experiences with handheld computers in clinical practice. Design Qualitative study of eight focus groups consisting of doctors with diverse training and practice patterns. Setting Six practice settings across the United States and two additional focus group sessions held at a national meeting of general internists. Participants 54 doctors who did or did not use handheld computers. Results Doctors who used handheld computers in clinical practice seemed generally satisfied with them and reported diverse patterns of use. Users perceived that the devices helped them increase productivity and improve patient care. Barriers to use concerned the device itself and personal and perceptual constraints, with perceptual factors such as comfort with technology, preference for paper, and the impression that the devices are not easy to use somewhat difficult to overcome. Participants suggested that organisations can help promote handheld computers by providing advice on purchase, usage, training, and user support. Participants expressed concern about reliability and security of the device but were particularly concerned about dependency on the device and over-reliance as a substitute for clinical thinking. Conclusions Doctors expect handheld computers to become more useful, and most seem interested in leveraging (getting the most value from) their use. Key opportunities with handheld computers included their use as a stepping stone to build doctors' comfort with other information technology and ehealth initiatives and providing point of care support that helps improve patient care. PMID:15142920
24 CFR 886.329a - Preferences for occupancy by elderly families.
Code of Federal Regulations, 2011 CFR
2011-04-01
... elderly families. 886.329a Section 886.329a Housing and Urban Development REGULATIONS RELATING TO HOUSING... DIRECT LOAN PROGRAM, SECTION 202 SUPPORTIVE HOUSING FOR THE ELDERLY PROGRAM AND SECTION 811 SUPPORTIVE... Preferences for occupancy by elderly families. (a) Election of preference for occupancy by elderly families—(1...
Network-Centric Quantum Communications
NASA Astrophysics Data System (ADS)
Hughes, Richard
2014-03-01
Single-photon quantum communications (QC) offers ``future-proof'' cryptographic security rooted in the laws of physics. Today's quantum-secured communications cannot be compromised by unanticipated future technological advances. But to date, QC has only existed in point-to-point instantiations that have limited ability to address the cyber security challenges of our increasingly networked world. In my talk I will describe a fundamentally new paradigm of network-centric quantum communications (NQC) that leverages the network to bring scalable, QC-based security to user groups that may have no direct user-to-user QC connectivity. With QC links only between each of N users and a trusted network node, NQC brings quantum security to N2 user pairs, and to multi-user groups. I will describe a novel integrated photonics quantum smartcard (``QKarD'') and its operation in a multi-node NQC test bed. The QKarDs are used to implement the quantum cryptographic protocols of quantum identification, quantum key distribution and quantum secret splitting. I will explain how these cryptographic primitives are used to provide key management for encryption, authentication, and non-repudiation for user-to-user communications. My talk will conclude with a description of a recent demonstration that QC can meet both the security and quality-of-service (latency) requirements for electric grid control commands and data. These requirements cannot be met simultaneously with present-day cryptography.
Water security - Nation state and international security implications
Tindall, James A.; Andrew A. Campbell,
2009-01-01
A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.
Code of Federal Regulations, 2011 CFR
2011-04-01
... securities of power supply companies from section 9(a)(2) of the Act. 250.14 Section 250.14 Commodity and... of securities of power supply companies from section 9(a)(2) of the Act. (a) An electric utility... exempt from section 9(a)(2) of the Act with respect to the acquisition of any security of a power supply...
Code of Federal Regulations, 2010 CFR
2010-04-01
... securities of power supply companies from section 9(a)(2) of the Act. 250.14 Section 250.14 Commodity and... of securities of power supply companies from section 9(a)(2) of the Act. (a) An electric utility... exempt from section 9(a)(2) of the Act with respect to the acquisition of any security of a power supply...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-09
... marketing fees.\\3\\ The increased order flow provided by these Directed Orders benefits Exchange market... Schedule to allow PMMs to access marketing fees generated from Preferred Orders (its equivalent of Directed... (``Preferred Market-Maker'' or ``PMM'') on an order sent to CBOE.\\6\\ CBOE allows the PMM to collect marketing...
24 CFR 891.435 - Security deposits.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Security deposits. 891.435 Section... Security deposits. This section shall apply to capital advances under the Section 202 Program and the... subpart E of this part, the requirements in § 891.635 also apply. (a) Collection of security deposits. At...
Tarroja, Brian; AghaKouchak, Amir; Sobhani, Reza; Feldman, David; Jiang, Sunny; Samuelsen, Scott
2014-11-01
The technical potential and effectiveness of different water supply options for securing water availability in a large-scale, interconnected water supply system under historical and climate-change augmented inflow and demand conditions were compared. Part 1 of the study focused on determining the scale of the options required to secure water availability and compared the effectiveness of different options. A spatially and temporally resolved model of California's major surface reservoirs was developed, and its sensitivity to urban water conservation, desalination, and water reuse was examined. Potential capacities of the different options were determined. Under historical (baseline) hydrology conditions, many individual options were found to be capable of securing water availability alone. Under climate change augment conditions, a portfolio approach was necessary. The water savings from many individual options other than desalination were insufficient in the latter, however, relying on seawater desalination alone requires extreme capacity installations which have energy, brine disposal, management, and cost implications. The importance of identifying and utilizing points of leverage in the system for choosing where to deploy different options is also demonstrated. Copyright © 2014 Elsevier B.V. All rights reserved.
Code of Federal Regulations, 2011 CFR
2011-04-01
... admitted to unlisted trading privileges from sections 13, 14 and 16. 240.12f-4 Section 240.12f-4 Commodity... Trading § 240.12f-4 Exemption of securities admitted to unlisted trading privileges from sections 13, 14 and 16. (a) Any security for which unlisted trading privileges on any national securities exchange...
Code of Federal Regulations, 2013 CFR
2013-04-01
... admitted to unlisted trading privileges from sections 13, 14 and 16. 240.12f-4 Section 240.12f-4 Commodity... Trading § 240.12f-4 Exemption of securities admitted to unlisted trading privileges from sections 13, 14 and 16. (a) Any security for which unlisted trading privileges on any national securities exchange...
Code of Federal Regulations, 2012 CFR
2012-04-01
... admitted to unlisted trading privileges from sections 13, 14 and 16. 240.12f-4 Section 240.12f-4 Commodity... Trading § 240.12f-4 Exemption of securities admitted to unlisted trading privileges from sections 13, 14 and 16. (a) Any security for which unlisted trading privileges on any national securities exchange...
Code of Federal Regulations, 2010 CFR
2010-04-01
... admitted to unlisted trading privileges from sections 13, 14 and 16. 240.12f-4 Section 240.12f-4 Commodity... Trading § 240.12f-4 Exemption of securities admitted to unlisted trading privileges from sections 13, 14 and 16. (a) Any security for which unlisted trading privileges on any national securities exchange...
17 CFR 260.11b-4 - Definition of “cash transaction” in section 311(b)(4).
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Definition of âcash transactionâ in section 311(b)(4). 260.11b-4 Section 260.11b-4 Commodity and Securities Exchanges SECURITIES... securities sold is made within 7 days after delivery of the goods or securities in currency or in checks or...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Booker, Paul M.; Maple, Scott A.
2010-06-08
Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a causemore » add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance to smuggling activities after training or technology is deployed at a given location. This paper will present an approach to holistic border security information analysis.« less
Simulation Data Management - Requirements and Design Specification
DOE Office of Scientific and Technical Information (OSTI.GOV)
Clay, Robert L.; Friedman-Hill, Ernest J.; Gibson, Marcus J.
Simulation Data Management (SDM), the ability to securely organize, archive, and share analysis models and the artifacts used to create them, is a fundamental requirement for modern engineering analysis based on computational simulation. We have worked separately to provide secure, network SDM services to engineers and scientists at our respective laboratories for over a decade. We propose to leverage our experience and lessons learned to help develop and deploy a next-generation SDM service as part of a multi-laboratory team. This service will be portable across multiple sites and platforms, and will be accessible via a range of command-line tools andmore » well-documented APIs. In this document, we’ll review our high-level and low-level requirements for such a system, review one existing system, and briefly discuss our proposed implementation.« less
On a simulation study for reliable and secured smart grid communications
NASA Astrophysics Data System (ADS)
Mallapuram, Sriharsha; Moulema, Paul; Yu, Wei
2015-05-01
Demand response is one of key smart grid applications that aims to reduce power generation at peak hours and maintain a balance between supply and demand. With the support of communication networks, energy consumers can become active actors in the energy management process by adjusting or rescheduling their electricity usage during peak hours based on utilities pricing incentives. Nonetheless, the integration of communication networks expose the smart grid to cyber-attacks. In this paper, we developed a smart grid simulation test-bed and designed evaluation scenarios. By leveraging the capabilities of Matlab and ns-3 simulation tools, we conducted a simulation study to evaluate the impact of cyber-attacks on demand response application. Our data shows that cyber-attacks could seriously disrupt smart grid operations, thus confirming the need of secure and resilient communication networks for supporting smart grid operations.
17 CFR 403.2 - Hypothecation of customer securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Hypothecation of customer securities. 403.2 Section 403.2 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 PROTECTION OF CUSTOMER SECURITIES AND BALANCES...
