Sample records for request forgery csrf

  1. Efficient Web Vulnerability Detection Tool for Sleeping Giant-Cross Site Request Forgery

    NASA Astrophysics Data System (ADS)

    Parimala, G.; Sangeetha, M.; AndalPriyadharsini, R.

    2018-04-01

    Now day’s web applications are very high in the rate of usage due to their user friendly environment and getting any information via internet but these web applications are affected by lot of threats. CSRF attack is one of the serious threats to web applications which is based on the vulnerabilities present in the normal web request and response of HTTP protocol. It is hard to detect but hence still it is present in most of the existing web applications. In CSRF attack, without user knowledge the unwanted actions on a reliable websites are forced to happen. So it is placed in OWASP’s top 10 Web Application attacks list. My proposed work is to do a real time scan of CSRF vulnerability attack in given URL of the web applications as well as local host address for any organization using python language. Client side detection of CSRF is depended on Form count which is presented in that given web site.

  2. Ultrabroadband photonic internet: safety aspects

    NASA Astrophysics Data System (ADS)

    Kalicki, Arkadiusz; Romaniuk, Ryszard

    2008-11-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application frameworks together with careless development results in high number of vulnerabilities and attacks. There are several types of attacks possible because of improper input validation. SQL injection is ability to execute arbitrary SQL queries in a database through an existing application. Cross-site scripting is the vulnerability which allows malicious web users to inject code into the web pages viewed by other users. Cross-Site Request Forgery (CSRF) is an attack that tricks the victim into loading a page that contains malicious request. Web spam in blogs. There are several techniques to mitigate attacks. Most important are web application strong design, correct input validation, defined data types for each field and parameterized statements in SQL queries. Server hardening with firewall, modern security policies systems and safe web framework interpreter configuration are essential. It is advised to keep proper security level on client side, keep updated software and install personal web firewalls or IDS/IPS systems. Good habits are logging out from services just after finishing work and using even separate web browser for most important sites, like e-banking.

  3. Cushing's Syndrome

    MedlinePlus

    ... Support and Research Foundation 60 Robbins, #12 Plymouth MA Plymouth, MA 02360 cushinfo@csrf.net http://csrf.net Tel: ... Support and Research Foundation 60 Robbins, #12 Plymouth MA Plymouth, MA 02360 cushinfo@csrf.net http://csrf. ...

  4. Child Safety Reference Frameworks: a Policy Tool for Child Injury Prevention at the Sub-national Level.

    PubMed

    Scholtes, Beatrice; Schröder-Bäck, Peter; Mackay, Morag; Vincenten, Joanne; Brand, Helmut

    2017-06-01

    The aim of this paper is to present the Child Safety Reference Frameworks (CSRF), a policy advice tool that places evidence-based child safety interventions, applicable at the sub-national level, into a framework resembling the Haddon Matrix. The CSRF is based on work done in previous EU funded projects, which we have adapted to the field of child safety. The CSRF were populated following a literature review. Four CSRF were developed for four domains of child safety: road, water and home safety, and intentional injury prevention. The CSRF can be used as a reference, assessment and comparative tool by child safety practitioners and policy makers working at the sub-national level. Copyright© by the National Institute of Public Health, Prague 2017

  5. Information Security Controls against Cross-Site Request Forgery Attacks on Software Applications of Automated Systems

    NASA Astrophysics Data System (ADS)

    Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.

    2018-05-01

    This paper presents statistical results and their consolidation, which were received in the study into security of various web-application against cross-site request forgery attacks. Some of the results were received in the study carried out within the framework of certification for compliance with information security requirements. The paper provides the results of consolidating information about the attack and protection measures, which are currently used by the developers of web-applications. It specifies results of the study, which demonstrate various distribution types: distribution of identified vulnerabilities as per the developer type (Russian and foreign), distribution of the security measures used in web-applications, distribution of the identified vulnerabilities as per the programming languages, data on the number of security measures that are used in the studied web-applications. The results of the study show that in most cases the developers of web-applications do not pay due attention to protection against cross-site request forgery attacks. The authors give recommendations to the developers that are planning to undergo a certification process for their software applications.

  6. Analysis of Forgery Attack on One-Time Proxy Signature and the Improvement

    NASA Astrophysics Data System (ADS)

    Wang, Tian-Yin; Wei, Zong-Li

    2016-02-01

    In a recent paper, Yang et al. (Quant. Inf. Process. 13(9), 2007-2016, 2014) analyzed the security of one-time proxy signature scheme Wang and Wei (Quant. Inf. Process. 11(2), 455-463, 2012) and pointed out that it cannot satisfy the security requirements of unforgeability and undeniability because an eavesdropper Eve can forge a valid proxy signature on a message chosen by herself. However, we find that the so-called proxy message-signature pair forged by Eve is issued by the proxy signer in fact, and anybody can obtain it as a requester, which means that the forgery attack is not considered as a successful attack. Therefore, the conclusion that this scheme cannot satisfy the security requirements of proxy signature against forging and denying is not appropriate in this sense. Finally, we study the reason for the misunderstanding and clarify the security requirements for proxy signatures.

  7. Cushing's Support and Research Foundation

    MedlinePlus

    ... available. LEARN MORE > Cushing's Patient Day Summaries and Videos Available On March 1, 2014, the CSRF hosted ... issued new warnings for ketoconazole. READ MORE > News Video on Cushing's! ABC 7 Eyewitness News in Southern ...

  8. High-performance combination method of electric network frequency and phase for audio forgery detection in battery-powered devices.

    PubMed

    Savari, Maryam; Abdul Wahab, Ainuddin Wahid; Anuar, Nor Badrul

    2016-09-01

    Audio forgery is any act of tampering, illegal copy and fake quality in the audio in a criminal way. In the last decade, there has been increasing attention to the audio forgery detection due to a significant increase in the number of forge in different type of audio. There are a number of methods for forgery detection, which electric network frequency (ENF) is one of the powerful methods in this area for forgery detection in terms of accuracy. In spite of suitable accuracy of ENF in a majority of plug-in powered devices, the weak accuracy of ENF in audio forgery detection for battery-powered devices, especially in laptop and mobile phone, can be consider as one of the main obstacles of the ENF. To solve the ENF problem in terms of accuracy in battery-powered devices, a combination method of ENF and phase feature is proposed. From experiment conducted, ENF alone give 50% and 60% accuracy for forgery detection in mobile phone and laptop respectively, while the proposed method shows 88% and 92% accuracy respectively, for forgery detection in battery-powered devices. The results lead to higher accuracy for forgery detection with the combination of ENF and phase feature. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  9. Detection of Copy-Rotate-Move Forgery Using Zernike Moments

    NASA Astrophysics Data System (ADS)

    Ryu, Seung-Jin; Lee, Min-Jeong; Lee, Heung-Kyu

    As forgeries have become popular, the importance of forgery detection is much increased. Copy-move forgery, one of the most commonly used methods, copies a part of the image and pastes it into another part of the the image. In this paper, we propose a detection method of copy-move forgery that localizes duplicated regions using Zernike moments. Since the magnitude of Zernike moments is algebraically invariant against rotation, the proposed method can detect a forged region even though it is rotated. Our scheme is also resilient to the intentional distortions such as additive white Gaussian noise, JPEG compression, and blurring. Experimental results demonstrate that the proposed scheme is appropriate to identify the forged region by copy-rotate-move forgery.

  10. Prescription opioid forgery: reporting to law enforcement and protection of medical information.

    PubMed

    Singh, Naileshni; Fishman, Scott; Rich, Ben; Orlowski, Anna

    2013-06-01

    To review confidentiality requirements of prescribers who become aware of a forged prescription. A case is reviewed in which a prescriber believes that a prescription has been forged. The literature and law related to prescription forgery and confidentiality are reviewed. Although prescription forgery is a crime, the prescriber's responsibility for reporting to law enforcement is not clear under current state and federal law. Federal laws and regulations, including the Health Insurance Portability and Accountability Act (HIPAA), do not permit prescribers in all circumstances to disclose prescription fraud to law enforcement. Under common circumstances, HIPAA may prohibit prescribers from reporting prescription forgery to law enforcement. However, collaborating with a dispensing pharmacist may offer a lawful pathway to reporting prescription forgery. State legislature may consider laws that clarify the reporting responsibilities of prescribers in cases of prescription forgery. Wiley Periodicals, Inc.

  11. Network Security Risks of Online Social Networking in the Workplace

    DTIC Science & Technology

    2013-11-01

    Facebook explains pornographic shock spam, hints at browser vulnera- bility, nakedsecurity. URL – http://nakedsecurity.sophos.com/2011/11/16/ facebook...explains- pornographic -shock-spam-hints-at-browser-vul nerability/. 22 UNCLASSIFIED UNCLASSIFIED DSTO–GD–0772 44. Blatz, J. (2011) CSRF: attack and

  12. A Broad-band Spectral and Timing Study of the X-Ray Binary System Centaurus X-3

    NASA Technical Reports Server (NTRS)

    Audley, Michael Damian

    1998-01-01

    This dissertation describes a multi-mission investigation of the high mass X-ray binary pulsar Centaurus X-3. Cen X-3 was observed with the Broad Band X-Ray Telescope (BBXRT) in December 1990. This was the first high-resolution solid state X-ray spectrometer to cover the iron K fluorescence region. The Fe K emission feature was resolved into two components for the first time. A broad 6.7 keV feature was found to be a blend of lines from Fe XXI-Fe XXVI with energies ranging from 6.6 to 6.9 keV due to photoionization of the companion's stellar wind. A narrow line at 6.4 keV due to fluorescence of iron in relatively low ionization states was also found. The quasi-periodic oscillations (QPO) at about 40 mHz were used to estimate the surface magnetic field of Cen X-3 as approx. 2.6 x 10(exp 12) G and to predict that there should be a cyclotron scattering resonance absorption feature (CSRF) near 30 keV. In order to further resolve the iron line complex and to investigate the pulse-phase dependence of the iron line intensities, Cen X-3 was observed with the Advanced Satellite for Cosmology and Astrophysics (ASCA). Using ASCA's state-of-the-art non-dispersive X-ray spectrometers the 6.4 keV fluorescent iron line was found to be pulsing while the intensities of the 6.7 and 6.9 keV recombination lines do not vary with pulse phase. This confirms that the 6.4 keV line is due to reflection by relatively neutral matter close to the neutron star while the recombination lines originate in the extended stellar wind. The continuum spectrum was found to be modified by reflection from matter close to the neutron star. Observations with the EXOSAT GSPC were used to search for a CSRF. The EXOSAT spectra were consistent with the presence of a CSRF but an unambiguous detection was not possible because of a lack of sensitivity at energies higher than the cyclotron energy. Cen X-3 was then observed with the Rossi X-Ray Timing Explorer (RXTE) and evidence for a CSRF at 25.1 +/- 0.3 keV was found. This corresponds to a magnetic field of (2.16 +/- 0.03) X 10(exp 12) G and is consistent with the value obtained from the QPO analysis.

  13. Passive detection of copy-move forgery in digital images: state-of-the-art.

    PubMed

    Al-Qershi, Osamah M; Khoo, Bee Ee

    2013-09-10

    Currently, digital images and videos have high importance because they have become the main carriers of information. However, the relative ease of tampering with images and videos makes their authenticity untrustful. Digital image forensics addresses the problem of the authentication of images or their origins. One main branch of image forensics is passive image forgery detection. Images could be forged using different techniques, and the most common forgery is the copy-move, in which a region of an image is duplicated and placed elsewhere in the same image. Active techniques, such as watermarking, have been proposed to solve the image authenticity problem, but those techniques have limitations because they require human intervention or specially equipped cameras. To overcome these limitations, several passive authentication methods have been proposed. In contrast to active methods, passive methods do not require any previous information about the image, and they take advantage of specific detectable changes that forgeries can bring into the image. In this paper, we describe the current state-of-the-art of passive copy-move forgery detection methods. The key current issues in developing a robust copy-move forgery detector are then identified, and the trends of tackling those issues are addressed. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  14. Contributions and limitations of scientific examination and analysis in the detection of forgeries of old masters' paintings

    NASA Astrophysics Data System (ADS)

    Le Chanu, Patrick

    1998-05-01

    There is a law in my country, France, which is supposed to deal with forgeries in several fields including the arts. It is called the 'Erreur sur la substance' Error on substance. It means that after an object was sold, if the former owner or buyer can prove that he or she was not aware of the substance of the object, meaning in this particular case its authenticity or lack of authenticity, the sale can be cancelled. We should keep in mind this theme of what makes up the substance of a work of art when we study forgeries. The making of forgeries is probably as old, if not as art itself, at least as old as the art market. Making forgeries is a response to the demand of the market, in close connection with art historical activity. The critics and the art historians inside and outside museums contribute to the fame of artists, which stimulates the art market, the rise inspires the demand for more works, thus the making of copies and of forgeries. Before presenting a few studies made in our laboratory, I would like to make a short survey of the examination and analysis methods we use that particularly help us in the detection of forgeries of old masters paintings. The Research Laboratory of French Museums (LRMF) generally makes a distinction between two main categories of working methods: The first one, Examination, concerns mostly photographic and imaging techniques. The second one, Analysis, is a structural study for which the goal is the identification of the constitutive materials of a work of art and how they were used.