24 CFR 880.612a - Preference for occupancy by elderly families.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 24 Housing and Urban Development 4 2011-04-01 2011-04-01 false Preference for occupancy by elderly... PROGRAM, SECTION 202 SUPPORTIVE HOUSING FOR THE ELDERLY PROGRAM AND SECTION 811 SUPPORTIVE HOUSING FOR... Management § 880.612a Preference for occupancy by elderly families. (a) Election of preference for occupancy...
24 CFR 884.223a - Preference for occupancy by elderly families.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 24 Housing and Urban Development 4 2011-04-01 2011-04-01 false Preference for occupancy by elderly... PROGRAM, SECTION 202 SUPPORTIVE HOUSING FOR THE ELDERLY PROGRAM AND SECTION 811 SUPPORTIVE HOUSING FOR... Preference for occupancy by elderly families. (a) Election of preference for occupancy by elderly families—(1...
Code of Federal Regulations, 2011 CFR
2011-01-01
... certain derivative third and sixth preference and nonpreference immigrants. 212.9 Section 212.9 Aliens and... certain derivative third and sixth preference and nonpreference immigrants. A derivative beneficiary who... medical profession. Therefore, a derivative third or sixth preference or nonpreference immigrant under...
Dykstra, Holly; Davey, Adam; Fisher, Jennifer O; Polonsky, Heather; Sherman, Sandra; Abel, Michelle L; Dale, Lauren C; Foster, Gary D; Bauer, Katherine W
2016-03-01
Universal access to the School Breakfast Program (SBP) is intended to help low-income and food-insecure students overcome barriers to eating breakfast. However, SBP participation is often still low despite universal access. Further information is needed with regard to these children's breakfast behaviors, and in particular breakfast behaviors among youth from food-insecure families, to inform effective breakfast interventions. The objective of this study was to examine breakfast behaviors among a large sample of urban students with universal access to the SBP and to identify differences in breakfast behaviors among children from food-secure compared with food-insecure households. A cross-sectional study of 821 fourth- through sixth-grade students and their parents from 16 schools was conducted. Students reported the foods/drinks selected and location of obtaining food/drink on the morning of data collection, parents reported household food security status using the 6-item Food Security Survey Module, and the school district provided SBP participation data during the fall semester of 2013. Multivariable linear regression models accounting for school-level clustering were used to examine differences in breakfast behaviors across 3 levels of household food security: food secure, low food secure, and very low food secure. Students participated in the SBP 31.2% of possible days, with 13% never participating in the SBP. One-fifth (19.4%) of students purchased something from a corner store for breakfast, and 16.9% skipped breakfast. Forty-six percent of students were food insecure; few differences in breakfast behaviors were observed across levels of food security. Despite universal access to the SBP, participation in the SBP is low. Breakfast skipping and selection of foods of low nutritional quality in the morning are common, regardless of household food security status. Additional novel implementation of the SBP and addressing students' breakfast preferences may be necessary to further reduce barriers to students obtaining a free, healthful breakfast. This trial was registered at clinicaltrials.gov as NCT01924130. © 2016 American Society for Nutrition.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-24
...). These revisions would implement certain provisions under the Medicare Improvements for Patients and... with the Social Security Act. The comment period for the proposed rule, which would have ended on June... Stop C4-26-05, 7500 Security Boulevard, Baltimore, MD 21244-1850. 4. By hand or courier. If you prefer...
Unified Facilities Criteria (UFC) Design Guide. Army Reserve Facilities
2010-02-01
Laser ...Including Change 3, 1 February 2010 42 use. 3-2.3.1.8 Provide painted striping in POV and MEP areas, and elsewhere as needed. 3-2.3.2 Curb and Gutter...have to meet physical security requirements for security fencing. Most Tenants prefer that fences are located in a strip of rock mulch or
Carder, Paula; Luhr, Gretchen; Kohon, Jacklyn
2016-01-01
Affordable housing is an important form of income security for low-income older persons. This article describes characteristics of older persons waitlisted for either public housing or a housing choice voucher (HCV; previously Section 8) in Portland, Oregon. 358 persons (32% response rate) completed a mailed survey with questions about demographics, health and housing status, food insecurity, and preference for housing with services. Findings indicate that many waitlisted older persons experienced homelessness or housing instability, poor health, high hospital use, and food insecurity. Public housing applicants were significantly more likely to report lower incomes, homelessness, and food insecurity than HCV applicants. We conclude with policy implications for housing and health agencies that serve low-income older persons.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wertsching, Alan Kevin; Trantor, Troy Joseph; Ebner, Matthias Anthony
A method and device for producing secure, high-density tritium bonded with carbon. A substrate comprising carbon is provided. A precursor is intercalated between carbon in the substrate. The precursor intercalated in the substrate is irradiated until at least a portion of the precursor, preferably a majority of the precursor, is transmutated into tritium and bonds with carbon of the substrate forming bonded tritium. The resulting bonded tritium, tritium bonded with carbon, produces electrons via beta decay. The substrate is preferably a substrate from the list of substrates consisting of highly-ordered pyrolytic graphite, carbon fibers, carbon nanotunes, buckministerfullerenes, and combinations thereof.more » The precursor is preferably boron-10, more preferably lithium-6. Preferably, thermal neutrons are used to irradiate the precursor. The resulting bonded tritium is preferably used to generate electricity either directly or indirectly.« less
Pierce, Karen; Marinero, Steven; Hazin, Roxana; McKenna, Benjamin; Barnes, Cynthia Carter; Malige, Ajith
2015-01-01
Background Clinically and biologically, ASD is heterogeneous. Unusual patterns of visual preference as indexed by eye-tracking are hallmarks, yet whether they can be used to define an early biomarker of ASD as a whole, or leveraged to define a subtype is unclear. To begin to examine this issue, large cohorts are required. Methods A sample of 334 toddlers from 6 distinct groups (115 ASD, 20 ASD-Features, 57 DD, 53 Other, 64 TD, and 25 Typ SIB) participated. Toddlers watched a movie containing both geometric and social images. Fixation duration and number of saccades within each AOI and validation statistics for this independent sample computed. Next, to maximize power, data from our previous study (N=110) was added totaling 444 subjects. A subset of toddlers repeated the eye-tracking procedure. Results As in the original study, a subset of toddlers with ASD fixated on geometric images greater than 69%. Using this cutoff, sensitivity for ASD was 21%, specificity 98%, and PPV 86%. Toddlers with ASD who strongly preferred geometric images had (a) worse cognitive, language, and social skills relative to toddlers with ASD who strongly preferred social images and (b) fewer saccades when viewing geometric images. Unaffected siblings of ASD probands did not show evidence of heightened preference for geometric images. Test-retest reliability was good. Examination of age effects suggest that this test may not be appropriate with children > 4 years. Conclusions Enhanced visual preference for geometric repetition may be an early developmental biomarker of an ASD subtype with more severe symptoms. PMID:25981170
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-13
...In accordance with section 712(a)(8), section 712(d)(1), sections 712(d)(2)(B) and (C), sections 721(b) and (c), and section 761(b) of the Dodd-Frank Wall Street Reform and Consumer Protection Act (``Dodd-Frank Act''), the Commodity Futures Trading Commission (``CFTC'') and the Securities and Exchange Commission (``SEC'') (collectively, ``Commissions''), in consultation with the Board of Governors of the Federal Reserve System (``Board''), are jointly adopting new rules and interpretations under the Commodity Exchange Act (``CEA'') and the Securities Exchange Act of 1934 (``Exchange Act'') to further define the terms ``swap,'' ``security-based swap,'' and ``security-based swap agreement'' (collectively, ``Product Definitions''); regarding ``mixed swaps;'' and governing books and records with respect to ``security-based swap agreements.'' The CFTC requests comment on its interpretation concerning forwards with embedded volumetric optionality, contained in Section II.B.2.(b)(ii) of this release.
Adverse Selection and Inertia in Health Insurance Markets: When Nudging Hurts.
Handel, Benjamin R
2013-12-01
This paper investigates consumer inertia in health insurance markets, where adverse selection is a potential concern. We leverage a major change to insurance provision that occurred at a large firm to identify substantial inertia, and develop and estimate a choice model that also quantifies risk preferences and ex ante health risk. We use these estimates to study the impact of policies that nudge consumers toward better decisions by reducing inertia. When aggregated, these improved individual-level choices substantially exacerbate adverse selection in our setting, leading to an overall reduction in welfare that doubles the existing welfare loss from adverse selection.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in paragraph (b) of this section and must submit the security plan as part of its REAL ID certification under § 37...
17 CFR 240.16c-4 - Derivative securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Derivative securities. 240.16c-4 Section 240.16c-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED... Exchange Act of 1934 Exemption of Certain Transactions from Section 16(c) § 240.16c-4 Derivative securities...
Neller, Daniel J; Vitacco, Michael J; Magaletta, Philip R; Phillips-Boyles, A Brooke
2016-03-01
Research supports the effectiveness of the Risk-Needs-Responsivity model for reducing criminal recidivism. Yet programming interests of inmates--one facet of responsivity--remain an understudied phenomenon. In the present study, we explored the programming interests of 753 federal inmates housed across three levels of security. Results suggest that inmates, as a group, prefer specific programs over others, and that some of their interests may differ by security level. We discuss possible implications of these findings. © The Author(s) 2014.
Mazzoni, Agustina; Althabe, Fernando; Gutierrez, Laura; Gibbons, Luz; Liu, Nancy H; Bonotti, Ana María; Izbizky, Gustavo H; Ferrary, Marta; Viergue, Nora; Vigil, Silvia I; Zalazar Denett, Gabriela; Belizán, José M
2016-02-08
Rates of caesarean section have steadily increased in most middle- and high-income countries over the last few decades without medical justification. Maternal request is one of the frequently cited non-medical factors contributing to this trend. The objectives of this study were to assess pregnant women's preferences regarding mode of delivery and to compare actual caesarean section rates in the public and private sectors. A prospective cohort study was conducted in two public and three private hospitals in Buenos Aires, Argentina. 382 nulliparous pregnant women (183 from the private sector and 199 from the public sector) aged 18 to 35 years, with single pregnancies over 32 weeks of gestational age were enrolled during antenatal care visits between October 2010 and September 2011. We excluded women with pregnancies resulting from assisted fertility, women with known pre-existing major diseases or, with pregnancy complications, or with a medical indication of elective cesarean section. We used two different approaches to assess women's preferences: a survey using a tailored questionnaire, and a discrete choice experiment. Only 8 and 6% of the healthy nulliparous women in the public and private sectors, respectively, expressed a preference for caesarean section. Fear of pain and safety were the most frequently expressed reasons for preferring caesarean section. When reasons for delivery mode were assessed by a discrete choice experiment, women placed the most emphasis on sex after childbirth. Of women who expressed their preference for vaginal delivery, 34 and 40% ended their pregnancies by caesarean section in public and private hospitals, respectively. The preference for caesarean section is low among healthy nulliparous women in Buenos Aires. The reasons why these women had a rate of more than 35% caesarean sections are unlikely related to their preferences for mode of delivery.
ERIC Educational Resources Information Center
Allen, Archibald; Hailey, Pleasant L., Jr.
This instructor's manual contains job analysis and training curriculum for the positions of Resident Selection and Occupancy Trainee, Resident Security Aide, Resident Security Officer, Security Officer II, and Community Security Aide. The two sections of the manual and their parts are as follows: Section I: A Model Curriculum for Resident…
Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman
2018-01-01
Background Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Objective Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Methods Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Results Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. Conclusions To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. PMID:29506966
Sadat, Md Nazmus; Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman
2018-03-05
Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. ©Md Nazmus Sadat, Xiaoqian Jiang, Md Momin Al Aziz, Shuang Wang, Noman Mohammed. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 05.03.2018.
Frenk, J
1985-01-01
Using data from a survey of 923 medical interns in Mexico, this article analyzes preferences for type of medical activity (general or specialized practice), type of site (ambulatory or hospital), and type of medical care institution (public assistance, social security, or private). Four independent variables are examined: social origin, medical school, place of internship, and assimilation to the internship hospital. The great majority of the interns expressed a preference for specialty practice, hospitals, and social security institutions. The role of social origin was to selectively direct students into different medical schools. From then on, the structural attributes of the school itself and of the place of internship, as well as the socialization experiences that took place there, emerged as the most important determinants of career preferences. Such a process, however, tended to produce a "social specialization" of interns in terms of the role they expect to play in the medical field. It is argued that this kind of specialization has negative implications for the professional status of physicians, although it also poses a challenge to the development of innovative theories about the process of professionalization in medicine.
Code of Federal Regulations, 2010 CFR
2010-01-01
... certain derivative third and sixth preference and nonpreference immigrants. 212.9 Section 212.9 Aliens and... certain derivative third and sixth preference and nonpreference immigrants. A derivative beneficiary who is the spouse or child of a qualified third or sixth preference or nonpreference immigrant and who is...
17 CFR 240.12h-1 - Exemptions from registration under section 12(g) of the Act.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemptions from registration under section 12(g) of the Act. 240.12h-1 Section 240.12h-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...
17 CFR 240.36a1-1 - Exemption from Section 7 for OTC derivatives dealers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption from Section 7 for OTC derivatives dealers. 240.36a1-1 Section 240.36a1-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...
Breakthroughs in Low Profile Leaky Wave HPM Antennas
2016-10-17
3D RF modeling, but the design time and effort will be greatly reduced compared to starting from scratch. The LWAs featured here exhibit beam...Section 4 present related and novel antenna designs that leverage some of the concepts from this research program. Section 5 and Section 6 present...parameters that we used previously for the wire-grill design in Figure 3, but this time with the intent to combine it with an acrylic (εr=2.55) window of
Laser housing having integral mounts and method of manufacturing same
Herron, Michael Alan; Brickeen, Brian Keith
2004-10-19
A housing adapted to position, support, and facilitate aligning various components, including an optical path assembly, of a laser. In a preferred embodiment, the housing is constructed from a single piece of material and broadly comprises one or more through-holes; one or more cavities; and one or more integral mounts, wherein the through-holes and the cavities cooperate to define the integral mounts. Securement holes machined into the integral mounts facilitate securing components within the integral mounts using set screws, adhesive, or a combination thereof. In a preferred method of making the housing, the through-holes and cavities are first machined into the single piece of material, with at least some of the remaining material forming the integral mounts.
75 FR 10300 - South Texas Area Maritime Security (STAMS) Committee; Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-05
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-0074] South Texas Area Maritime Security... notice requests individuals interested in serving on the South Texas Area Maritime Security (STAMS... Section 102 of the Maritime Transportation Security Act (MTSA) of 2002 (Pub. L. 107-295) added section...
NASA Astrophysics Data System (ADS)
Bartrand, J.; Abbott, R. E.
2017-12-01
We present data and analysis of a seismic data collect at the site of a historical underground nuclear explosion at Yucca Flat, a sedimentary basin on the Nevada National Security Site, USA. The data presented here consist of active-source, six degree-of-freedom seismic signals. The translational signals were collected with a Nanometrics Trillium Compact Posthole seismometer and the rotational signals were collected with an ATA Proto-SMHD, a prototype rotational ground motion sensor. The source for the experiment was the Seismic Hammer (a 13,000 kg weight-drop), deployed on two-kilometer, orthogonal arms centered on the site of the nuclear explosion. By leveraging the fact that compressional waves have no rotational component, we generated a map of subsurface scattering and compared the results to known subsurface features. To determine scattering intensity, signals were cut to include only the P-wave and its coda. The ratio of the time-domain signal magnitudes of angular velocity and translational acceleration were sectioned into three time windows within the coda and averaged within each window. Preliminary results indicate an increased rotation/translation ratio in the vicinity of the explosion-generated chimney, suggesting mode conversion of P-wave energy to S-wave energy at that location. Sandia National Laboratories is a multimission laboratory managed and operated by National Technology and Engineering Solutions of Sandia LLC, a wholly owned subsidiary of Honeywell International Inc. for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-NA0003525.
Zhang, Guang-He; Poon, Carmen C Y; Zhang, Yuan-Ting
2012-01-01
Wireless body sensor network (WBSN), a key building block for m-Health, demands extremely stringent resource constraints and thus lightweight security methods are preferred. To minimize resource consumption, utilizing information already available to a WBSN, particularly common to different sensor nodes of a WBSN, for security purposes becomes an attractive solution. In this paper, we tested the randomness and distinctiveness of the 128-bit biometric binary sequences (BSs) generated from interpulse intervals (IPIs) of 20 healthy subjects as well as 30 patients suffered from myocardial infarction and 34 subjects with other cardiovascular diseases. The encoding time of a biometric BS on a WBSN node is on average 23 ms and memory occupation is 204 bytes for any given IPI sequence. The results from five U.S. National Institute of Standards and Technology statistical tests suggest that random biometric BSs can be generated from both healthy subjects and cardiovascular patients and can potentially be used as authentication identifiers for securing WBSNs. Ultimately, it is preferred that these biometric BSs can be used as encryption keys such that key distribution over the WBSN can be avoided.
Genomic cloud computing: legal and ethical points to consider
Dove, Edward S; Joly, Yann; Tassé, Anne-Marie; Burton, Paul; Chisholm, Rex; Fortier, Isabel; Goodwin, Pat; Harris, Jennifer; Hveem, Kristian; Kaye, Jane; Kent, Alistair; Knoppers, Bartha Maria; Lindpaintner, Klaus; Little, Julian; Riegman, Peter; Ripatti, Samuli; Stolk, Ronald; Bobrow, Martin; Cambon-Thomsen, Anne; Dressler, Lynn; Joly, Yann; Kato, Kazuto; Knoppers, Bartha Maria; Rodriguez, Laura Lyman; McPherson, Treasa; Nicolás, Pilar; Ouellette, Francis; Romeo-Casabona, Carlos; Sarin, Rajiv; Wallace, Susan; Wiesner, Georgia; Wilson, Julia; Zeps, Nikolajs; Simkevitz, Howard; De Rienzo, Assunta; Knoppers, Bartha M
2015-01-01
The biggest challenge in twenty-first century data-intensive genomic science, is developing vast computer infrastructure and advanced software tools to perform comprehensive analyses of genomic data sets for biomedical research and clinical practice. Researchers are increasingly turning to cloud computing both as a solution to integrate data from genomics, systems biology and biomedical data mining and as an approach to analyze data to solve biomedical problems. Although cloud computing provides several benefits such as lower costs and greater efficiency, it also raises legal and ethical issues. In this article, we discuss three key ‘points to consider' (data control; data security, confidentiality and transfer; and accountability) based on a preliminary review of several publicly available cloud service providers' Terms of Service. These ‘points to consider' should be borne in mind by genomic research organizations when negotiating legal arrangements to store genomic data on a large commercial cloud service provider's servers. Diligent genomic cloud computing means leveraging security standards and evaluation processes as a means to protect data and entails many of the same good practices that researchers should always consider in securing their local infrastructure. PMID:25248396
Genomic cloud computing: legal and ethical points to consider.