  15. Lying to Ourselves.

    ERIC Educational Resources Information Center

    Winks, Robin W.

    1995-01-01

    Discusses the historical validity of "The Hitler Diaries" and other historical forgeries. Maintains that forgeries and other hoaxes will continue to be part of human history. Questions why many people seem to need "historical revelations." (CFR)

  16. Offline Signature Verification Using the Discrete Radon Transform and a Hidden Markov Model

    NASA Astrophysics Data System (ADS)

    Coetzer, J.; Herbst, B. M.; du Preez, J. A.

    2004-12-01

    We developed a system that automatically authenticates offline handwritten signatures using the discrete Radon transform (DRT) and a hidden Markov model (HMM). Given the robustness of our algorithm and the fact that only global features are considered, satisfactory results are obtained. Using a database of 924 signatures from 22 writers, our system achieves an equal error rate (EER) of 18% when only high-quality forgeries (skilled forgeries) are considered and an EER of 4.5% in the case of only casual forgeries. These signatures were originally captured offline. Using another database of 4800 signatures from 51 writers, our system achieves an EER of 12.2% when only skilled forgeries are considered. These signatures were originally captured online and then digitally converted into static signature images. These results compare well with the results of other algorithms that consider only global features.

  17. Detection of inter-frame forgeries in digital videos.

    PubMed

    K, Sitara; Mehtre, B M

    2018-05-26

    Videos are acceptable as evidence in the court of law, provided its authenticity and integrity are scientifically validated. Videos recorded by surveillance systems are susceptible to malicious alterations of visual content by perpetrators locally or remotely. Such malicious alterations of video contents (called video forgeries) are categorized into inter-frame and intra-frame forgeries. In this paper, we propose inter-frame forgery detection techniques using tamper traces from spatio-temporal and compressed domains. Pristine videos containing frames that are recorded during sudden camera zooming event, may get wrongly classified as tampered videos leading to an increase in false positives. To address this issue, we propose a method for zooming detection and it is incorporated in video tampering detection. Frame shuffling detection, which was not explored so far is also addressed in our work. Our method is capable of differentiating various inter-frame tamper events and its localization in the temporal domain. The proposed system is tested on 23,586 videos of which 2346 are pristine and rest of them are candidates of inter-frame forged videos. Experimental results show that we have successfully detected frame shuffling with encouraging accuracy rates. We have achieved improved accuracy on forgery detection in frame insertion, frame deletion and frame duplication. Copyright © 2018. Published by Elsevier B.V.

  18. Two-stage Keypoint Detection Scheme for Region Duplication Forgery Detection in Digital Images.

    PubMed

    Emam, Mahmoud; Han, Qi; Zhang, Hongli

    2018-01-01

    In digital image forensics, copy-move or region duplication forgery detection became a vital research topic recently. Most of the existing keypoint-based forgery detection methods fail to detect the forgery in the smooth regions, rather than its sensitivity to geometric changes. To solve these problems and detect points which cover all the regions, we proposed two steps for keypoint detection. First, we employed the scale-invariant feature operator to detect the spatially distributed keypoints from the textured regions. Second, the keypoints from the missing regions are detected using Harris corner detector with nonmaximal suppression to evenly distribute the detected keypoints. To improve the matching performance, local feature points are described using Multi-support Region Order-based Gradient Histogram descriptor. Based on precision-recall rates and commonly tested dataset, comprehensive performance evaluation is performed. The results demonstrated that the proposed scheme has better detection and robustness against some geometric transformation attacks compared with state-of-the-art methods. © 2017 American Academy of Forensic Sciences.

  19. Forgeries and Art Evaluation: An Argument for Dualism in Aesthetics

    ERIC Educational Resources Information Center

    Kulka, Tomas

    2005-01-01

    Can there be an aesthetic difference between an original painting and its forgery if they are visually indistinguishable? Answers of different philosophers are critically examined with the conclusion that none of them is satisfactory. Although their "solutions" stem from different views of the nature of art, they have one thing in common: They all…

  20. Copy-move forgery detection utilizing Fourier-Mellin transform log-polar features

    NASA Astrophysics Data System (ADS)

    Dixit, Rahul; Naskar, Ruchira

    2018-03-01

    In this work, we address the problem of region duplication or copy-move forgery detection in digital images, along with detection of geometric transforms (rotation and rescale) and postprocessing-based attacks (noise, blur, and brightness adjustment). Detection of region duplication, following conventional techniques, becomes more challenging when an intelligent adversary brings about such additional transforms on the duplicated regions. In this work, we utilize Fourier-Mellin transform with log-polar mapping and a color-based segmentation technique using K-means clustering, which help us to achieve invariance to all the above forms of attacks in copy-move forgery detection of digital images. Our experimental results prove the efficiency of the proposed method and its superiority to the current state of the art.

  1. Detecting Copy Move Forgery In Digital Images

    NASA Astrophysics Data System (ADS)

    Gupta, Ashima; Saxena, Nisheeth; Vasistha, S. K.

    2012-03-01

    In today's world several image manipulation software's are available. Manipulation of digital images has become a serious problem nowadays. There are many areas like medical imaging, digital forensics, journalism, scientific publications, etc, where image forgery can be done very easily. To determine whether a digital image is original or doctored is a big challenge. To find the marks of tampering in a digital image is a challenging task. The detection methods can be very useful in image forensics which can be used as a proof for the authenticity of a digital image. In this paper we propose the method to detect region duplication forgery by dividing the image into overlapping block and then perform searching to find out the duplicated region in the image.

  2. Detecting Image Splicing Using Merged Features in Chroma Space

    PubMed Central

    Liu, Guangjie; Dai, Yuewei

    2014-01-01

    Image splicing is an image editing method to copy a part of an image and paste it onto another image, and it is commonly followed by postprocessing such as local/global blurring, compression, and resizing. To detect this kind of forgery, the image rich models, a feature set successfully used in the steganalysis is evaluated on the splicing image dataset at first, and the dominant submodel is selected as the first kind of feature. The selected feature and the DCT Markov features are used together to detect splicing forgery in the chroma channel, which is convinced effective in splicing detection. The experimental results indicate that the proposed method can detect splicing forgeries with lower error rate compared to the previous literature. PMID:24574877

  3. Detecting image splicing using merged features in chroma space.

    PubMed

    Xu, Bo; Liu, Guangjie; Dai, Yuewei

    2014-01-01

    Image splicing is an image editing method to copy a part of an image and paste it onto another image, and it is commonly followed by postprocessing such as local/global blurring, compression, and resizing. To detect this kind of forgery, the image rich models, a feature set successfully used in the steganalysis is evaluated on the splicing image dataset at first, and the dominant submodel is selected as the first kind of feature. The selected feature and the DCT Markov features are used together to detect splicing forgery in the chroma channel, which is convinced effective in splicing detection. The experimental results indicate that the proposed method can detect splicing forgeries with lower error rate compared to the previous literature.

  4. Random Visitor: Defense against Identity Attacks in P2P Networks

    NASA Astrophysics Data System (ADS)

    Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun

    Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.

  5. An effective detection algorithm for region duplication forgery in digital images

    NASA Astrophysics Data System (ADS)

    Yavuz, Fatih; Bal, Abdullah; Cukur, Huseyin

    2016-04-01

    Powerful image editing tools are very common and easy to use these days. This situation may cause some forgeries by adding or removing some information on the digital images. In order to detect these types of forgeries such as region duplication, we present an effective algorithm based on fixed-size block computation and discrete wavelet transform (DWT). In this approach, the original image is divided into fixed-size blocks, and then wavelet transform is applied for dimension reduction. Each block is processed by Fourier Transform and represented by circle regions. Four features are extracted from each block. Finally, the feature vectors are lexicographically sorted, and duplicated image blocks are detected according to comparison metric results. The experimental results show that the proposed algorithm presents computational efficiency due to fixed-size circle block architecture.

  6. Mediterranean Security Into the Coming Millennium

    DTIC Science & Technology

    1999-01-01

    forgery was the widespread forgery of the Deutschmark, the reference currency in the area, in order to finance the costs of the wars of Yugoslavia’ s...Basque Land and Freedom) FAZ Frankfurter Allgemeine Zeitung FT Financial Times FSU Former Soviet Union GIA Groupe Islamique Anne (Algeria, Armed...and inter-state conflict as well as terrorism start the vicious circles of drugs and displaced persons trafficking in order to finance arms transfers

  7. A sparse representation-based approach for copy-move image forgery detection in smooth regions

    NASA Astrophysics Data System (ADS)

    Abdessamad, Jalila; ElAdel, Asma; Zaied, Mourad

    2017-03-01

    Copy-move image forgery is the act of cloning a restricted region in the image and pasting it once or multiple times within that same image. This procedure intends to cover a certain feature, probably a person or an object, in the processed image or emphasize it through duplication. Consequences of this malicious operation can be unexpectedly harmful. Hence, the present paper proposes a new approach that automatically detects Copy-move Forgery (CMF). In particular, this work broaches a widely common open issue in CMF research literature that is detecting CMF within smooth areas. Indeed, the proposed approach represents the image blocks as a sparse linear combination of pre-learned bases (a mixture of texture and color-wise small patches) which allows a robust description of smooth patches. The reported experimental results demonstrate the effectiveness of the proposed approach in identifying the forged regions in CM attacks.

  8. Anti-forensics of chromatic aberration

    NASA Astrophysics Data System (ADS)

    Mayer, Owen; Stamm, Matthew C.

    2015-03-01

    Over the past decade, a number of information forensic techniques have been developed to identify digital image manipulation and falsification. Recent research has shown, however, that an intelligent forger can use anti-forensic countermeasures to disguise their forgeries. In this paper, an anti-forensic technique is proposed to falsify the lateral chromatic aberration present in a digital image. Lateral chromatic aberration corresponds to the relative contraction or expansion between an image's color channels that occurs due to a lens's inability to focus all wavelengths of light on the same point. Previous work has used localized inconsistencies in an image's chromatic aberration to expose cut-and-paste image forgeries. The anti-forensic technique presented in this paper operates by estimating the expected lateral chromatic aberration at an image location, then removing deviations from this estimate caused by tampering or falsification. Experimental results are presented that demonstrate that our anti-forensic technique can be used to effectively disguise evidence of an image forgery.

  9. Forgery Detection and Value Identification of Euro Banknotes

    PubMed Central

    Bruna, Arcangelo; Farinella, Giovanni Maria; Guarnera, Giuseppe Claudio; Battiato, Sebastiano

    2013-01-01

    This paper describes both hardware and software components to detect counterfeits of Euro banknotes. The proposed system is also able to recognize the banknote values. Differently than other state-of-the-art methods, the proposed approach makes use of banknote images acquired with a near infrared camera to perform recognition and authentication. This allows one to build a system that can effectively deal with real forgeries, which are usually not detectable with visible light. The hardware does not use any mechanical parts, so the overall system is low-cost. The proposed solution is reliable for ambient light and banknote positioning. Users should simply lean the banknote to be analyzed on a flat glass, and the system detects forgery, as well as recognizes the banknote value. The effectiveness of the proposed solution has been properly tested on a dataset composed by genuine and fake Euro banknotes provided by Italy's central bank. PMID:23429514

  10. Detection and localization of copy-paste forgeries in digital videos.

    PubMed

    Singh, Raahat Devender; Aggarwal, Naveen

    2017-12-01

    Amidst the continual march of technology, we find ourselves relying on digital videos to proffer visual evidence in several highly sensitive areas such as journalism, politics, civil and criminal litigation, and military and intelligence operations. However, despite being an indispensable source of information with high evidentiary value, digital videos are also extremely vulnerable to conscious manipulations. Therefore, in a situation where dependence on video evidence is unavoidable, it becomes crucial to authenticate the contents of this evidence before accepting them as an accurate depiction of reality. Digital videos can suffer from several kinds of manipulations, but perhaps, one of the most consequential forgeries is copy-paste forgery, which involves insertion/removal of objects into/from video frames. Copy-paste forgeries alter the information presented by the video scene, which has a direct effect on our basic understanding of what that scene represents, and so, from a forensic standpoint, the challenge of detecting such forgeries is especially significant. In this paper, we propose a sensor pattern noise based copy-paste detection scheme, which is an improved and forensically stronger version of an existing noise-residue based technique. We also study a demosaicing artifact based image forensic scheme to estimate the extent of its viability in the domain of video forensics. Furthermore, we suggest a simplistic clustering technique for the detection of copy-paste forgeries, and determine if it possess the capabilities desired of a viable and efficacious video forensic scheme. Finally, we validate these schemes on a set of realistically tampered MJPEG, MPEG-2, MPEG-4, and H.264/AVC encoded videos in a diverse experimental set-up by varying the strength of post-production re-compressions and transcodings, bitrates, and sizes of the tampered regions. Such an experimental set-up is representative of a neutral testing platform and simulates a real-world forgery scenario where the forensic investigator has no control over any of the variable parameters of the tampering process. When tested in such an experimental set-up, the four forensic schemes achieved varying levels of detection accuracies and exhibited different scopes of applicabilities. For videos compressed using QFs in the range 70-100, the existing noise residue based technique generated average detection accuracy in the range 64.5%-82.0%, while the proposed sensor pattern noise based scheme generated average accuracy in the range 89.9%-98.7%. For the aforementioned range of QFs, average accuracy rates achieved by the suggested clustering technique and the demosaicing artifact based approach were in the range 79.1%-90.1% and 83.2%-93.3%, respectively. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Unlinkable Serial Transactions: Protocols and Applications