Dove, Edward S; Joly, Yann; Tassé, Anne-Marie; Knoppers, Bartha M
2015-10-01
The biggest challenge in twenty-first century data-intensive genomic science, is developing vast computer infrastructure and advanced software tools to perform comprehensive analyses of genomic data sets for biomedical research and clinical practice. Researchers are increasingly turning to cloud computing both as a solution to integrate data from genomics, systems biology and biomedical data mining and as an approach to analyze data to solve biomedical problems. Although cloud computing provides several benefits such as lower costs and greater efficiency, it also raises legal and ethical issues. In this article, we discuss three key 'points to consider' (data control; data security, confidentiality and transfer; and accountability) based on a preliminary review of several publicly available cloud service providers' Terms of Service. These 'points to consider' should be borne in mind by genomic research organizations when negotiating legal arrangements to store genomic data on a large commercial cloud service provider's servers. Diligent genomic cloud computing means leveraging security standards and evaluation processes as a means to protect data and entails many of the same good practices that researchers should always consider in securing their local infrastructure.
Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R
2013-01-01
In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardwaremore » and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.« less
Strategic defense initiative: critical issues
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nuckolls, J.H.
The objectives of the Strategic Defense Initiative (SDI) as outlined by President Reagan are discussed. The principal objective for SDI is as a defense against ballistic missiles. Soviet objections and a summary of US-USSR dialogue on the subject are reviewed. Most US studies have been critical of SDI. Four critical issues are addressed in depth: are defense weapons technologically feasible which have high economic leverage relative to offensive ballistic missiles; would the defense feasibility and leverage be degraded or enhanced in the technological race between weapons innovation and countermeasures; could stability be achieved during and after the transition to themore » defense dominated world envisioned by SDI proponents; would the deployment of high leverage defensive weapons increase or decrease the security of NATO Europe, and the probability of major conventional or nuclear wars. The issue of SDI may lead to a paradox that contains the seeds of catastrophe. The author concludes by warning that nuclear disarmament may eliminate the highly successful deterrent mechanism for avoiding another major world war. In a world made safe for major conventional wars by the apparent ''elimination'' of nuclear weapons, the leaders in a conventional World War III - involving unimaginable suffering, hatred, terror, and death - would be strongly motivated to introduce nuclear weapons in the crucial decisive battles. Even if diplomacy could ''eliminate'' nuclear weapons, man's knowledge of nuclear weapons can never be eliminated. The paradox is the attempt to eliminate nuclear weapons may maximize the probability of their use. (DMC)« less
75 FR 75207 - Regulation SBSR-Reporting and Dissemination of Security-Based Swap Information
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-02
...In accordance with Section 763 (``Section 763'') and Section 766 (``Section 766'') of Title VII (``Title VII'') of the Dodd-Frank Wall Street Reform and Consumer Protection Act (the ``Dodd-Frank Act''), the Securities and Exchange Commission (``SEC'' or ``Commission'') is proposing Regulation SBSR--Reporting and Dissemination of Security-Based Swap Information (``Regulation SBSR'') under the Securities Exchange Act of 1934 (``Exchange Act'').\\1\\ Proposed Regulation SBSR would provide for the reporting of security- based swap information to registered security-based swap data repositories or the Commission and the public dissemination of security-based swap transaction, volume, and pricing information. Registered security-based swap data repositories would be required to establish and maintain certain policies and procedures regarding how transaction data are reported and disseminated, and participants of registered security-based swap data repositories that are security- based swap dealers or major security-based swap participants would be required to establish and maintain policies and procedures that are reasonably designed to ensure that they comply with applicable reporting obligations. Finally, proposed Regulation SBSR also would require a registered SDR to register with the Commission as a securities information processor on existing Form SIP. ---------------------------------------------------------------------------
NASA Technical Reports Server (NTRS)
Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy
2015-01-01
Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.
Code of Federal Regulations, 2010 CFR
2010-01-01
... certain derivative third and sixth preference and nonpreference immigrants. 1212.9 Section 1212.9 Aliens... immigrants. A derivative beneficiary who is the spouse or child of a qualified third or sixth preference or nonpreference immigrant and who is also a graduate of a medical school as defined by section 101(a)(41) of the...
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
2004-11-01
the context of, e.g., a smart home (Section 7). Our implementation is detailed in Section 8, with a security analysis is Section 9. Section 10...establishment of security parame- ters [17]. This work considers a smart home , where a user may want to establish a security context for controlling...appliances or other devices in a smart - home . We refer to the security property discussed in this work as presence, where it is desirable that only users or
12 CFR 208.61 - Bank security procedures.
Code of Federal Regulations, 2010 CFR
2010-01-01
...; the cost of the security devices; other security measures in effect at the banking office; and the... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Bank security procedures. 208.61 Section 208.61....61 Bank security procedures. (a) Authority, purpose, and scope. Pursuant to section 3 of the Bank...
Hyett, Nerida; Kenny, Amanda; Dickson-Swift, Virginia
2017-10-01
There is increasing opportunity and support for occupational therapists to expand their scope of practice in community settings. However, evidence is needed to increase occupational therapists' knowledge, confidence, and capacity with building community participation and adopting community-centered practice roles. The purpose of this study is to improve occupational therapists' understanding of an approach to building community participation, through case study of a network of Canadian food security programs. Qualitative case study was utilized. Data were semistructured interviews, field observations, documents, and online social media. Thematic analysis was used to identify and describe four themes that relate to processes used to build community participation. The four themes were use of multiple methods, good leaders are fundamental, growing participation via social media, and leveraging outcomes. Occupational therapists can utilize an approach for building community participation that incorporates resource mobilization. Challenges of sustainability and social exclusion must be addressed.
Chen, Feng; Wang, Shuang; Jiang, Xiaoqian; Ding, Sijie; Lu, Yao; Kim, Jihoon; Sahinalp, S. Cenk; Shimizu, Chisato; Burns, Jane C.; Wright, Victoria J.; Png, Eileen; Hibberd, Martin L.; Lloyd, David D.; Yang, Hai; Telenti, Amalio; Bloss, Cinnamon S.; Fox, Dov; Lauter, Kristin; Ohno-Machado, Lucila
2017-01-01
Abstract Motivation: We introduce PRINCESS, a privacy-preserving international collaboration framework for analyzing rare disease genetic data that are distributed across different continents. PRINCESS leverages Software Guard Extensions (SGX) and hardware for trustworthy computation. Unlike a traditional international collaboration model, where individual-level patient DNA are physically centralized at a single site, PRINCESS performs a secure and distributed computation over encrypted data, fulfilling institutional policies and regulations for protected health information. Results: To demonstrate PRINCESS’ performance and feasibility, we conducted a family-based allelic association study for Kawasaki Disease, with data hosted in three different continents. The experimental results show that PRINCESS provides secure and accurate analyses much faster than alternative solutions, such as homomorphic encryption and garbled circuits (over 40 000× faster). Availability and Implementation: https://github.com/achenfengb/PRINCESS_opensource Contact: shw070@ucsd.edu Supplementary information: Supplementary data are available at Bioinformatics online. PMID:28065902
Experimental quantum key distribution with finite-key security analysis for noisy channels.
Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo
2013-01-01
In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.
D'Souza, Clive; Paquet, Victor L; Lenker, James A; Steinfeld, Edward
2017-11-13
Low ridership of public transit buses among wheeled mobility device users suggests the need to identify vehicle design conditions that are either particularly accommodating or challenging. The objective of this study was to determine the effects of low-floor bus interior seating configuration and passenger load on wheeled mobility device user-reported difficulty, overall acceptability and design preference. Forty-eight wheeled mobility users evaluated three interior design layouts at two levels of passenger load (high vs. low) after simulating boarding and disembarking tasks on a static full-scale low-floor bus mockup. User self-reports of task difficulty, acceptability and design preference were analyzed across the different test conditions. Ramp ascent was the most difficult task for manual wheelchair users relative to other tasks. The most difficult tasks for users of power wheelchairs and scooters were related to interior circulation, including moving to the securement area, entry and positioning in the securement area and exiting the securement area. Boarding and disembarking at the rear doorway was significantly more acceptable and preferred compared to the layouts with front doorways. Understanding transit usability barriers, perceptions and preferences among wheeled mobility users is an important consideration for clinicians who recommend mobility-related device interventions to those who use public transportation. Implications for Rehabilitation In order to maximize community participation opportunities for wheeled mobility users, clinicians should consider potential public transit barriers during the processes of wheelchair device selection and skills training. Usability barriers experienced by wheeled mobility device users on transit vehicles differ by mobility device type and vehicle configurations. Full-scale environment simulations are an effective means of identifying usability barriers and design needs in people with mobility impairments and may provide an alternative model for determining readiness for using fixed route buses or eligibility for paratransit.
Turk, Tahir; Newton, Fiona J; Netwon, Joshua D; Naureen, Farah; Bokhari, Jodah
2013-09-25
Tuberculosis (TB) continues to be a major public health and development problem within many low- and middle-income countries. Although Advocacy, Communication and Social Mobilization (ACSM) activities have been undertaken in high TB burden countries to remediate these issues, there is little empirical evidence of the efficacy of these approaches. The purpose of this study was therefore to examine the efficacy of an ACSM program undertaken within Pakistan. Pakistan was chosen because it has received considerable funding for ACSM related activities and is one of 22 high-burden TB countries. The program was evaluated by surveying a stratified random sample of 2,400 participants across 57 districts of Pakistan. Participants were categorized into one of three groups: aware of both media and community ACSM activities (AwareMedia&Community), aware of ACSM media activities only (AwareMedia), or unaware of any ACSM activities (UnawareMedia&Community). Independent measures ANCOVA revealed complex differences in knowledge, attitudes, and intended behaviors towards TB between the three groups. In general, UnawareMedia&Community cases had a poorer understanding of TB and its treatment, whilst awareness of ACSM activities was highest among literate and urban dwelling Pakistanis. Preferred sources of TB information were also found to vary by gender, geographic location, and literacy. Whilst highlighting improvements in knowledge and attitudes toward TB, the results also provide invaluable insights into areas where further work needs to be done to address deficits in TB understanding, particularly among rural and illiterate Pakistanis. Equally important, the findings have implications for future TB ACSM initiatives in Pakistan in terms of leveraging the preferred media channels of key demographic segments and exploring the degree to which exposure to multiple channels of communication may have an additive effect on health knowledge.
75 FR 73947 - Securities of Nonmember Insured Banks
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-30
..., DC, and should be addressed as follows: Accounting and Securities Disclosure Section, Division of..., Accounting and Securities Disclosure Section, Division of Supervision and Consumer Protection, 550 17th... comment. SUMMARY: The FDIC is revising its securities disclosure regulations applicable to state nonmember...
Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz
2015-01-01
Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts between security strategies and health system preservation, and lack of interoperability between security and indigenous health organizations with respect to logistics and sharing information. The cases demonstrate both the opportunities and risks of international security organizations involvement in health sector protection, recovery and reconstruction. We discuss two potential approaches to engaging these organizations in health system support that may increase the chances of realizing these opportunities while mitigating risks.
26 CFR 1.475(c)-2 - Definitions-security.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 26 Internal Revenue 6 2013-04-01 2013-04-01 false Definitions-security. 1.475(c)-2 Section 1.475(c... (CONTINUED) INCOME TAXES (CONTINUED) Inventories § 1.475(c)-2 Definitions—security. (a) Items that are not securities. The following items are not securities within the meaning of section 475(c)(2) with respect to a...
26 CFR 1.475(c)-2 - Definitions-security.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 26 Internal Revenue 6 2014-04-01 2014-04-01 false Definitions-security. 1.475(c)-2 Section 1.475(c... (CONTINUED) INCOME TAXES (CONTINUED) Inventories § 1.475(c)-2 Definitions—security. (a) Items that are not securities. The following items are not securities within the meaning of section 475(c)(2) with respect to a...
26 CFR 1.475(c)-2 - Definitions-security.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 26 Internal Revenue 6 2012-04-01 2012-04-01 false Definitions-security. 1.475(c)-2 Section 1.475(c... (CONTINUED) INCOME TAXES (CONTINUED) Inventories § 1.475(c)-2 Definitions—security. (a) Items that are not securities. The following items are not securities within the meaning of section 475(c)(2) with respect to a...
26 CFR 1.475(c)-2 - Definitions-security.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 26 Internal Revenue 6 2011-04-01 2011-04-01 false Definitions-security. 1.475(c)-2 Section 1.475(c... (CONTINUED) INCOME TAXES (CONTINUED) Inventories § 1.475(c)-2 Definitions—security. (a) Items that are not securities. The following items are not securities within the meaning of section 475(c)(2) with respect to a...
12 CFR 160.40 - Commercial paper and corporate debt securities.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Commercial paper and corporate debt securities... LENDING AND INVESTMENT § 160.40 Commercial paper and corporate debt securities. Pursuant to HOLA section 5... paragraph (a)(1)(i) of this section. (2) Corporate debt securities must be: (i) Securities that may be sold...
17 CFR 245.103 - Issuer right of recovery; right of action by equity security owner.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., conversion or termination of a derivative security) in violation of section 306(a)(1) of that Act of an... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Issuer right of recovery; right of action by equity security owner. 245.103 Section 245.103 Commodity and Securities Exchanges...
Tschann, Mary; Salcedo, Jennifer; Soon, Reni; Elia, Jennifer; Kaneshiro, Bliss
2017-02-01
To assess the values and beliefs regarding sexual behavior, sexual decision-making, and reproductive health learning preferences among teens in Hawaii. Survey regarding teens' knowledge, attitudes, and beliefs about sexual behaviors and preferences for learning about reproductive health. University of Hawaii Department of Obstetrics and Gynecology clinics in Honolulu, Hawaii. Female patients and their male or female companions ages 14-19 years. A 30-question anonymous survey. The main outcome was to describe the norms, attitudes, beliefs, and preferences of teens in this setting with regard to sexual health and sexual health education. For this, we provide a description of response frequencies and a comparison of mean scores across demographic characteristics. We analyzed a total of 100 surveys. Teens endorsed more values and norms protective against sexually transmitted infection than those protective against pregnancy. Younger teens expressed more protective values as a result of the influence of perceived parental values, whereas older teens expressed less protective values on the basis of the influence of peers. Respondents expressed comfort talking with their clinician about sexual health, and also expressed a slight preference that their clinicians initiate these conversations. The influence of parental values and peer norms on sexual behavior must be taken into consideration when designing interventions to address adolescent sexual health. Additionally, teens' greater concern about the consequences of sexually transmitted infection could be leveraged by clinicians to initiate broader conversations about sexual health, and a variety of modalities, including online resources and in-person conversations, should be used to meet the diversity of preferences expressed by teens across demographic groups. Copyright © 2016 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.
24 CFR 891.775 - Security deposits.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Security deposits. 891.775 Section 891.775 Housing and Urban Development REGULATIONS RELATING TO HOUSING AND URBAN DEVELOPMENT (CONTINUED... Individuals-Section 162 Assistance § 891.775 Security deposits. The general requirements for security deposits...
24 CFR 891.775 - Security deposits.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Security deposits. 891.775 Section 891.775 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... Individuals-Section 162 Assistance § 891.775 Security deposits. The general requirements for security deposits...
The French health care system: liberal universalism.
Steffen, Monika
2010-06-01
This article analyzes the reforms introduced over the last quarter century into the French health care system. A particular public-private combination, rooted in French history and institutionalized through a specific division of the policy field between private doctors and public hospitals, explains the system's core characteristics: universal access, free choice, high quality, and a weak capacity for regulation. The dual architecture of this unique system leads to different reform strategies and outcomes in its two main parts. While the state has leverage in the hospital sector, it has failed repeatedly in attempts to regulate the ambulatory care sector. The first section of this article sets out the main characteristics and historical landmarks that continue to affect policy framing and implementation. Section 2 focuses on the evolution in financing and access, section 3 on management and governance in the (private) ambulatory care sector, and section 4 on the (mainly public) hospital sector. The conclusion compares the French model with those developed in the comparative literature and sets out the terms of the dilemma: a state-run social health insurance that lacks both the legitimacy of Bismarckian systems and the leverages of state-run systems. The French system therefore pursues contradictory policy goals, simultaneously developing universalism and liberalism, which explains both the direct state intervention and its limits.
7 CFR 3550.108 - Security requirements (loans only).
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Security requirements (loans only). 3550.108 Section..., DEPARTMENT OF AGRICULTURE DIRECT SINGLE FAMILY HOUSING LOANS AND GRANTS Section 504 Origination and Section 306C Water and Waste Disposal Grants § 3550.108 Security requirements (loans only). When the total...
Situated Usability Testing for Security Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.
2011-03-02
While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused onmore » matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.« less
Kasimba, Salome Nduku; Motswagole, Boitumelo Stokie; Covic, Namukolo Margaret; Claasen, Nicole
2018-04-01
To determine access to traditional and indigenous foods (TIF) and the association with household food security, dietary diversity and women's BMI in low socio-economic households. Sequential explanatory mixed-methods design, including a random household cross-sectional survey on household food insecurity access (HFIA), household dietary diversity (HDD) and women's BMI, followed by focus group discussions. Two rural and two urban areas of Botswana. Persons responsible for food preparation or an adult in a household (n 400); for BMI, non-pregnant women aged 18-49 years (n 253). Almost two-thirds of households experienced moderate or severe food insecurity (28·8 and 37·3 %, respectively), but more than half of women were overweight or obese (26·9 and 26·9 %, respectively). Median HDD score was 6 (interquartile range 5-7) out of a total of 12. A positive correlation was found between number of TIF accessed and HDD score (r=0·457; P<0·001) and a negative correlation between number of TIF accessed and HFIA score (r=-0·272; P<0·001). There was no correlation between number of TIF accessed and women's BMI (r=-0·066; P=0·297). TIF were perceived as healthy but with declining consumption due to preference for modern foods. TIF may potentially have an important role in household food security and dietary diversity. There is need to explore potential benefits that may be associated with their optimal use on food security and nutrition outcomes.