    DTIC Science & Technology

    1999-11-01

    4) intends for the blind signature to be secure from “one-more” forgery attacks [Pointcheval and Stern 1996]. Such forgery enables the originator to...protocols we describe. The signature indicated by S in message 2 uses the vendor’s signature key for service S and is only used to sign blinded hashes. We...make use of blind signatures ; although, not surprisingly, their sys- tems are rather different from the ones given here [Fujioka et al. 1993; Cranor 1996

  12. Optical measurements of paintings and the creation of an artwork database for authenticity

    PubMed Central

    Hwang, Seonhee; Song, Hyerin; Cho, Soon-Woo; Kim, Chang Eun; Kim, Chang-Seok; Kim, Kyujung

    2017-01-01

    Paintings have high cultural and commercial value, so that needs to be preserved. Many techniques have been attempted to analyze properties of paintings, including X-ray analysis and optical coherence tomography (OCT) methods, and enable conservation of paintings from forgeries. In this paper, we suggest a simple and accurate optical analysis system to protect them from counterfeit which is comprised of fiber optics reflectance spectroscopy (FORS) and line laser-based topographic analysis. The system is designed to fully cover the whole area of paintings regardless of its size for the accurate analysis. For additional assessments, a line laser-based high resolved OCT was utilized. Some forgeries were created by the experts from the three different styles of genuine paintings for the experiments. After measuring surface properties of paintings, we could observe the results from the genuine works and the forgeries have the distinctive characteristics. The forgeries could be distinguished maximally 76.5% with obtained RGB spectra by FORS and 100% by topographic analysis. Through the several executions, the reliability of the system was confirmed. We could verify that the measurement system is worthwhile for the conservation of the valuable paintings. To store the surface information of the paintings in micron scale, we created a numerical database. Consequently, we secured the databases of three different famous Korean paintings for accurate authenticity. PMID:28151981

  13. Optical measurements of paintings and the creation of an artwork database for authenticity.

    PubMed

    Hwang, Seonhee; Song, Hyerin; Cho, Soon-Woo; Kim, Chang Eun; Kim, Chang-Seok; Kim, Kyujung

    2017-01-01

    Paintings have high cultural and commercial value, so that needs to be preserved. Many techniques have been attempted to analyze properties of paintings, including X-ray analysis and optical coherence tomography (OCT) methods, and enable conservation of paintings from forgeries. In this paper, we suggest a simple and accurate optical analysis system to protect them from counterfeit which is comprised of fiber optics reflectance spectroscopy (FORS) and line laser-based topographic analysis. The system is designed to fully cover the whole area of paintings regardless of its size for the accurate analysis. For additional assessments, a line laser-based high resolved OCT was utilized. Some forgeries were created by the experts from the three different styles of genuine paintings for the experiments. After measuring surface properties of paintings, we could observe the results from the genuine works and the forgeries have the distinctive characteristics. The forgeries could be distinguished maximally 76.5% with obtained RGB spectra by FORS and 100% by topographic analysis. Through the several executions, the reliability of the system was confirmed. We could verify that the measurement system is worthwhile for the conservation of the valuable paintings. To store the surface information of the paintings in micron scale, we created a numerical database. Consequently, we secured the databases of three different famous Korean paintings for accurate authenticity.

  14. Passive forensics for copy-move image forgery using a method based on DCT and SVD.

    PubMed

    Zhao, Jie; Guo, Jichang

    2013-12-10

    As powerful image editing tools are widely used, the demand for identifying the authenticity of an image is much increased. Copy-move forgery is one of the tampering techniques which are frequently used. Most existing techniques to expose this forgery need to improve the robustness for common post-processing operations and fail to precisely locate the tampering region especially when there are large similar or flat regions in the image. In this paper, a robust method based on DCT and SVD is proposed to detect this specific artifact. Firstly, the suspicious image is divided into fixed-size overlapping blocks and 2D-DCT is applied to each block, then the DCT coefficients are quantized by a quantization matrix to obtain a more robust representation of each block. Secondly, each quantized block is divided non-overlapping sub-blocks and SVD is applied to each sub-block, then features are extracted to reduce the dimension of each block using its largest singular value. Finally, the feature vectors are lexicographically sorted, and duplicated image blocks will be matched by predefined shift frequency threshold. Experiment results demonstrate that our proposed method can effectively detect multiple copy-move forgery and precisely locate the duplicated regions, even when an image was distorted by Gaussian blurring, AWGN, JPEG compression and their mixed operations. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  15. PATIENTS' PERCEPTION ON CLINICAL OUTCOME AND QUALITY OF LIFE AFTER A DIAGNOSIS OF CUSHING SYNDROME.

    PubMed

    Papoian, Vardan; Biller, Beverly M K; Webb, Susan M; Campbell, Karen K; Hodin, Richard A; Phitayakorn, Roy

    2016-01-01

    Excess cortisol production (Cushing syndrome, CS) is a chronic disease affecting many organ systems and impacting quality of life (QoL). This study analyzed factors associated with self-reported QoL, including aspects related to the diagnosis and treatment modalities of CS. In collaboration with the Cushing's Support and Research Foundation (CSRF), surveys using a validated QoL instrument were sent to CSRF members. Data were analyzed for associations between QoL and demographic, treatment, and disease factors. A total of 269 patients completed the survey. Respondents were 89.9% female, and the mean age was 48 years (SD 12, range 16-76). Respondents visited a median of 4 physicians (range 1-40) prior to the diagnosis of CS, with a median of 5 years (mean 7, SD 5, range 1-30) to obtain a diagnosis, showing a statistically significant negative correlation (P<.001). In one-quarter of cases, someone other than a physician suggested the diagnosis. Multiple regression analysis demonstrated that remission status, time to diagnosis, radiation therapy, and hypopituitarism were significant predictors of QoL. There was no association between QoL and patient's sex, age, replacement steroid use, having follow-up with an endocrinologist, or surgical approach. This is one of the largest QoL studies of CS patients and provides information for treatment and education goals. It is notable that early diagnosis and treatment was the major predictor of better QoL after achieving remission from disease, highlighting the need for awareness about the disorder. Patients in remission had better QoL, emphasizing the importance of disease control.

  16. Using the fibre structure of paper to determine authenticity of the documents: analysis of transmitted light images of stamps and banknotes.

    PubMed

    Takalo, Jouni; Timonen, Jussi; Sampo, Jouni; Rantala, Maaria; Siltanen, Samuli; Lassas, Matti

    2014-11-01

    A novel method is presented for distinguishing postal stamp forgeries and counterfeit banknotes from genuine samples. The method is based on analyzing differences in paper fibre networks. The main tool is a curvelet-based algorithm for measuring overall fibre orientation distribution and quantifying anisotropy. Using a couple of more appropriate parameters makes it possible to distinguish forgeries from genuine originals as concentrated point clouds in two- or three-dimensional parameter space. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  17. Color filter array pattern identification using variance of color difference image

    NASA Astrophysics Data System (ADS)

    Shin, Hyun Jun; Jeon, Jong Ju; Eom, Il Kyu

    2017-07-01

    A color filter array is placed on the image sensor of a digital camera to acquire color images. Each pixel uses only one color, since the image sensor can measure only one color per pixel. Therefore, empty pixels are filled using an interpolation process called demosaicing. The original and the interpolated pixels have different statistical characteristics. If the image is modified by manipulation or forgery, the color filter array pattern is altered. This pattern change can be a clue for image forgery detection. However, most forgery detection algorithms have the disadvantage of assuming the color filter array pattern. We present an identification method of the color filter array pattern. Initially, the local mean is eliminated to remove the background effect. Subsequently, the color difference block is constructed to emphasize the difference between the original pixel and the interpolated pixel. The variance measure of the color difference image is proposed as a means of estimating the color filter array configuration. The experimental results show that the proposed method is effective in identifying the color filter array pattern. Compared with conventional methods, our method provides superior performance.

  18. Deep Learning-Based Data Forgery Detection in Automatic Generation Control

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Fengli; Li, Qinghua

    Automatic Generation Control (AGC) is a key control system in the power grid. It is used to calculate the Area Control Error (ACE) based on frequency and tie-line power flow between balancing areas, and then adjust power generation to maintain the power system frequency in an acceptable range. However, attackers might inject malicious frequency or tie-line power flow measurements to mislead AGC to do false generation correction which will harm the power grid operation. Such attacks are hard to be detected since they do not violate physical power system models. In this work, we propose algorithms based on Neural Networkmore » and Fourier Transform to detect data forgery attacks in AGC. Different from the few previous work that rely on accurate load prediction to detect data forgery, our solution only uses the ACE data already available in existing AGC systems. In particular, our solution learns the normal patterns of ACE time series and detects abnormal patterns caused by artificial attacks. Evaluations on the real ACE dataset show that our methods have high detection accuracy.« less

  19. On the Design of Forgiving Biometric Security Systems

    NASA Astrophysics Data System (ADS)

    Phan, Raphael C.-W.; Whitley, John N.; Parish, David J.

    This work aims to highlight the fundamental issue surrounding biometric security systems: it’s all very nice until a biometric is forged, but what do we do after that? Granted, biometric systems are by physical nature supposedly much harder to forge than other factors of authentication since biometrics on a human body are by right unique to the particular human person. Yet it is also due to this physical nature that makes it much more catastrophic when a forgery does occur, because it implies that this uniqueness has been forged as well, threatening the human individuality; and since crime has by convention relied on identifying suspects by biometric characteristics, loss of this biometric uniqueness has devastating consequences on the freedom and basic human rights of the victimized individual. This uniqueness forgery implication also raises the motivation on the adversary to forge since a successful forgery leads to much more impersonation situations when biometric systems are used i.e. physical presence at crime scenes, identification and access to security systems and premises, access to financial accounts and hence the ability to use the victim’s finances. Depending on the gains, a desperate highly motivated adversary may even resort to directly obtaining the victim’s biometric parts by force e.g. severing the parts from the victim’s body; this poses a risk and threat not just to the individual’s uniqueness claim but also to personal safety and well being. One may then wonder if it is worth putting one’s assets, property and safety into the hands of biometrics based systems when the consequences of biometric forgery far outweigh the consequences of system compromises when no biometrics are used.

  20. [A brief history of biographical Seishu Hanaoka].

    PubMed

    Matsuki, Akitomo

    2005-09-01

    It was 1804 when Seishu Hanaoka (1760-1835), performed an excision of the breast cancer of a patient named Kan Aiya under general anesthesia by Mahutu-san. This is the first documented general anesthesia in the world. Numerous studies have been made about Seishu Hanaoka during the past 100 years and among them the monograph titled "Seishu Hanaoka and His Surgery" by Shuzo Kure published in 1923, had been thought to be nearly perfect and it had been thought that nothing had been left unsolved concerning the biography of Hanaoka. The present author made an exhaustive investigation of the monograph in terms of anesthesiology and found a serious forgery in the transcription of Hanaoka's "Nyugan chiken roku". The author also detected two forged photographs of the record in Kure's book. As Kure was a professor of psychiatry of the Tokyo Imperial University and a leading medical historian at that time, other investigators of Hanaoka followed him unquestioningly and they could not reveal Kure's forgery for 80 years since its publication. Because of Kure's forgery the biographical study of Hanaoka was retarded seriously and incorrect information about him has prevailed. The cause of the academic retardation is considered to have been mainly due to the lack of a bibliographical survey of original documents of Hanaoka by following investigators.

  1. An Improved Arbitrated Quantum Scheme with Bell States

    NASA Astrophysics Data System (ADS)

    Zhang, Yingying; Zeng, Jiwen

    2018-04-01

    In 2014, Liu et al. (In. J. Thero. phys. 53(5); 1569-1579. 2014) proposed an arbitrated quantum signature scheme (Liu'14) with Bell states by utilizing a new quantum one-time pad algorithm. It claimed that it can resist the receiver's existential forgery attack and no party has chances to change the message and its signature without being discovered. Recently, Xu and Zou (In. J. Thero. phys. 55; 4142-4156. 2016) analyzed above scheme and demonstrated that it can't resist the signer's disavowal and the receiver's existential forgery. But, the authors didn't give a method to solve it. In this paper, we will give an improved arbitrated quantum signature scheme to make up the loopholes in Liu'14.

  2. Age and gender-invariant features of handwritten signatures for verification systems

    NASA Astrophysics Data System (ADS)

    AbdAli, Sura; Putz-Leszczynska, Joanna

    2014-11-01

    Handwritten signature is one of the most natural biometrics, the study of human physiological and behavioral patterns. Behavioral biometrics includes signatures that may be different due to its owner gender or age because of intrinsic or extrinsic factors. This paper presents the results of the author's research on age and gender influence on verification factors. The experiments in this research were conducted using a database that contains signatures and their associated metadata. The used algorithm is based on the universal forgery feature idea, where the global classifier is able to classify a signature as a genuine one or, as a forgery, without the actual knowledge of the signature template and its owner. Additionally, the reduction of the dimensionality with the MRMR method is discussed.

  3. Handwriting changes due to aging and Parkinson's syndrome.

    PubMed

    Walton, J

    1997-08-22

    Wills signed by elderly people are often contested on the grounds the the signature is different from their earlier specimen signatures. Neurological disease, which can affect handwriting, is very common and progressive amongst elderly people. Handwriting change due to old age and neurological disease is poorly understood. To better understand this subject, we carried out a large methodical study based on almost 200 handwriting specimens of Parkinson patients and age-matched controls. Interestingly, our findings indicate that some of the handwriting changes which occur in these populations tend to resemble forgery indicia although upon close inspection they are distinguishable from them. Thus, document examiners are urged to exercise caution in assessing purported forgeries on wills and other documents signed of written during older age or a writer suffering from neurological disease.

  4. Benford's Law based detection of latent fingerprint forgeries on the example of artificial sweat printed fingerprints captured by confocal laser scanning microscopes

    NASA Astrophysics Data System (ADS)

    Hildebrandt, Mario; Dittmann, Jana

    2015-03-01

    The possibility of forging latent fingerprints at crime scenes is known for a long time. Ever since it has been stated that an expert is capable of recognizing the presence of multiple identical latent prints as an indicator towards forgeries. With the possibility of printing fingerprint patterns to arbitrary surfaces using affordable ink- jet printers equipped with artificial sweat, it is rather simple to create a multitude of fingerprints with slight variations to avoid raising any suspicion. Such artificially printed fingerprints are often hard to detect during the analysis procedure. Moreover, the visibility of particular detection properties might be decreased depending on the utilized enhancement and acquisition technique. In previous work primarily such detection properties are used in combination with non-destructive high resolution sensory and pattern recognition techniques to detect fingerprint forgeries. In this paper we apply Benford's Law in the spatial domain to differentiate between real latent fingerprints and printed fingerprints. This technique has been successfully applied in media forensics to detect image manipulations. We use the differences between Benford's Law and the distribution of the most significant digit of the intensity and topography data from a confocal laser scanning microscope as features for a pattern recognition based detection of printed fingerprints. Our evaluation based on 3000 printed and 3000 latent print samples shows a very good detection performance of up to 98.85% using WEKA's Bagging classifier in a 10-fold stratified cross-validation.

  5. Detection of shifted double JPEG compression by an adaptive DCT coefficient model

    NASA Astrophysics Data System (ADS)

    Wang, Shi-Lin; Liew, Alan Wee-Chung; Li, Sheng-Hong; Zhang, Yu-Jin; Li, Jian-Hua

    2014-12-01

    In many JPEG image splicing forgeries, the tampered image patch has been JPEG-compressed twice with different block alignments. Such phenomenon in JPEG image forgeries is called the shifted double JPEG (SDJPEG) compression effect. Detection of SDJPEG-compressed patches could help in detecting and locating the tampered region. However, the current SDJPEG detection methods do not provide satisfactory results especially when the tampered region is small. In this paper, we propose a new SDJPEG detection method based on an adaptive discrete cosine transform (DCT) coefficient model. DCT coefficient distributions for SDJPEG and non-SDJPEG patches have been analyzed and a discriminative feature has been proposed to perform the two-class classification. An adaptive approach is employed to select the most discriminative DCT modes for SDJPEG detection. The experimental results show that the proposed approach can achieve much better results compared with some existing approaches in SDJPEG patch detection especially when the patch size is small.

  6. Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise

    PubMed Central

    Hyun, Dai-Kyung; Ryu, Seung-Jin; Lee, Hae-Yeoun; Lee, Heung-Kyu

    2013-01-01

    In many court cases, surveillance videos are used as significant court evidence. As these surveillance videos can easily be forged, it may cause serious social issues, such as convicting an innocent person. Nevertheless, there is little research being done on forgery of surveillance videos. This paper proposes a forensic technique to detect forgeries of surveillance video based on sensor pattern noise (SPN). We exploit the scaling invariance of the minimum average correlation energy Mellin radial harmonic (MACE-MRH) correlation filter to reliably unveil traces of upscaling in videos. By excluding the high-frequency components of the investigated video and adaptively choosing the size of the local search window, the proposed method effectively localizes partially manipulated regions. Empirical evidence from a large database of test videos, including RGB (Red, Green, Blue)/infrared video, dynamic-/static-scene video and compressed video, indicates the superior performance of the proposed method. PMID:24051524

  7. 22 CFR 208.800 - What are the causes for debarment?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Section 208.800 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT GOVERNMENTWIDE DEBARMENT AND... with obtaining, attempting to obtain, or performing a public or private agreement or transaction; (2..., theft, forgery, bribery, falsification or destruction of records, making false statements, tax evasion...

  8. The 'Dollond' Versus 'Dolland' Controversy

    NASA Astrophysics Data System (ADS)

    Breyer, Walter H.

    Discussion of the Dollond and Dolland (a forgery) telescopes. Mentioned are telescope makers, opticians, ...: Chester Moore [1703-1771]; Gordon Bass; Edward Scarlett; James Mann; John Dollond; Peter Dollond; Robert Rew; Benjamin Martin [1714-1782]; George Adams; Henry Pyefinch; John Bevis [1693-1771]; and Charles Tulley.

  9. CyberCrime and Punishment.

    ERIC Educational Resources Information Center

    Drucker, Susan J.; Gumpert, Gary

    2000-01-01

    Surveys ways in which criminal laws are finding their way into cyberspace, the implications of such actions for communicative rights and liabilities, and the media differentials of crime and punishment. Examines crime committed using email and the Internet; computer mediated felonies, misdemeanors, and violations committed in cyberspace; forgery;…

  10. Behavior Knowledge Space-Based Fusion for Copy-Move Forgery Detection.

    PubMed

    Ferreira, Anselmo; Felipussi, Siovani C; Alfaro, Carlos; Fonseca, Pablo; Vargas-Munoz, John E; Dos Santos, Jefersson A; Rocha, Anderson

    2016-07-20

    The detection of copy-move image tampering is of paramount importance nowadays, mainly due to its potential use for misleading the opinion forming process of the general public. In this paper, we go beyond traditional forgery detectors and aim at combining different properties of copy-move detection approaches by modeling the problem on a multiscale behavior knowledge space, which encodes the output combinations of different techniques as a priori probabilities considering multiple scales of the training data. Afterwards, the conditional probabilities missing entries are properly estimated through generative models applied on the existing training data. Finally, we propose different techniques that exploit the multi-directionality of the data to generate the final outcome detection map in a machine learning decision-making fashion. Experimental results on complex datasets, comparing the proposed techniques with a gamut of copy-move detection approaches and other fusion methodologies in the literature show the effectiveness of the proposed method and its suitability for real-world applications.

  11. Detection of Forgeries of Dutch and Flemish Paintings of the XVII-XVIII Centuries by means of Spectroscopic Techniques

    NASA Astrophysics Data System (ADS)

    Shabunya-Klyachkovskaya, E. V.; Kiris, V. V.; Shimko, A. N.; Belkov, M. V.; Raikov, S. N.

    2014-01-01

    Results of spectroscopic examinations of three paintings that by the formal and stylistic features can be attributed to the Dutch and Flemish schools of the XVII-XVIIIth centuries were presented. It was supposed that one of the paintings was created by David Teniers the Younger. The signature ″L. de Moni″ was found on the paint layer of another painting. Inorganic art pigments including those of the XIXth century were identified using laser-induced breakdown spectroscopy. Fourier-transform IR spectroscopy was used to determine the paint binders, which allowed the lower limits of the creation time of these artworks to be defined. Results of a microscopic examination of the stratigraphic structure revealed that the creation technology of these artworks differed from that of Dutch and Flemish artists of the XVII-XVIIIth centuries. Thus, all three investigated paintings were XXth century stylistic forgeries of Dutch and Flemish paintings of the XVI-XVIIIth centuries.

  12. Suspension and Debarment: DOD Has Active Referral Processes, but Action Needed to Promote Transparency

    DTIC Science & Technology

    2012-09-01

    relating to submission of offers, embezzlement, theft, forgery, bribery , falsification or destruction of records, federal tax delinquency, and many...debarment period was necessary to protect the government from doing business with this company for its unethical and dishonest practices. Source: GAO

  13. 31 CFR 592.307 - Kimberley Process Certificate.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...- and forgery-resistant document that bears the following information in any language, provided that an... shipment; (k) Relevant Harmonized Commodity Description and Coding System; and (l) Validation by the exporting authority. Note to paragraph (l): See § 592.301(a)(4) for procedures governing the validation of...

  14. Project THEORIA: New Media for Values Education.

    ERIC Educational Resources Information Center

    Covey, Preston

    1989-01-01

    Describes Project THEORIA, which was developed at Carnegie Mellon University to design interactive simulation environments for testing hypotheses and theories of the arts and human morals. Three projects in various stages of design and development are described: (1) "A Right to Die?; (2) "Art or Forgery?"; and (3) "Birth or…

  15. 50 CFR 660.18 - Certification and decertification procedures for observers, catch monitors, catch monitor...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... designee) will designate a NMFS observer certification official who will make decisions for the Observer... of embezzlement, theft, forgery, bribery, falsification or destruction of records, making false... appeal pursuant to paragraph (c) of this section. (c) Appeals process—(1) Decisions. Decisions on appeals...

  16. Identifying Image Manipulation Software from Image Features

    DTIC Science & Technology

    2015-03-26

    obp/ui/#iso:std:iso:ts:22028:-3:ed-2: v1:en. 24. Popescu, Alin and Hany Farid. “Exposing digital forgeries by detecting traces of resampling”. Signal...Processing, IEEE Transactions on, 53(2):758–767, 2005. 25. Popescu, Alin and Hany Farid. “Statistical tools for digital forensics”. Informa- tion

  17. 41 CFR 102-117.290 - What is the difference between temporary nonuse, suspension and debarment?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is the difference... Federal or State antitrust statutes; (3) Embezzlement, theft, forgery, bribery, falsification or... Federal agencies. The seriousness of the TSP's acts or omissions and the mitigating factors must be...

  18. 5 CFR 919.800 - What are the causes for debarment?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false What are the causes for debarment? 919..., and bid rigging; (3) Commission of embezzlement, theft, forgery, bribery, falsification or destruction...; or (5) Violation of the provisions of the Drug-Free Workplace Act of 1988 (41 U.S.C. 701); or (d) Any...

  19. 34 CFR 85.800 - What are the causes for debarment?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false What are the causes for debarment? 85.800 Section 85... customers between competitors, and bid rigging; (3) Commission of embezzlement, theft, forgery, bribery... debarment or suspension action; or (5) Violation of the provisions of the Drug-Free Workplace Act of 1988...

  20. In Vietnam, Manufacturing Masterworks

    ERIC Educational Resources Information Center

    Overland, Martha Ann

    2006-01-01

    Vietnam, with its cheap labor and lax copyright laws, is a counterfeiter's dream. Books are sold hot off the photocopier and Hollywood's latest blockbusters can be had on DVD's for about a dollar. But it is in art forgery that Vietnam excels. With a stable of neoclassically trained art students, who spend years learning to copy the masters, art…

  1. Structural analysis of paintings based on brush strokes

    NASA Astrophysics Data System (ADS)

    Sablatnig, Robert; Kammerer, Paul; Zolda, Ernestine

    1998-05-01

    The origin of works of art can often not be attributed to a certain artist. Likewise it is difficult to say whether paintings or drawings are originals or forgeries. In various fields of art new technical methods are used to examine the age, the state of preservation and the origin of the materials used. For the examination of paintings, radiological methods like X-ray and infra-red diagnosis, digital radiography, computer-tomography, etc. and color analyzes are employed to authenticate art. But all these methods do not relate certain characteristics in art work to a specific artist -- the artist's personal style. In order to study this personal style of a painter, experts in art history and image processing try to examine the 'structural signature' based on brush strokes within paintings, in particular in portrait miniatures. A computer-aided classification and recognition system for portrait miniatures is developed, which enables a semi- automatic classification and forgery detection based on content, color, and brush strokes. A hierarchically structured classification scheme is introduced which separates the classification into three different levels of information: color, shape of region, and structure of brush strokes.