Cloud computing and patient engagement: leveraging available technology.
Noblin, Alice; Cortelyou-Ward, Kendall; Servan, Rosa M
2014-01-01
Cloud computing technology has the potential to transform medical practices and improve patient engagement and quality of care. However, issues such as privacy and security and "fit" can make incorporation of the cloud an intimidating decision for many physicians. This article summarizes the four most common types of clouds and discusses their ideal uses, how they engage patients, and how they improve the quality of care offered. This technology also can be used to meet Meaningful Use requirements 1 and 2; and, if speculation is correct, the cloud will provide the necessary support needed for Meaningful Use 3 as well.
NASA Technical Reports Server (NTRS)
Buquo, Lynn E.; Johnson-Throop, Kathy A.
2011-01-01
An Information Architecture facilitates the understanding and, hence, harnessing of the human system risk-related data supply chain which enhances the ability to securely collect, integrate, and share data assets that improve human system research and operations. By mapping the risk-related data flow from raw data to useable information and knowledge (think of it as a data supply chain), the Human Research Program (HRP) and Space Life Science Directorate (SLSD) are building an information architecture plan to leverage their existing, and often shared, IT infrastructure.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fancher, Chris M.; Blendell, John E.; Bowman, Keith J.
2017-02-07
A method leveraging Rietveld full-pattern texture analysis to decouple induced domain texture from a preferred grain orientation is presented in this paper. The proposed method is demonstrated by determining the induced domain texture in a polar polymorph of 100 oriented 0.91Bi 1/2Na 1/2TiO 3-0.07BaTiO 3-0.02K 0.5Na 0.5NbO 3. Domain textures determined using the present method are compared with results obtained via single peak fitting. Texture determined using single peak fitting estimated more domain alignment than that determined using the Rietveld based method. These results suggest that the combination of grain texture and phase transitions can lead to single peak fittingmore » under or over estimating domain texture. Finally, while demonstrated for a bulk piezoelectric, the proposed method can be applied to quantify domain textures in multi-component systems and thin films.« less
Leveraging Multiactions to Improve Medical Personalized Ranking for Collaborative Filtering.
Gao, Shan; Guo, Guibing; Li, Runzhi; Wang, Zongmin
2017-01-01
Nowadays, providing high-quality recommendation services to users is an essential component in web applications, including shopping, making friends, and healthcare. This can be regarded either as a problem of estimating users' preference by exploiting explicit feedbacks (numerical ratings), or as a problem of collaborative ranking with implicit feedback (e.g., purchases, views, and clicks). Previous works for solving this issue include pointwise regression methods and pairwise ranking methods. The emerging healthcare websites and online medical databases impose a new challenge for medical service recommendation. In this paper, we develop a model, MBPR (Medical Bayesian Personalized Ranking over multiple users' actions), based on the simple observation that users tend to assign higher ranks to some kind of healthcare services that are meanwhile preferred in users' other actions. Experimental results on the real-world datasets demonstrate that MBPR achieves more accurate recommendations than several state-of-the-art methods and shows its generality and scalability via experiments on the datasets from one mobile shopping app.
Leveraging Multiactions to Improve Medical Personalized Ranking for Collaborative Filtering
2017-01-01
Nowadays, providing high-quality recommendation services to users is an essential component in web applications, including shopping, making friends, and healthcare. This can be regarded either as a problem of estimating users' preference by exploiting explicit feedbacks (numerical ratings), or as a problem of collaborative ranking with implicit feedback (e.g., purchases, views, and clicks). Previous works for solving this issue include pointwise regression methods and pairwise ranking methods. The emerging healthcare websites and online medical databases impose a new challenge for medical service recommendation. In this paper, we develop a model, MBPR (Medical Bayesian Personalized Ranking over multiple users' actions), based on the simple observation that users tend to assign higher ranks to some kind of healthcare services that are meanwhile preferred in users' other actions. Experimental results on the real-world datasets demonstrate that MBPR achieves more accurate recommendations than several state-of-the-art methods and shows its generality and scalability via experiments on the datasets from one mobile shopping app. PMID:29118963
A General Tool for Engineering the NAD/NADP Cofactor Preference of Oxidoreductases.
Cahn, Jackson K B; Werlang, Caroline A; Baumschlager, Armin; Brinkmann-Chen, Sabine; Mayo, Stephen L; Arnold, Frances H
2017-02-17
The ability to control enzymatic nicotinamide cofactor utilization is critical for engineering efficient metabolic pathways. However, the complex interactions that determine cofactor-binding preference render this engineering particularly challenging. Physics-based models have been insufficiently accurate and blind directed evolution methods too inefficient to be widely adopted. Building on a comprehensive survey of previous studies and our own prior engineering successes, we present a structure-guided, semirational strategy for reversing enzymatic nicotinamide cofactor specificity. This heuristic-based approach leverages the diversity and sensitivity of catalytically productive cofactor binding geometries to limit the problem to an experimentally tractable scale. We demonstrate the efficacy of this strategy by inverting the cofactor specificity of four structurally diverse NADP-dependent enzymes: glyoxylate reductase, cinnamyl alcohol dehydrogenase, xylose reductase, and iron-containing alcohol dehydrogenase. The analytical components of this approach have been fully automated and are available in the form of an easy-to-use web tool: Cofactor Specificity Reversal-Structural Analysis and Library Design (CSR-SALAD).
Code of Federal Regulations, 2010 CFR
2010-04-01
... can be sold at or near their carrying value within a reasonably short period of time and either: (i... portion. (6) Series of a series company means any class or series of a registered investment company that issues two or more classes or series of preferred or special stock, each of which is preferred over all...
Code of Federal Regulations, 2013 CFR
2013-04-01
... can be sold at or near their carrying value within a reasonably short period of time and either: (i... portion. (6) Series of a series company means any class or series of a registered investment company that issues two or more classes or series of preferred or special stock, each of which is preferred over all...
Code of Federal Regulations, 2014 CFR
2014-04-01
... can be sold at or near their carrying value within a reasonably short period of time and either: (i... portion. (6) Series of a series company means any class or series of a registered investment company that issues two or more classes or series of preferred or special stock, each of which is preferred over all...
75 FR 32973 - Entrepreneurial Mentoring and Education
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-10
... relationships provide many benefits to a new entrepreneur and, ultimately, to their communities if those new... from the public on ideas for creating and leveraging existing entrepreneurial mentoring and education... partnerships that can build mentoring networks between new and seasoned entrepreneurs. The second section of...
Benchmarking 2010: Trends in Education Philanthropy
ERIC Educational Resources Information Center
Bearman, Jessica
2010-01-01
"Benchmarking 2010" offers insights into the current priorities, practices and concerns of education grantmakers. The report is divided into five sections: (1) Mapping the Education Grantmaking Landscape; (2) 2010 Funding Priorities; (3) Strategies for Leveraging Greater Impact; (4) Identifying Significant Trends in Education Funding; and (5)…
13 CFR 107.1540 - Distributions by Licensee-Prioritized Payments and Adjustments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Distributions by Licensee-Prioritized Payments and Adjustments. 107.1540 Section 107.1540 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage...
13 CFR 107.1575 - Distributions on other than Payment Dates.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Distributions on other than Payment Dates. 107.1575 Section 107.1575 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Participating...
13 CFR 108.1720 - Characteristics of SBA's guarantee.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Characteristics of SBA's guarantee. 108.1720 Section 108.1720 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM SBA Financial Assistance for NMVC Companies (Leverage) Miscellaneous...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption from section 14(a... Section 270.14a-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.14a-2 Exemption from section 14(a) of the Act...
Code of Federal Regulations, 2010 CFR
2010-04-01
... institutional investment manager pursuant to section 13(f) of the Securities Exchange Act of 1934. 249.325... manager pursuant to section 13(f) of the Securities Exchange Act of 1934. This form shall be used by institutional investment managers which are required to furnish reports pursuant to section 13(f) of the...
Purchasing health care in China: experiences, opportunities and challenges.
Yip, Winnie; Hanson, Kara
2009-01-01
Purchasing has been promoted as a key policy instrument to improve health system performance. Despite its widespread adoption, there is little empirical evidence on how it works, the challenges surrounding its implementation, its impact, and the preconditions for it to function effectively, particularly in low- and middle-income settings. The objective of this chapter is to analyze critically the extent to which purchasing could be, and has been used strategically in China and to identify modifications that are needed for purchasing to be effective in assuring that the government's new funding for health care will result in efficient and effective health services. We present a conceptual framework for purchasing, which identifies three critical principal-agent relationships in purchasing. We draw on evidence from secondary data, results of other research studies, interviews, and the impact evaluation of a social experiment in rural China that explicitly used purchasing to improve quality and efficiency. This information is used to examine purchasing relationships in urban social health insurance (SHI), the rural medical insurance scheme, and purchasing of public health services. To date, use of strategic purchasing is limited in China. Both the urban and the rural health insurance schemes act as passive third-party payers, failing to take advantage of the opportunities to strengthen incentives to improve quality and efficiency. This may be because as government agencies, the extent to which the Ministries of Health and Labor and Social Security can act independently from provider interests, or act in the best interest of the population, is unclear. Other important challenges include ensuring adequate representation of the population's views and preferences and making better use of the leverage provided by purchasing to create appropriate provider incentives, through better integration of financing and improved coordination among purchasers. In designing purchasing arrangements, attention needs to be paid to all three principal-agent relationships. Successful purchasing appears to require mechanisms to mobilize and represent community preferences and more strategic contracting with providers. More research is needed to strengthen the evidence on which purchasing arrangements work, which do not work, and under what conditions different purchasing configurations can work most effectively.
Hernandez, Belinda F; Morgan, Brenda J; Ish, Jennifer; Agbator, Lucky O; Lindo-Moon, Soledad; Stotler, Francine F; Gardner, Cubby L
2018-05-08
Use of electronic secure messaging (SM) is rapidly growing in various healthcare settings. However, there is a large number of patients that choose not use SM or use it minimally. Thus, understanding preferences for patient-provider communication modalities is critically important, particularly among military healthcare beneficiaries. The purpose of this study was to assess preferences for patient-provider communication modalities (in person, telephone, SM, or mail) among a sample of patients, providers, and staff located at five Air Force military treatment facilities across the USA. We recruited patients, providers, and staff, from five family health clinics to complete a short survey. We measured participants' preferences for communication modality for various healthcare concerns, such as responses to non-urgent medical questions, test results, and medication renewal information. We also measured satisfaction with MiCare, the Air Force's SM system. We conducted chi-square analyses and Fisher's exact tests to assess differences in communication preferences by patients, providers, and staff and we computed frequencies in satisfaction responses. We found that while providers and staff (N = 70) prefer to communicate with patients about various healthcare concerns online through MiCare, patients (N = 1,260) prefer to communicate in-person or through the telephone. Patients were generally satisfied with MiCare; however, there was a large proportion of patients who were undecided about MiCare's impact on the quality of care they received (40.3%). Additionally, although the majority of providers and staff believed MiCare improved their efficiency (58.0%) and communication with patients (72.3%), 65.7% of providers and staff believed MiCare had increased their workload. MiCare is a promising tool to improve patient-provider communication. However, future studies are needed to better understand why patients within the military healthcare system prefer communication modalities other than MiCare and to identify strategies to decrease provider and staff workloads while using MiCare.
20 CFR 410.706 - Effect of the Social Security Administration determination of entitlement.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Effect of the Social Security Administration determination of entitlement. 410.706 Section 410.706 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL... the Social Security Administration determination of entitlement. Under section 435 of the BLBRA of...
24 CFR 880.608 - Security deposits.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Security deposits. 880.608 Section... PROGRAM) SECTION 8 HOUSING ASSISTANCE PAYMENTS PROGRAM FOR NEW CONSTRUCTION Management § 880.608 Security... a security deposit in an amount equal to one month's Total Tenant Payment or $50, whichever is...
26 CFR 1.475(b)-4 - Exemptions-transitional issues.
Code of Federal Regulations, 2010 CFR
2010-04-01
...) Transitional identification—(1) Certain securities previously identified under section 1236. If, as of the close of the last taxable year ending before December 31, 1993, a security was identified under section 1236 as a security held for investment, the security is treated as being identified as held for...
17 CFR 230.156 - Investment company sales literature.
Code of Federal Regulations, 2013 CFR
2013-04-01
... literature. 230.156 Section 230.156 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... literature. (a) Under the federal securities laws, including section 17(a) of the Securities Act of 1933 (15... of any means or instrumentality of interstate commerce or of the mails, to use sales literature which...
17 CFR 230.156 - Investment company sales literature.
Code of Federal Regulations, 2012 CFR
2012-04-01
... literature. 230.156 Section 230.156 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... literature. (a) Under the federal securities laws, including section 17(a) of the Securities Act of 1933 (15... of any means or instrumentality of interstate commerce or of the mails, to use sales literature which...
17 CFR 230.156 - Investment company sales literature.
Code of Federal Regulations, 2014 CFR
2014-04-01
... literature. 230.156 Section 230.156 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... literature. (a) Under the federal securities laws, including section 17(a) of the Securities Act of 1933 (15... of any means or instrumentality of interstate commerce or of the mails, to use sales literature which...
26 CFR 1.544-5 - Convertible securities.
Code of Federal Regulations, 2013 CFR
2013-04-01
...) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.544-5 Convertible securities. Under section 544(b) outstanding securities of a corporation such as bonds, debentures, or other corporate obligations, convertible... 26 Internal Revenue 7 2013-04-01 2013-04-01 false Convertible securities. 1.544-5 Section 1.544-5...
26 CFR 1.544-5 - Convertible securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
...) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.544-5 Convertible securities. Under section 544(b) outstanding securities of a corporation such as bonds, debentures, or other corporate obligations, convertible... 26 Internal Revenue 7 2010-04-01 2010-04-01 true Convertible securities. 1.544-5 Section 1.544-5...
26 CFR 1.544-5 - Convertible securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
...) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.544-5 Convertible securities. Under section 544(b) outstanding securities of a corporation such as bonds, debentures, or other corporate obligations, convertible... 26 Internal Revenue 7 2011-04-01 2009-04-01 true Convertible securities. 1.544-5 Section 1.544-5...
26 CFR 1.544-5 - Convertible securities.
Code of Federal Regulations, 2012 CFR
2012-04-01
...) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.544-5 Convertible securities. Under section 544(b) outstanding securities of a corporation such as bonds, debentures, or other corporate obligations, convertible... 26 Internal Revenue 7 2012-04-01 2012-04-01 false Convertible securities. 1.544-5 Section 1.544-5...
26 CFR 1.544-5 - Convertible securities.
Code of Federal Regulations, 2014 CFR
2014-04-01
...) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.544-5 Convertible securities. Under section 544(b) outstanding securities of a corporation such as bonds, debentures, or other corporate obligations, convertible... 26 Internal Revenue 7 2014-04-01 2013-04-01 true Convertible securities. 1.544-5 Section 1.544-5...
17 CFR 403.3 - Use of customers' free credit balances.
Code of Federal Regulations, 2010 CFR
2010-04-01
... balances. 403.3 Section 403.3 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 PROTECTION OF CUSTOMER SECURITIES AND BALANCES § 403.3 Use of customers' free credit balances. Every registered government securities broker or dealer...
17 CFR 403.3 - Use of customers' free credit balances.
Code of Federal Regulations, 2011 CFR
2011-04-01
... balances. 403.3 Section 403.3 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 PROTECTION OF CUSTOMER SECURITIES AND BALANCES § 403.3 Use of customers' free credit balances. Every registered government securities broker or dealer...
20 CFR 410.706 - Effect of the Social Security Administration determination of entitlement.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Effect of the Social Security Administration determination of entitlement. 410.706 Section 410.706 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL... the Social Security Administration determination of entitlement. Under section 435 of the BLBRA of...
Rivo, J C; Amyx, M; Pingray, V; Casale, R A; Fiorillo, A E; Krupitzki, H B; Malamud, J D; Mendilaharzu, M; Medina, M L; Del Pino, A B; Ribola, L; Schvartzman, J A; Tartalo, G M; Trasmonte, M; Varela, S; Althabe, F; Belizán, J M
2018-01-11
To describe obstetrical providers' delivery preferences and attitudes towards caesarean section without medical indication, including on maternal request, and to examine the association between provider characteristics and preferences/attitudes. Cross-sectional study. Two public and two private hospitals in Argentina. Obstetrician-gynaecologists and midwives who provide prenatal care and/or labour/delivery services. Providers in hospitals with at least 1000 births per year completed a self-administered, anonymous survey. Provider delivery preference for low-risk women, perception of women's preferred delivery method, support for a woman's right to choose her delivery method and willingness to perform caesarean section on maternal request. 168 providers participated (89.8% coverage rate). Providers (93.2%) preferred a vaginal delivery for their patients in the absence of a medical indication for caesarean section. Whereas 74.4% of providers supported their patient's right to choose a delivery method in the absence of a medical indication for caesarean section and 66.7% would perform a caesarean section upon maternal request, only 30.4% would consider a non-medically indicated caesarean section for their own personal delivery or that of their partner. In multivariate adjusted analysis, providers in the private sector [odds ratio (OR) 4.70, 95% CI 1.19-18.62] and obstetrician-gynaecologists (OR 4.37, 95% CI 1.58-12.09) were more willing than either providers working in the public/both settings or midwives to perform a caesarean section on maternal request. Despite the ethical debate surrounding non-medically indicated caesarean sections, we observe very high levels of support, especially by providers in the private sector and obstetrician-gynaecologists, as aligned with the high caesarean section rates in Argentina. Non-medically indicated c-section? 74% of sampled Argentine OB providers support women's right to choose. © 2018 Royal College of Obstetricians and Gynaecologists.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exemption from section 5(c) for certain communications in connection with business combination transactions. 230.166 Section 230.166 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND...