  2. Estimation of color modification in digital images by CFA pattern change.

    PubMed

    Choi, Chang-Hee; Lee, Hae-Yeoun; Lee, Heung-Kyu

    2013-03-10

    Extensive studies have been carried out for detecting image forgery such as copy-move, re-sampling, blurring, and contrast enhancement. Although color modification is a common forgery technique, there is no reported forensic method for detecting this type of manipulation. In this paper, we propose a novel algorithm for estimating color modification in images acquired from digital cameras when the images are modified. Most commercial digital cameras are equipped with a color filter array (CFA) for acquiring the color information of each pixel. As a result, the images acquired from such digital cameras include a trace from the CFA pattern. This pattern is composed of the basic red green blue (RGB) colors, and it is changed when color modification is carried out on the image. We designed an advanced intermediate value counting method for measuring the change in the CFA pattern and estimating the extent of color modification. The proposed method is verified experimentally by using 10,366 test images. The results confirmed the ability of the proposed method to estimate color modification with high accuracy. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  3. Authentication Based on Pole-zero Models of Signature Velocity

    PubMed Central

    Rashidi, Saeid; Fallah, Ali; Towhidkhah, Farzad

    2013-01-01

    With the increase of communication and financial transaction through internet, on-line signature verification is an accepted biometric technology for access control and plays a significant role in authenticity and authorization in modernized society. Therefore, fast and precise algorithms for the signature verification are very attractive. The goal of this paper is modeling of velocity signal that pattern and properties is stable for persons. With using pole-zero models based on discrete cosine transform, precise method is proposed for modeling and then features is founded from strokes. With using linear, parzen window and support vector machine classifiers, the signature verification technique was tested with a large number of authentic and forgery signatures and has demonstrated the good potential of this technique. The signatures are collected from three different database include a proprietary database, the SVC2004 and the Sabanci University signature database benchmark databases. Experimental results based on Persian, SVC2004 and SUSIG databases show that our method achieves an equal error rate of 5.91%, 5.62% and 3.91% in the skilled forgeries, respectively. PMID:24696797

  4. Buyid Silk and the Tale of Bibi Shahrbanu: Identification of Biomarkers of Artificial Aging (Forgery) of Silk.

    PubMed

    Moini, Mehdi; Rollman, Christopher M

    2017-10-03

    Buyid silk forgery is one of the most famous silk forgeries in the world. In 1924-1925, excavation of the Bibi Shahrbanu site in Iran unearthed several silk textiles. The silks were thought to be of the Buyid period (934-1062 BCE) of the Persian Empire and have since been known as the "Buyid silks". In the 1930s, more silk appeared and was reported as being from the Buyid period as well. Controversy over the authenticity of these silks escalated after the purchase of the silks by museums throughout the world. Extensive investigations of several of these silks have been conducted over the years with respect to iconography, weaving patterns, dyes/mordant, style, and even radiocarbon dating. It was found that most of the silks are not from Buyid period. To test the authenticity of these silk fabrics, the recently developed silk dating technique using amino acid racemization (AAR) in conjunction with capillary electrophoresis mass spectrometry was applied to 13 Buyid silk specimens from the Textile Museum collections. Among these silk specimens, the AAR ratios of only one specimen were consistent with authentic silk fabrics collected from various museums. In addition, the aspartic acid racemization ratio of this specimen was also consistent with its 14 C dating. The other "Buyid silks" showed excessive levels of amino acid racemization not only for aspartic acid, but also for phenylalanine and tyrosine, inconsistent with racemization rates of these amino acids in authentic historical silk fabrics. Treatment of modern silk with a base at different pH and temperature reproduced the AAR pattern of the Buyid silks, implying that chemical treatment with a base at relatively high temperatures was perhaps the method used to artificially age these fabrics. The results imply that the racemization ratios of aspartic acid, phenylalanine, and tyrosine can be used as biomarkers for identification of naturally versus artificially aged silk.

  5. [Counterfeit pharmaceuticals in Peru].

    PubMed

    Exebio, Luis E Moreno; Rodríguez, Javier; Sayritupac, Freddy

    2010-02-01

    To determine the quantity of counterfeit pharmaceutical drugs found by the National Quality Control Center (Centro Nacional de Control de Calidad (CNCC), Instituto Nacional de Salud, Peru) during the period from 2005&2008, and the types and properties of these drugs. A form was created to amass the relevant data collected directly from CNCC reports. The reports underwent a review and analysis process, and where counterfeiting was confirmed, it was categorized by type into one of four groups. The percentage of counterfeit drugs relative to the total drugs evaluated was: 3.0% in 2005, 5.0% in 2006, 7.3% in 2007, and 9.2% in 2008. The main groups of counterfeit drugs, classified according to the World Health Organization Anatomical Therapeutic Chemical Classification System, were: alimentary tract and metabolism, 34.5% (29.1%-39.8%); antiinfectives for systemic use, 21.1% (16.5%-25.7%); nervous system, 17.1% (12.8%-21.3%); and musculo-skeletal system, 15.4% (11.3%-19.5%). The most common type of forgery occurred in cases where the drug contained the correct amount of active ingredients, but the manufacturer was one other than the one indicated (62.4% of the total counterfeit drugs); and medications that did not contain any active ingredient (22.4%). Of the counterfeit drugs, 61.0% (56.0%-67.0%) were national brands and 39.0%, (33.0%-44.0%) were imported. The pharmaceutical formulations with the highest rate of forgery were tablets, 66.0% (60.0%-71.0%); injectables, 19.0% (14.0%-23.0%); and capsules 7.0% (4.0%-10.0%). From 2005-2008, drug counterfeiting had an average annual variation of 45%. Drug counterfeiting was shown to be most prevalent among national brands - as opposed to imported medications - although the types and formulations of the fake drugs attest to a certain level of sophistication employed in the forgery process. The counterfeiting of life-saving drugs, such as antimicrobials, signifies a serious public health threat.

  6. Contracting With the Enemy: The Contracting Officer’s Dilemma

    DTIC Science & Technology

    2015-06-01

    forgery, bribery , etc. Intentionally misusing "Made in America" designation Other offenses indicating a lack of business integrity or honesty that...major risk associated with using local national contractors in contingency environments is the presence of business entities that may directly or...indirectly support adversarial forces. Entering into contracts with enemy-affiliated business entities creates significant contractual and security

  7. Forensic Analysis of Digital Image Tampering

    DTIC Science & Technology

    2004-12-01

    analysis of when each method fails, which Chapter 4 discusses. Finally, a test image containing an invisible watermark using LSB steganography is...2.2 – Example of invisible watermark using Steganography Software F5 ............. 8 Figure 2.3 – Example of copy-move image forgery [12...Figure 3.11 – Algorithm for JPEG Block Technique ....................................................... 54 Figure 3.12 – “Forged” Image with Result

  8. Piezoelectric sensor pen for dynamic signature verification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    EerNisse, E.P.; Land, C.E.; Snelling, J.B.

    The concept of using handwriting dynamics for electronic identification is discussed. A piezoelectric sensor pen for obtaining the pen point dynamics during writing is described. Design equations are derived and details of an operating device are presented. Typical output waveforms are shown to demonstrate the operation of the pen and to show the dissimilarities between dynamics of a genuine signature and an attempted forgery.

  9. Signature scheme based on bilinear pairs

    NASA Astrophysics Data System (ADS)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  10. Forgery quality and its implications for behavioral biometric security.

    PubMed

    Ballard, Lucas; Lopresti, Daniel; Monrose, Fabian

    2007-10-01

    Biometric security is a topic of rapidly growing importance in the areas of user authentication and cryptographic key generation. In this paper, we describe our steps toward developing evaluation methodologies for behavioral biometrics that take into account threat models that have been largely ignored. We argue that the pervasive assumption that forgers are minimally motivated (or, even worse, naive) is too optimistic and even dangerous. Taking handwriting as a case in point, we show through a series of experiments that some users are significantly better forgers than others, that such forgers can be trained in a relatively straightforward fashion to pose an even greater threat, that certain users are easy targets for forgers, and that most humans are a relatively poor judge of handwriting authenticity, and hence, their unaided instincts cannot be trusted. Additionally, to overcome current labor-intensive hurdles in performing more accurate assessments of system security, we present a generative attack model based on concatenative synthesis that can provide a rapid indication of the security afforded by the system. We show that our generative attacks match or exceed the effectiveness of forgeries rendered by the skilled humans we have encountered.

  11. Corrosive Space Gas Restores Artwork, Promises Myriad Applications

    NASA Technical Reports Server (NTRS)

    2007-01-01

    Atomic oxygen's unique characteristic of oxidizing primarily hydrogen, carbon, and hydrocarbon polymers at surface levels has been applied in the restoration of artwork, detection of document forgeries, and removal of bacterial contaminants from surgical implants. The Electro-Physics Branch at Glenn Research Center built on corrosion studies of long-duration coatings for use in space, and applied atomic oxygen's selectivity to instances where elements need to be removed from a surface. Atomic oxygen is able to remove organic compounds high in carbon (mostly soot) from fire-damaged artworks without causing a shift in the paint color. First successfully tested on oil paintings, the team then applied the restoration technique to acrylics, watercolors, and ink. The successful art restoration process was well-publicized, and soon a multinational, nonprofit professional organization dedicated to the art of forensic analysis of documents had successfully applied this process in the field of forgery detection. The gas has biomedical applications as well-Atomic Oxygen technology can be used to decontaminate orthopedic surgical hip and knee implants prior to surgery, and additional collaborative research between the Cleveland Clinic Foundation and the Glenn team shows that this gas's roughening of surfaces improves cell adhesion, which is important for the development of new drugs.

  12. Hezbollah’s Passport: Religion, Culture, and the Lebanese Diaspora

    DTIC Science & Technology

    2015-05-23

    trafficking, weapons trading, money laundering , and forgery of products and intellectual property. 114 The porous tri-border region between Paraguay...raising money through criminal activities, and directly supporting other terrorist groups. All of its operations on the continent attempt to enhance...diaspora in West Africa, Hezbollah is involved in a multitude of criminal activities which also raise considerable sums of money for the organization

  13. Radiocarbon Dating

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Buchholz, B A

    Radiocarbon dating can be used to determine the age of objects that contain components that were once alive. In the case of human remains, a radiocarbon date can distinguish between a crime scene and an archeological site. Documents, museum artifacts and art objects can be dated to determine if their age is correct for the historical context. A radiocarbon date does not confirm authenticity, but it can help identify a forgery.

  14. Roman sophisticated surface modification methods to manufacture silver counterfeited coins

    NASA Astrophysics Data System (ADS)

    Ingo, G. M.; Riccucci, C.; Faraldi, F.; Pascucci, M.; Messina, E.; Fierro, G.; Di Carlo, G.

    2017-11-01

    By means of the combined use of X-ray photoelectron spectroscopy (XPS), optical microscopy (OM) and scanning electron microscopy (SEM) coupled with energy dispersive X-ray spectroscopy (EDS) the surface and subsurface chemical and metallurgical features of silver counterfeited Roman Republican coins are investigated to decipher some aspects of the manufacturing methods and to evaluate the technological ability of the Roman metallurgists to produce thin silver coatings. The results demonstrate that over 2000 ago important advances in the technology of thin layer deposition on metal substrates were attained by Romans. The ancient metallurgists produced counterfeited coins by combining sophisticated micro-plating methods and tailored surface chemical modification based on the mercury-silvering process. The results reveal that Romans were able systematically to chemically and metallurgically manipulate alloys at a micro scale to produce adherent precious metal layers with a uniform thickness up to few micrometers. The results converge to reveal that the production of forgeries was aimed firstly to save expensive metals as much as possible allowing profitable large-scale production at a lower cost. The driving forces could have been a lack of precious metals, an unexpected need to circulate coins for trade and/or a combinations of social, political and economic factors that requested a change in money supply. Finally, some information on corrosion products have been achieved useful to select materials and methods for the conservation of these important witnesses of technology and economy.

  15. Copy-move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images.

    PubMed

    Mahmood, Toqeer; Irtaza, Aun; Mehmood, Zahid; Tariq Mahmood, Muhammad

    2017-10-01

    The most common image tampering often for malicious purposes is to copy a region of the same image and paste to hide some other region. As both regions usually have same texture properties, therefore, this artifact is invisible for the viewers, and credibility of the image becomes questionable in proof centered applications. Hence, means are required to validate the integrity of the image and identify the tampered regions. Therefore, this study presents an efficient way of copy-move forgery detection (CMFD) through local binary pattern variance (LBPV) over the low approximation components of the stationary wavelets. CMFD technique presented in this paper is applied over the circular regions to address the possible post processing operations in a better way. The proposed technique is evaluated on CoMoFoD and Kodak lossless true color image (KLTCI) datasets in the presence of translation, flipping, blurring, rotation, scaling, color reduction, brightness change and multiple forged regions in an image. The evaluation reveals the prominence of the proposed technique compared to state of the arts. Consequently, the proposed technique can reliably be applied to detect the modified regions and the benefits can be obtained in journalism, law enforcement, judiciary, and other proof critical domains. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and [InlineEquation not available: see fulltext.] Discretization

    NASA Astrophysics Data System (ADS)

    Wai Kuan, Yip; Teoh, Andrew B. J.; Ngo, David C. L.

    2006-12-01

    We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and[InlineEquation not available: see fulltext.] discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and stolen tokens. In addition, our user-specific[InlineEquation not available: see fulltext.] discretization acts both as an error correction step as well as a real-to-binary space converter. We also propose a new method of extracting compressed representation of dynamic hand signatures using discrete wavelet transform (DWT) and discrete fourier transform (DFT). Without the conventional use of dynamic time warping, the proposed method avoids storage of user's hand signature template. This is an important consideration for protecting the privacy of the biometric owner. Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs) of[InlineEquation not available: see fulltext.] and[InlineEquation not available: see fulltext.] for random and skilled forgeries for stolen token (worst case) scenario, and[InlineEquation not available: see fulltext.] for both forgeries in the genuine token (optimal) scenario.

  17. Human Trafficking in Southeast Asia and U.S. National Security

    DTIC Science & Technology

    2015-03-01

    beneficial to combat the problems at their source in order to have a lasting effect. Criminal organizations use money from drug trafficking rings...trafficking is often paired with other crimes such as drug trafficking, document forgery, money laundering , and human smuggling—all of which yield large... criminal and terrorist organizations to engage in, or launder the proceeds of illegal activity.”169 The report that new strategic focus for the United

  18. Patterns of Global Terrorism 1999

    DTIC Science & Technology

    2000-04-01

    Italian labor leader Massimo D’Antono in May. In the United Kingdom, the Good Friday accords effectively prolonged the de facto peace while the various...French court as an accessory in the Paris metro bombings in 1995—for attempted murder, criminal association, sedition, and forgery and sentenced him to...outstanding at yearend. In addition, the French Government’s nationwide “Vigi-Pirate” plan—launched in 1998 to prevent a repeat of the Paris metro

  19. How Children’s Mentalistic Theory Widens their Conception of Pictorial Possibilities

    PubMed Central

    Gilli, Gabriella M.; Ruggi, Simona; Gatti, Monica; Freeman, Norman H.

    2016-01-01

    An interpretative theory of mind enables young children to grasp that people fulfill varying intentions when making pictures. We tested the hypothesis that in middle childhood a unifunctional conception of artists’ intention to produce a picture widens to include artists’ intention to display their pictures to others. Children aged between 5 and 10 years viewed a brief video of an artist deliberately hiding her picture but her intention was thwarted when her picture was discovered and displayed. By 8 years of age children were almost unanimous that a picture-producer without an intention to show her work to others cannot be considered to be an artist. Further exploratory studies centered on aspects of picture-display involving normal public display as well as the contrary intentions of hiding an original picture and of deceitfully displaying a forgery. Interviews suggested that the concept of exhibition widened to take others’ minds into account viewers’ critical judgments and effects of forgeries on viewers’ minds. The approach of interpolating probes of typical possibilities between atypical intentions generated evidence that in middle childhood the foundations are laid for a conception of communication between artists’ minds and viewers’ minds via pictorial display. The combination of hypothesis-testing and exploratory opening-up of the area generates a new testable hypothesis about how an increasingly mentalistic approach enables children to understand diverse possibilities in the pictorial domain. PMID:26955360

  20. Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications.

    PubMed

    Chen, Chenglong; Ni, Jiangqun; Shen, Zhaoyi; Shi, Yun Qing

    2017-06-01

    Geometric transformations, such as resizing and rotation, are almost always needed when two or more images are spliced together to create convincing image forgeries. In recent years, researchers have developed many digital forensic techniques to identify these operations. Most previous works in this area focus on the analysis of images that have undergone single geometric transformations, e.g., resizing or rotation. In several recent works, researchers have addressed yet another practical and realistic situation: successive geometric transformations, e.g., repeated resizing, resizing-rotation, rotation-resizing, and repeated rotation. We will also concentrate on this topic in this paper. Specifically, we present an in-depth analysis in the frequency domain of the second-order statistics of the geometrically transformed images. We give an exact formulation of how the parameters of the first and second geometric transformations influence the appearance of periodic artifacts. The expected positions of characteristic resampling peaks are analytically derived. The theory developed here helps to address the gap left by previous works on this topic and is useful for image security and authentication, in particular, the forensics of geometric transformations in digital images. As an application of the developed theory, we present an effective method that allows one to distinguish between the aforementioned four different processing chains. The proposed method can further estimate all the geometric transformation parameters. This may provide useful clues for image forgery detection.

  1. Cow urine, Indian yellow, and art forgeries: An update.

    PubMed

    Smith, Gregory Dale

    2017-07-01

    In a recent technical note in this Journal, de Faria et al., 2017 [1] reported the Raman spectrum of authentic Indian yellow artists' pigment, correcting a decades old reference spectrum that has led to the misidentification of this pigment in artworks that actually contained tartrazine yellow. The present communication provides additional information and corrects important experimental details mentioned by de Faria et al. that should lead to further identifications of the authentic pigment in artworks. Despite their claim that the analysis of this naturally fluorescent colorant is only possible with Fourier transform (FT) instruments, the ready characterization of two authentic samples of historic Indian yellow pigment is demonstrated here using commonly available visible and near-infrared excitation sources on a dispersive Raman microspectrometer. To highlight the importance of the proper identification of dyes and colorants, the authentication and art historical implications of previous literature reports that have misidentified Indian yellow on historic documents are more thoroughly discussed here from a forensic science point of view. The numerous modern pigments that are sold as imitation Indian yellow are addressed and analyzed, allowing the ready noninvasive detection of anachronistic colorants in attempted forgeries. Finally, this unusual pigment is positively identified for the first time using non-invasive dispersive Raman microspectroscopy on a historic object of uncertain date, a highly decorative manuscript from the Indian subcontinent. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. Digital image modification detection using color information and its histograms.

    PubMed

    Zhou, Haoyu; Shen, Yue; Zhu, Xinghui; Liu, Bo; Fu, Zigang; Fan, Na

    2016-09-01

    The rapid development of many open source and commercial image editing software makes the authenticity of the digital images questionable. Copy-move forgery is one of the most widely used tampering techniques to create desirable objects or conceal undesirable objects in a scene. Existing techniques reported in the literature to detect such tampering aim to improve the robustness of these methods against the use of JPEG compression, blurring, noise, or other types of post processing operations. These post processing operations are frequently used with the intention to conceal tampering and reduce tampering clues. A robust method based on the color moments and other five image descriptors is proposed in this paper. The method divides the image into fixed size overlapping blocks. Clustering operation divides entire search space into smaller pieces with similar color distribution. Blocks from the tampered regions will reside within the same cluster since both copied and moved regions have similar color distributions. Five image descriptors are used to extract block features, which makes the method more robust to post processing operations. An ensemble of deep compositional pattern-producing neural networks are trained with these extracted features. Similarity among feature vectors in clusters indicates possible forged regions. Experimental results show that the proposed method can detect copy-move forgery even if an image was distorted by gamma correction, addictive white Gaussian noise, JPEG compression, or blurring. Copyright © 2016. Published by Elsevier Ireland Ltd.

  3. Photo-editing in Orthodontics: How Much is Too Much?.

    PubMed

    Kapoor, Priyanka

    2015-01-01

    Digital photography and radiology are the mainstay of orthodontic records but current image editing software programs nave led to increase in instances of digital forgery and scientific misconduct. In the present study, digital image data of orthodontic study casts and photographs were altered using software such as [Microsoft Paint6 1, Picasa3.1, Adobe Photoshop3.6]. Based on ethical guidelines on digital image manipulations, cropping or intensity adjustments in moderation to entire image were considered permissible while cloning or color adjustments were deemed unethical.

  4. Diffractive optical variable image devices generated by maskless interferometric lithography for optical security

    NASA Astrophysics Data System (ADS)

    Cabral, Alexandre; Rebordão, José M.

    2011-05-01

    In optical security (protection against forgery and counterfeit of products and documents) the problem is not exact reproduction but the production of something sufficiently similar to the original. Currently, Diffractive Optically Variable Image Devices (DOVID), that create dynamic chromatic effects which may be easily recognized but are difficult to reproduce, are often used to protect important products and documents. Well known examples of DOVID for security are 3D or 2D/3D holograms in identity documents and credit cards. Others are composed of shapes with different types of microstructures yielding by diffraction to chromatic dynamic effects. A maskless interferometric lithography technique to generate DOVIDs for optical security is presented and compared to traditional techniques. The approach can be considered as a self-masking focused holography on planes tilted with respect to the reference optical axes of the system, and is based on the Scheimpflug and Hinge rules. No physical masks are needed to ensure optimum exposure of the photosensitive film. The system built to demonstrate the technique relies on the digital mirrors device MOEMS technology from Texas Instruments' Digital Light Processing. The technique is linear on the number of specified colors and does not depend either on the area of the device or the number of pixels, factors that drive the complexity of dot-matrix based systems. The results confirmed the technique innovation and capabilities in the creation of diffractive optical elements for security against counterfeiting and forgery.

  5. Analyzing handwriting biometrics in metadata context

    NASA Astrophysics Data System (ADS)

    Scheidat, Tobias; Wolf, Franziska; Vielhauer, Claus

    2006-02-01

    In this article, methods for user recognition by online handwriting are experimentally analyzed using a combination of demographic data of users in relation to their handwriting habits. Online handwriting as a biometric method is characterized by having high variations of characteristics that influences the reliance and security of this method. These variations have not been researched in detail so far. Especially in cross-cultural application it is urgent to reveal the impact of personal background to security aspects in biometrics. Metadata represent the background of writers, by introducing cultural, biological and conditional (changing) aspects like fist language, country of origin, gender, handedness, experiences the influence handwriting and language skills. The goal is the revelation of intercultural impacts on handwriting in order to achieve higher security in biometrical systems. In our experiments, in order to achieve a relatively high coverage, 48 different handwriting tasks have been accomplished by 47 users from three countries (Germany, India and Italy) have been investigated with respect to the relations of metadata and biometric recognition performance. For this purpose, hypotheses have been formulated and have been evaluated using the measurement of well-known recognition error rates from biometrics. The evaluation addressed both: system reliance and security threads by skilled forgeries. For the later purpose, a novel forgery type is introduced, which applies the personal metadata to security aspects and includes new methods of security tests. Finally in our paper, we formulate recommendations for specific user groups and handwriting samples.

  6. Edward's sword? - A non-destructive study of a medieval king's sword

    NASA Astrophysics Data System (ADS)

    Segebade, Chr.

    2013-04-01

    Non-destructive and instrumental methods including photon activation analysis were applied in an examination of an ancient sword. It was tried to find indication of forgery or, if authentic, any later processing and alteration. Metal components of the hilt and the blade were analysed by instrumental photon activation. Non-destructive metallurgical studies (hardness measurements, microscopic microstructure analysis) are briefly described, too. The results of these investigations did not yield indication of non-authenticity. This stood in agreement with the results of stylistic and scientific studies by weapon experts.

  7. Edward's sword? - A non-destructive study of a medieval king's sword

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Segebade, Chr.

    2013-04-19

    Non-destructive and instrumental methods including photon activation analysis were applied in an examination of an ancient sword. It was tried to find indication of forgery or, if authentic, any later processing and alteration. Metal components of the hilt and the blade were analysed by instrumental photon activation. Non-destructive metallurgical studies (hardness measurements, microscopic microstructure analysis) are briefly described, too. The results of these investigations did not yield indication of non-authenticity. This stood in agreement with the results of stylistic and scientific studies by weapon experts.

  8. Deception Detection: Study of Information Manipulation Through Electronic Identity Theft - Email Forgery in the U.S. Military

    DTIC Science & Technology

    2002-12-01

    504.6, p < .01. The Kaiser - Meyer - Olkin measure of sampling adequacy was .74 this exceeds the stated level for suitability of .70 (Hair, 1995). For...680.1, p < .01. The Kaiser - Meyer - Olkin measure of sampling adequacy was .76. These tests of assumption reveal the data is suitable for exploratory...Experiment 2, the Bartlett’s test of spericity revealed the data was also suitable for factor analysis with a χ2 = 282.1, p < .01. The Kaiser - Meyer

  9. Experimental realization of quantum cheque using a five-qubit quantum computer

    NASA Astrophysics Data System (ADS)

    Behera, Bikash K.; Banerjee, Anindita; Panigrahi, Prasanta K.

    2017-12-01

    Quantum cheques could be a forgery-free way to make transaction in a quantum networked banking system with perfect security against any no-signalling adversary. Here, we demonstrate the implementation of quantum cheque, proposed by Moulick and Panigrahi (Quantum Inf Process 15:2475-2486, 2016), using the five-qubit IBM quantum computer. Appropriate single qubit, CNOT and Fredkin gates are used in an optimized configuration. The accuracy of implementation is checked and verified through quantum state tomography by comparing results from the theoretical and experimental density matrices.

  10. Multicollision attack on CBC-MAC, EMAC, and XCBC-MAC of AES-128 algorithm

    NASA Astrophysics Data System (ADS)

    Brolin Sihite, Alfonso; Hayat Susanti, Bety

    2017-10-01

    A Message Authentication Codes (MAC) can be constructed based on a block cipher algorithm. CBC-MAC, EMAC, and XCBC-MAC constructions are some of MAC schemes that used in the hash function. In this paper, we do multicollision attack on CBC-MAC, EMAC, and XCBC-MAC construction which uses AES-128 block cipher algorithm as basic construction. The method of multicollision attack utilizes the concept of existential forgery on CBC-MAC. The results show that the multicollision can be obtained easily in CBC-MAC, EMAC, and XCBC-MAC construction.

  11. On the usability and security of pseudo-signatures

    NASA Astrophysics Data System (ADS)

    Chen, Jin; Lopresti, Daniel

    2010-01-01

    Handwriting has been proposed as a possible biometric for a number of years. However, recent work has shown that handwritten passphrases are vulnerable to both human-based and machine-based forgeries. Pseudosignatures as an alternative are designed to thwart such attacks while still being easy for users to create, remember, and reproduce. In this paper, we briefly review the concept of pseudo-signatures, then describe an evaluation framework that considers aspects of both usability and security. We present results from preliminary experiments that examine user choice in creating pseudo-signatures and discuss the implications when sketching is used for generating cryptographic keys.