42 CFR 447.510 - Requirements for manufacturers.
Code of Federal Regulations, 2011 CFR
2011-10-01
... report must include: (1) AMP, calculated in accordance with section 1927(k)(1) of the Social Security Act... provided for in section 1927(k)(1) of the Social Security Act. (ii) A manufacturer may choose to... should be calculated based on section 1927(k)(1) of the Social Security Act, except the period covered...
43 CFR 3741.2 - Preference mining locations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 43 Public Lands: Interior 2 2011-10-01 2011-10-01 false Preference mining locations. 3741.2... DEVELOPMENT Claims, Locations and Patents § 3741.2 Preference mining locations. The Act in section 3(a) and (b... act, as limited in subsection (b) of this section 3, the right to locate mining claims upon the lands...
2016-07-27
disclosed here will benefit the area of explosives trace detection for counterterrorism and forensics . INTRODUCTION The military-grade...plasticizer formulation.[4] As a result, methods to detect MHN, SHN, and XPN should be pursued for the same security and forensics applications as...with ion mobility mass spectrometry (IMS) provide direct detection of molecular ions,[8] and thus are preferred for most security and forensic
Network Security Visualization
1999-09-27
performing SQL generation and result-set binding, inserting acquired security events into the database and gathering the requested data for Console scene...objects is also auto-generated by a VBA script. Built into the auto-generated table access objects are the preferred join paths between tables. This...much of the Server itself) never have to deal with SQL directly. This is one aspect of laying the groundwork for supporting RDBMSs from multiple vendors
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of certain direct participation program securities from the arranging provisions of sections 7(c) and 11(d)(1). 240.3a12-9 Section 240.3a12-9 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL...
Code of Federal Regulations, 2012 CFR
2012-04-01
... this section is available continuously on an Internet web site controlled by a Security Futures Product... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Notice of registration under... registered under Section 6(g) of the Act. 240.6a-4 Section 240.6a-4 Commodity and Securities Exchanges...
Code of Federal Regulations, 2011 CFR
2011-04-01
... this section is available continuously on an Internet web site controlled by a Security Futures Product... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Notice of registration under... registered under Section 6(g) of the Act. 240.6a-4 Section 240.6a-4 Commodity and Securities Exchanges...
12 CFR 933.4 - Transition provisions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Transition provisions. 933.4 Section 933.4 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOME LOAN BANK RISK MANAGEMENT AND CAPITAL... its minimum leverage capital requirement and its minimum risk-based capital requirement. The capital...
13 CFR 108.1840 - Computation of NMVC Company's Capital Impairment Percentage.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Capital Impairment Percentage. 108.1840 Section 108.1840 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM NMVC Company's Noncompliance With Terms of Leverage Computation of Nmvc Company's Capital Impairment § 108.1840 Computation of NMVC Company's Capital Impairment...
Improving Angles-Only Navigation Performance by Selecting Sufficiently Accurate Accelerometers
2009-08-01
controller for thrusters and a PID controller for momentum Wheels. Translational control leverages a PD controller for station keeping, and Clohessy ... Wiltshire (CW) equations targeting for trans- fers. Navigation is detailed in Section III.A. III.A. Kalman Filter Development A Square-Root EKF is
12 CFR 933.4 - Transition provisions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Transition provisions. 933.4 Section 933.4 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOME LOAN BANK RISK MANAGEMENT AND CAPITAL... its minimum leverage capital requirement and its minimum risk-based capital requirement. The capital...
Hu, Shengshan; Wang, Qian; Wang, Jingjun; Qin, Zhan; Ren, Kui
2016-05-13
Advances in cloud computing have greatly motivated data owners to outsource their huge amount of personal multimedia data and/or computationally expensive tasks onto the cloud by leveraging its abundant resources for cost saving and flexibility. Despite the tremendous benefits, the outsourced multimedia data and its originated applications may reveal the data owner's private information, such as the personal identity, locations or even financial profiles. This observation has recently aroused new research interest on privacy-preserving computations over outsourced multimedia data. In this paper, we propose an effective and practical privacy-preserving computation outsourcing protocol for the prevailing scale-invariant feature transform (SIFT) over massive encrypted image data. We first show that previous solutions to this problem have either efficiency/security or practicality issues, and none can well preserve the important characteristics of the original SIFT in terms of distinctiveness and robustness. We then present a new scheme design that achieves efficiency and security requirements simultaneously with the preservation of its key characteristics, by randomly splitting the original image data, designing two novel efficient protocols for secure multiplication and comparison, and carefully distributing the feature extraction computations onto two independent cloud servers. We both carefully analyze and extensively evaluate the security and effectiveness of our design. The results show that our solution is practically secure, outperforms the state-of-theart, and performs comparably to the original SIFT in terms of various characteristics, including rotation invariance, image scale invariance, robust matching across affine distortion, addition of noise and change in 3D viewpoint and illumination.
Popular opinion on tax cuts and Social Security.
Teixeira, R
2000-01-01
A review of recent opinion polls reveals the U.S. public's views on budget priorities and Social Security. The public wants more spending on Social Security, Medicare, and other domestic programs, chiefly education and health care, and prefers these spending priorities--by up to a 70 percent majority--to paying down the national debt and cutting taxes. The public supports the Social Security system but doubts it can continue to deliver the goods. To remedy this problem, it is willing not only to use part of the surplus but to raise the cap on payroll taxes. The public does not support benefit cuts or an increase in the retirement age. And the public remains unsure to hostile about the role of the stock market, whether in individual accounts or in the Social Security trust fund.
17 CFR 249.331 - Form N-CSR, certified shareholder report.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form N-CSR, certified shareholder report. 249.331 Section 249.331 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Required Under Sections 13 and 15(d) of the Securities Exchange Act of 1934 § 249.331 Form N-CSR, certified...
17 CFR 249.331 - Form N-CSR, certified shareholder report.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form N-CSR, certified shareholder report. 249.331 Section 249.331 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Required Under Sections 13 and 15(d) of the Securities Exchange Act of 1934 § 249.331 Form N-CSR, certified...
49 CFR 37.165 - Lift and securement use.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 1 2010-10-01 2010-10-01 false Lift and securement use. 37.165 Section 37.165... DISABILITIES (ADA) Provision of Service § 37.165 Lift and securement use. (a) This section applies to public... with disabilities with the use of securement systems, ramps and lifts. If it is necessary for the...
24 CFR 1007.30 - Security for loan.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Security for loan. 1007.30 Section... SECTION 184A LOAN GUARANTEES FOR NATIVE HAWAIIAN HOUSING § 1007.30 Security for loan. (a) In general. A... Lands is used as collateral or security for the loan, the following additional provisions apply: (1...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Definitions. 29.2 Section 29.2 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.2... Homeland Security Act of 2002 (referencing the term used in section 1016(e) of Public Law 107-56 (42 U.S.C...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Definitions. 29.2 Section 29.2 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.2... Homeland Security Act of 2002 (referencing the term used in section 1016(e) of Public Law 107-56 (42 U.S.C...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Definitions. 29.2 Section 29.2 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.2... Homeland Security Act of 2002 (referencing the term used in section 1016(e) of Public Law 107-56 (42 U.S.C...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Definitions. 29.2 Section 29.2 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.2... Homeland Security Act of 2002 (referencing the term used in section 1016(e) of Public Law 107-56 (42 U.S.C...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Definitions. 29.2 Section 29.2 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.2... Homeland Security Act of 2002 (referencing the term used in section 1016(e) of Public Law 107-56 (42 U.S.C...
Provably secure identity-based identification and signature schemes from code assumptions
Zhao, Yiming
2017-01-01
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure. PMID:28809940
Provably secure identity-based identification and signature schemes from code assumptions.
Song, Bo; Zhao, Yiming
2017-01-01
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure.
4 CFR 28.160 - Request for records.
Code of Federal Regulations, 2010 CFR
2010-01-01
... making a request in person shall be required to present satisfactory proof of identity, preferably a..., individuals should submit their names and addresses, dates and places of birth, social security number, and...
20 CFR 404.1590 - When and how often we will conduct a continuing disability review.
Code of Federal Regulations, 2010 CFR
2010-04-01
... continuing disability review. 404.1590 Section 404.1590 Employees' Benefits SOCIAL SECURITY ADMINISTRATION... out in section 223(f) of the Social Security Act. In paragraphs (b) through (g) of this section, we... Social Security Act or these regulations; (9) Evidence we receive raises a question as to whether your...
17 CFR 240.12g-1 - Exemption from section 12(g).
Code of Federal Regulations, 2014 CFR
2014-04-01
... pursuant to section 12(g)(1) if on the last day of its most recent fiscal year the issuer had total assets...). 240.12g-1 Section 240.12g-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Securities Exchange Act of 1934 Extensions and Temporary Exemptions; Definitions § 240.12g-1 Exemption from...
17 CFR 240.12g-1 - Exemption from section 12(g).
Code of Federal Regulations, 2012 CFR
2012-04-01
... pursuant to section 12(g)(1) if on the last day of its most recent fiscal year the issuer had total assets...). 240.12g-1 Section 240.12g-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Securities Exchange Act of 1934 Extensions and Temporary Exemptions; Definitions § 240.12g-1 Exemption from...