  12. Static Signature Synthesis: A Neuromotor Inspired Approach for Biometrics.

    PubMed

    Ferrer, Miguel A; Diaz-Cabrera, Moises; Morales, Aythami

    2015-03-01

    In this paper we propose a new method for generating synthetic handwritten signature images for biometric applications. The procedures we introduce imitate the mechanism of motor equivalence which divides human handwriting into two steps: the working out of an effector independent action plan and its execution via the corresponding neuromuscular path. The action plan is represented as a trajectory on a spatial grid. This contains both the signature text and its flourish, if there is one. The neuromuscular path is simulated by applying a kinematic Kaiser filter to the trajectory plan. The length of the filter depends on the pen speed which is generated using a scalar version of the sigma lognormal model. An ink deposition model, applied pixel by pixel to the pen trajectory, provides realistic static signature images. The lexical and morphological properties of the synthesized signatures as well as the range of the synthesis parameters have been estimated from real databases of real signatures such as the MCYT Off-line and the GPDS960GraySignature corpuses. The performance experiments show that by tuning only four parameters it is possible to generate synthetic identities with different stability and forgers with different skills. Therefore it is possible to create datasets of synthetic signatures with a performance similar to databases of real signatures. Moreover, we can customize the created dataset to produce skilled forgeries or simple forgeries which are easier to detect, depending on what the researcher needs. Perceptual evaluation gives an average confusion of 44.06 percent between real and synthetic signatures which shows the realism of the synthetic ones. The utility of the synthesized signatures is demonstrated by studying the influence of the pen type and number of users on an automatic signature verifier.

  13. Verification Image of The Veins on The Back Palm with Modified Local Line Binary Pattern (MLLBP) and Histogram

    NASA Astrophysics Data System (ADS)

    Prijono, Agus; Darmawan Hangkawidjaja, Aan; Ratnadewi; Saleh Ahmar, Ansari

    2018-01-01

    The verification to person who is used today as a fingerprint, signature, personal identification number (PIN) in the bank system, identity cards, attendance, easily copied and forged. This causes the system not secure and is vulnerable to unauthorized persons to access the system. In this research will be implemented verification system using the image of the blood vessels in the back of the palms as recognition more difficult to imitate because it is located inside the human body so it is safer to use. The blood vessels located at the back of the human hand is unique, even humans twins have a different image of the blood vessels. Besides the image of the blood vessels do not depend on a person’s age, so it can be used for long term, except in the case of an accident, or disease. Because of the unique vein pattern recognition can be used in a person. In this paper, we used a modification method to perform the introduction of a person based on the image of the blood vessel that is using Modified Local Line Binary Pattern (MLLBP). The process of matching blood vessel image feature extraction using Hamming Distance. Test case of verification is done by calculating the percentage of acceptance of the same person. Rejection error occurs if a person was not matched by the system with the data itself. The 10 person with 15 image compared to 5 image vein for each person is resulted 80,67% successful Another test case of the verification is done by verified two image from different person that is forgery, and the verification will be true if the system can rejection the image forgery. The ten different person is not verified and the result is obtained 94%.

  14. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    PubMed

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  15. Societal and ethical implications of anti-spoofing technologies in biometrics.

    PubMed

    Rebera, Andrew P; Bonfanti, Matteo E; Venier, Silvia

    2014-03-01

    Biometric identification is thought to be less vulnerable to fraud and forgery than are traditional forms of identification. However biometric identification is not without vulnerabilities. In a 'spoofing attack' an artificial replica of an individual's biometric trait is used to induce a system to falsely infer that individual's presence. Techniques such as liveness-detection and multi-modality, as well as the development of new and emerging modalities, are intended to secure biometric identification systems against such threats. Unlike biometrics in general, the societal and ethical issues raised by spoofing and anti-spoofing techniques have not received much attention. This paper examines these issues.

  16. Practical of Ethics Education in Junior High School Technical Arts

    NASA Astrophysics Data System (ADS)

    Iwata, Ryo; Hirano, Shigeo

    Now, such as forgery, camouflage, concealment, and the alteration, the problems resulting from lack of the sense of ethics are occurring frequently. The department of junior high school technical arts to engineering ethics education is required for the solution. However, the example of introducing the ethics education is few in a current junior high school technical arts department. It is considered that it leads to a further improvement of the morality consideration by teaching from a past case to the engineering ethics at the stage of the compulsory education. In this thesis, it reports on the execution contents and an educational result.

  17. Continuous-variable quantum homomorphic signature

    NASA Astrophysics Data System (ADS)

    Li, Ke; Shang, Tao; Liu, Jian-wei

    2017-10-01

    Quantum cryptography is believed to be unconditionally secure because its security is ensured by physical laws rather than computational complexity. According to spectrum characteristic, quantum information can be classified into two categories, namely discrete variables and continuous variables. Continuous-variable quantum protocols have gained much attention for their ability to transmit more information with lower cost. To verify the identities of different data sources in a quantum network, we propose a continuous-variable quantum homomorphic signature scheme. It is based on continuous-variable entanglement swapping and provides additive and subtractive homomorphism. Security analysis shows the proposed scheme is secure against replay, forgery and repudiation. Even under nonideal conditions, it supports effective verification within a certain verification threshold.

  18. Two-out-of-two color matching based visual cryptography schemes.

    PubMed

    Machizaud, Jacques; Fournel, Thierry

    2012-09-24

    Visual cryptography which consists in sharing a secret message between transparencies has been extended to color prints. In this paper, we propose a new visual cryptography scheme based on color matching. The stacked printed media reveal a uniformly colored message decoded by the human visual system. In contrast with the previous color visual cryptography schemes, the proposed one enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret. In order to correctly print the colors on the media and to increase the security of the scheme, we use spectral models developed for color reproduction describing printed colors from an optical point of view.

  19. Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics

    NASA Astrophysics Data System (ADS)

    Gloe, Thomas; Borowka, Karsten; Winkler, Antje

    2010-01-01

    The analysis of lateral chromatic aberration forms another ingredient for a well equipped toolbox of an image forensic investigator. Previous work proposed its application to forgery detection1 and image source identification.2 This paper takes a closer look on the current state-of-the-art method to analyse lateral chromatic aberration and presents a new approach to estimate lateral chromatic aberration in a runtime-efficient way. Employing a set of 11 different camera models including 43 devices, the characteristic of lateral chromatic aberration is investigated in a large-scale. The reported results point to general difficulties that have to be considered in real world investigations.

  20. Digital radiography and electronic data storage from the perspective of legal requirements for record keeping.

    PubMed

    Figgener, L; Runte, C

    2003-12-01

    In some countries physicians and dentists are required by law to keep medical and dental records. These records not only serve as personal notes and memory aids but have to be in accordance with the necessary standard of care and may be used as evidence in litigation. Inadequate, incomplete or even missing records can lead to reversal of the burden of proof, resulting in a dramatically reduced chance of successful defence in litigation. The introduction of digital radiography and electronic data storage presents a new problem with respect to legal evidence, since digital data can easily be manipulated and industry is now required to provide adequate measures to prevent manipulations and forgery.

  1. Security of the arbitrated quantum signature protocols revisited

    NASA Astrophysics Data System (ADS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided.

  2. Identification by Raman microscopy of anachronistic pigments on a purported Chagall nude: conservation consequences

    NASA Astrophysics Data System (ADS)

    Chaplin, Tracey D.; Clark, Robin J. H.

    2016-03-01

    A painting purported to be by the artist Marc Chagall has been examined using Raman microscopy to check on its proposed execution date of 1910. The analysis shows that, due the presence of phthalocyanine pigments, the painting cannot have been created prior to c.1938. Transport of the painting to the Chagall Committee in France for inspection has led to their declaration that the painting is a forgery. Under French law the painting is required to be destroyed rather than retained for other forensic examination; the consequences for preservation of such items is of paramount importance, as is the need for auction houses to carry out analyses prior to auction.

  3. The story of a largely unknown evolution - Germ theory hoax.

    PubMed

    Wainwright, Milton; Alharbi, Sulaiman Ali

    2011-10-01

    The Piltdown Man debacle provides us with the most infamous forgery in science. However, another equally intriguing story exists concerning a document by a Bostonian called George Sleeper, which purported to be a pre-Darwin-Wallace anticipation of evolution and an equally convincing account of the germ theory published before Louis Pasteur's famous studies on this subject. The story involves two giants in the world of evolutionary theory, Alfred Russel Wallace and E.B. Poulton. While Wallace was convinced that the Sleeper document was genuine, Poulton's detailed investigations showed that it was a fake and a hoax. Despite this conclusion, doubts still exist about the authenticity of the Sleeper document.

  4. The use of fingerprints available on the web in false identity documents: Analysis from a forensic intelligence perspective.

    PubMed

    Girelli, Carlos Magno Alves

    2016-05-01

    Fingerprints present in false identity documents were found on the web. In some cases, laterally reversed (mirrored) images of a same fingerprint were observed in different documents. In the present work, 100 fingerprints images downloaded from the web, as well as their reversals obtained by image editing, were compared between themselves and against the database of the Brazilian Federal Police AFIS, in order to better understand trends about this kind of forgery in Brazil. Some image editing effects were observed in the analyzed fingerprints: addition of artifacts (such as watermarks), image rotation, image stylization, lateral reversal and tonal reversal. Discussion about lateral reversals' detection is presented in this article, as well as suggestion to reduce errors due to missed HIT decisions between reversed fingerprints. The present work aims to highlight the importance of the fingerprints' analysis when performing document examination, especially when only copies of documents are available, something very common in Brazil. Besides the intrinsic features of the fingermarks considered in three levels of details by ACE-V methodology, some visual features of the fingerprints images can be helpful to identify sources of forgeries and modus operandi, such as: limits and image contours, fails in the friction ridges caused by excess or lack of inking and presence of watermarks and artifacts arising from the background. Based on the agreement of such features in fingerprints present in different identity documents and also on the analysis of the time and location where the documents were seized, it is possible to highlight potential links between apparently unconnected crimes. Therefore, fingerprints have potential to reduce linkage blindness and the present work suggests the analysis of fingerprints when profiling false identity documents, as well as the inclusion of fingerprints features in the profile of the documents. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  5. Chromatographic and electrophoretic approaches in ink analysis.

    PubMed

    Zlotnick, J A; Smith, F P

    1999-10-15

    Inks are manufactured from a wide variety of substances that exhibit very different chemical behaviors. Inks designed for use in different writing instruments or printing methods have quite dissimilar components. Since the 1950s chromatographic and electrophoretic methods have played important roles in the analysis of inks, where compositional information may have bearing on the investigation of counterfeiting, fraud, forgery, and other crimes. Techniques such as paper chromatography and electrophoresis, thin-layer chromatography, high-performance liquid chromatography, gas chromatography, gel electrophoresis, and the relatively new technique of capillary electrophoresis have all been explored as possible avenues for the separation of components of inks. This paper reviews the components of different types of inks and applications of the above separation methods are reviewed.

  6. Piltdown Man: Combining the Instruction of Scientific Ethics and Qualitative Analysis

    NASA Astrophysics Data System (ADS)

    Vincent, John B.

    1999-11-01

    In combination with lectures on scientific method and the problems of scientific misconduct in a freshman chemistry course at The University of Alabama, a laboratory experiment was developed to allow students to feel some of the sense of scientific discovery associated with the exposure of the Piltdown Man fraud. This is accomplished by modifying a commonly performed freshman chemistry laboratory experiment, qualitative analysis of group III metal ions. Pieces of chalk are treated with chromium, manganese, and iron to simulate the treatment used to forge the Piltdown "fossils"; students can use techniques in qualitative analysis schemes for the group III ions to determine whether the samples are "forgeries" and if so which metal ion(s) were used.

  7. Identification of forgeries in handwritten petitions for ballot propositions

    NASA Astrophysics Data System (ADS)

    Srihari, Sargur; Ramakrishnan, Veshnu; Malgireddy, Manavender; Ball, Gregory R.

    2009-01-01

    Many governments have some form of "direct democracy" legislation procedure whereby individual citizens can propose various measures creating or altering laws. Generally, such a process is started with the gathering of a large number of signatures. There is interest in whether or not there are fraudulent signatures present in such a petition, and if so what percentage of the signatures are indeed fraudulent. However, due to the large number of signatures (tens of thousands), it is not feasible to have a document examiner verify the signatures directly. Instead, there is interest in creating a subset of signatures where there is a high probability of fraud that can be verified. We present a method by which a pairwise comparison of signatures can be performed and subsequent sorting can generate such subsets.

  8. X-ray computed tomography datasets for forensic analysis of vertebrate fossils.

    PubMed

    Rowe, Timothy B; Luo, Zhe-Xi; Ketcham, Richard A; Maisano, Jessica A; Colbert, Matthew W

    2016-06-07

    We describe X-ray computed tomography (CT) datasets from three specimens recovered from Early Cretaceous lakebeds of China that illustrate the forensic interpretation of CT imagery for paleontology. Fossil vertebrates from thinly bedded sediments often shatter upon discovery and are commonly repaired as amalgamated mosaics grouted to a solid backing slab of rock or plaster. Such methods are prone to inadvertent error and willful forgery, and once required potentially destructive methods to identify mistakes in reconstruction. CT is an efficient, nondestructive alternative that can disclose many clues about how a specimen was handled and repaired. These annotated datasets illustrate the power of CT in documenting specimen integrity and are intended as a reference in applying CT more broadly to evaluating the authenticity of comparable fossils.

  9. Optimal chroma-like channel design for passive color image splicing detection

    NASA Astrophysics Data System (ADS)

    Zhao, Xudong; Li, Shenghong; Wang, Shilin; Li, Jianhua; Yang, Kongjin

    2012-12-01

    Image splicing is one of the most common image forgeries in our daily life and due to the powerful image manipulation tools, image splicing is becoming easier and easier. Several methods have been proposed for image splicing detection and all of them worked on certain existing color channels. However, the splicing artifacts vary in different color channels and the selection of color model is important for image splicing detection. In this article, instead of finding an existing color model, we propose a color channel design method to find the most discriminative channel which is referred to as optimal chroma-like channel for a given feature extraction method. Experimental results show that both spatial and frequency features extracted from the designed channel achieve higher detection rate than those extracted from traditional color channels.

  10. Optical-electronic device based on diffraction optical element for control of special protective tags executed from luminophor

    NASA Astrophysics Data System (ADS)

    Polyakov, M.; Odinokov, S.

    2017-05-01

    The report focuses on special printing industry, which is called secure printing, which uses printing techniques to prevent forgery or falsification of security documents. The report considered the possibility of establishing a spectral device for determining the authenticity of certain documents that are protected by machine-readable luminophor labels. The device works in two spectral ranges - visible and near infrared that allows to register Stokes and anti-Stokes spectral components of protective tags. The proposed device allows verification of the authenticity of security documents based on multiple criteria in different spectral ranges. It may be used at enterprises related to the production of security printing products, expert units of law enforcement bodies at check of authenticity of banknotes and other structures.

  11. X-ray computed tomography datasets for forensic analysis of vertebrate fossils

    PubMed Central

    Rowe, Timothy B.; Luo, Zhe-Xi; Ketcham, Richard A.; Maisano, Jessica A.; Colbert, Matthew W.

    2016-01-01

    We describe X-ray computed tomography (CT) datasets from three specimens recovered from Early Cretaceous lakebeds of China that illustrate the forensic interpretation of CT imagery for paleontology. Fossil vertebrates from thinly bedded sediments often shatter upon discovery and are commonly repaired as amalgamated mosaics grouted to a solid backing slab of rock or plaster. Such methods are prone to inadvertent error and willful forgery, and once required potentially destructive methods to identify mistakes in reconstruction. CT is an efficient, nondestructive alternative that can disclose many clues about how a specimen was handled and repaired. These annotated datasets illustrate the power of CT in documenting specimen integrity and are intended as a reference in applying CT more broadly to evaluating the authenticity of comparable fossils. PMID:27272251

  12. Review of passive-blind detection in digital video forgery based on sensing and imaging techniques

    NASA Astrophysics Data System (ADS)

    Tao, Junjie; Jia, Lili; You, Ying

    2016-01-01

    Advances in digital video compression and IP communication technologies raised new issues and challenges concerning the integrity and authenticity of surveillance videos. It is so important that the system should ensure that once recorded, the video cannot be altered; ensuring the audit trail is intact for evidential purposes. This paper gives an overview of passive techniques of Digital Video Forensics which are based on intrinsic fingerprints inherent in digital surveillance videos. In this paper, we performed a thorough research of literatures relevant to video manipulation detection methods which accomplish blind authentications without referring to any auxiliary information. We presents review of various existing methods in literature, and much more work is needed to be done in this field of video forensics based on video data analysis and observation of the surveillance systems.

  13. Experimental quantum forgery of quantum optical money

    NASA Astrophysics Data System (ADS)

    Bartkiewicz, Karol; Černoch, Antonín; Chimczak, Grzegorz; Lemr, Karel; Miranowicz, Adam; Nori, Franco

    2017-03-01

    Unknown quantum information cannot be perfectly copied (cloned). This statement is the bedrock of quantum technologies and quantum cryptography, including the seminal scheme of Wiesner's quantum money, which was the first quantum-cryptographic proposal. Surprisingly, to our knowledge, quantum money has not been tested experimentally yet. Here, we experimentally revisit the Wiesner idea, assuming a banknote to be an image encoded in the polarization states of single photons. We demonstrate that it is possible to use quantum states to prepare a banknote that cannot be ideally copied without making the owner aware of only unauthorized actions. We provide the security conditions for quantum money by investigating the physically-achievable limits on the fidelity of 1-to-2 copying of arbitrary sequences of qubits. These results can be applied as a security measure in quantum digital right management.

  14. Methods for the isolation, culture and assessment of the status of anaerobic rumen chytrids in both in vitro and in vivo systems.

    PubMed

    Rezaeian, Mohammad; Beakes, Gordon W; Parker, David S

    2004-10-01

    Anaerobic fungi were isolated from both the rumen and faeces of nine sheep and a cow. A reliable and simple method for the isolation of anaerobic fungi using 24 h rumen incubated milled straw as the inoculum source was developed. We also evaluate the use of chitin measurements as an assay of rumen fungal biomass. Chitin levels were determined from various sample sources (milled barley straw used as the fungal culture substrate in vitro; plant particulate digests from the rumen (PLP) and centrifuged strained rumen fluid (CSRF) using both HPLC and colorimetric methods. Both methods were highly correlated and consequently the simpler colorimetric method was adopted for subsequent studies. There was also a high degree of correlation between anaerobic fungal cellulase activities with the assayed chitin content of milled barley straw cultures over 12 d of an in vitro experiment. The colorimetric chitin assay protocol was then used to assess the diurnal variation and abundance of rumen fungi in in vivo assays. We assessed the distribution of chitin (mg g(-1) dry matter) in various fractions of the strained rumen fluid (SRF) and PLP samples from the rumen of sheep. Chitin was detected in all fractions of strained rumen fluid but the main source of chitin in the samples may be attributed to the fungal biomass. We did not detect any significant differences in chitin levels over a 24 h sampling period. Finally, an SEM study on subsamples of milled straw and plant particulate matter used in the chitin assays, revealed that the pattern of the fungal development on substrate material differs from the culture medium to the rumen.

  15. Keywords and Co-Occurrence Patterns in the Voynich Manuscript: An Information-Theoretic Analysis

    PubMed Central

    Montemurro, Marcelo A.; Zanette, Damián H.

    2013-01-01

    The Voynich manuscript has remained so far as a mystery for linguists and cryptologists. While the text written on medieval parchment -using an unknown script system- shows basic statistical patterns that bear resemblance to those from real languages, there are features that suggested to some researches that the manuscript was a forgery intended as a hoax. Here we analyse the long-range structure of the manuscript using methods from information theory. We show that the Voynich manuscript presents a complex organization in the distribution of words that is compatible with those found in real language sequences. We are also able to extract some of the most significant semantic word-networks in the text. These results together with some previously known statistical features of the Voynich manuscript, give support to the presence of a genuine message inside the book. PMID:23805215

  16. Advanced Q-switched DPSS lasers for ID-card marking

    NASA Astrophysics Data System (ADS)

    Hertwig, Michael; Paster, Martin; Terbrueggen, Ralf

    2008-02-01

    Increased homeland security concerns across the world have generated a strong demand for forgery-proof ID documents. Manufacturers currently employ a variety of high technology techniques to produce documents that are difficult to copy. However, production costs and lead times are still a concern when considering any possible manufacturing technology. Laser marking has already emerged as an important tool in the manufacturer's arsenal, and is currently being utilized to produce a variety of documents, such as plastic ID cards, drivers' licenses, health insurance cards and passports. The marks utilized can range from simple barcodes and text to high resolution, true grayscale images. The technical challenges posed by these marking tasks include delivering adequate mark legibility, minimizing substrate burning or charring, accurately reproducing grayscale data, and supporting the required process throughput. This article covers the advantages and basic requirements on laser marking of cards and reviews how laser output parameters affect marking quality, speed and overall process economics.

  17. Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran

    PubMed Central

    Khalil, Mohammed S.; Khan, Muhammad Khurram; Alginahi, Yasser M.

    2014-01-01

    This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small. PMID:25028681

  18. Two-layer fragile watermarking method secured with chaotic map for authentication of digital Holy Quran.

    PubMed

    Khalil, Mohammed S; Kurniawan, Fajri; Khan, Muhammad Khurram; Alginahi, Yasser M

    2014-01-01

    This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.

  19. Joint forensics and watermarking approach for video authentication

    NASA Astrophysics Data System (ADS)

    Thiemert, Stefan; Liu, Huajian; Steinebach, Martin; Croce-Ferri, Lucilla

    2007-02-01

    In our paper we discuss and compare the possibilities and shortcomings of both content-fragile watermarking and digital forensics and analyze if the combination of both techniques allows the identification of more than the sum of all manipulations identified by both techniques on their own due to synergetic effects. The first part of the paper discusses the theoretical possibilities offered by a combined approach, in which forensics and watermarking are considered as complementary tools for data authentication or deeply combined together, in order to reduce their error rate and to enhance the detection efficiency. After this conceptual discussion the paper proposes some concrete examples in which the joint approach is applied to video authentication. Some specific forensics techniques are analyzed and expanded to handle efficiently video data. The examples show possible extensions of passive-blind image forgery detection to video data, where the motion and time related characteristics of video are efficiently exploited.

  20. Science and the Detective: Selected Reading in Forensic Science

    NASA Astrophysics Data System (ADS)

    Kaye, Brian H.

    1996-12-01

    Who killed Napoleon? Were the witches of Salem high on LSD? What do maggots on a body tell us about the time of death? In his unique, engaging style, Brian Kaye tells the story of some spectacular cases in which forensic evidence played a key role. You'll also read about the fascinating ways in which scientific evidence can be used to establish guilt or innocence in today's courtroom. The use of voice analysis, methods for developing fingerprints and for uncovering art forgeries, and the examination of bullet wounds are just a few topics considered. In a special section on fraud, the author takes you into the world of counterfeit money. There's no solving crime without science. Written for everyone interested in whodunnits, this book explains the basis of the analytical techniques available for studying evidence in offenses ranging from doping in sports to first-degree murder.

  1. Glove-based approach to online signature verification.

    PubMed

    Kamel, Nidal S; Sayeed, Shohel; Ellis, Grant A

    2008-06-01

    Utilizing the multiple degrees of freedom offered by the data glove for each finger and the hand, a novel on-line signature verification system using the Singular Value Decomposition (SVD) numerical tool for signature classification and verification is presented. The proposed technique is based on the Singular Value Decomposition in finding r singular vectors sensing the maximal energy of glove data matrix A, called principal subspace, so the effective dimensionality of A can be reduced. Having modeled the data glove signature through its r-principal subspace, signature authentication is performed by finding the angles between the different subspaces. A demonstration of the data glove is presented as an effective high-bandwidth data entry device for signature verification. This SVD-based signature verification technique is tested and its performance is shown to be able to recognize forgery signatures with a false acceptance rate of less than 1.2%.

  2. Evaluation of the veracity of one work by the artist Di Cavalcanti through non-destructive techniques: XRF, imaging and brush stroke analysis

    NASA Astrophysics Data System (ADS)

    Kajiya, E. A. M.; Campos, P. H. O. V.; Rizzutto, M. A.; Appoloni, C. R.; Lopes, F.

    2014-02-01

    This paper presents systematic studies and analysis that contributed to the identification of the forgery of a work by the artist Emiliano Augusto Cavalcanti de Albuquerque e Melo, known as Di Cavalcanti. The use of several areas of expertise such as brush stroke analysis ("pinacologia"), applied physics, and art history resulted in an accurate diagnosis for ascertaining the authenticity of the work entitled "Violeiro" (1950). For this work we used non-destructive methods such as techniques of infrared, ultraviolet, visible and tangential light imaging combined with chemical analysis of the pigments by portable X-Ray Fluorescence (XRF) and graphic gesture analysis. Each applied method of analysis produced specific information that made possible the identification of materials and techniques employed and we concluded that this work is not consistent with patterns characteristic of the artist Di Cavalcanti.

  3. Designing lanthanide-doped nanocrystals with both up- and down-conversion luminescence for anti-counterfeiting

    NASA Astrophysics Data System (ADS)

    Liu, Yanlan; Ai, Kelong; Lu, Lehui

    2011-11-01

    The widespread forgery in all kinds of paper documents and certificates has become a real threat to society. Traditional fluorescent anti-counterfeiting materials generally exhibit unicolor display and suffer greatly from substitution, thus leading to a poor anti-counterfeiting effect. In this work, unseen but significant enhanced blue down-conversion emission from oleic acid-stabilized lanthanide-doped fluoride nanocrystals is first present and the mechanism is proposed and validated. This not only endows these nanocrystals with dual-mode fluorescence, but also offers a simplified synthesis approach for dual-mode fluorescent nanocrystals involving no further complicated assembly or coating procedures, unlike the traditional methods. Furthermore, by changing the host/dopant combination or the content of dopant, these nanocrystals can exhibit simultaneously multicolor up-conversion emission under excitation at near-infrared light and unalterable blue down-conversion emission under ultraviolet light. A preliminary investigation of their anti-counterfeiting performance has been made, and the results indicate that this color tuning capability and high concealment makes these nanocrystals behave in a similar way to chameleons and can provide a strengthened and more reliable anti-counterfeiting effect.The widespread forgery in all kinds of paper documents and certificates has become a real threat to society. Traditional fluorescent anti-counterfeiting materials generally exhibit unicolor display and suffer greatly from substitution, thus leading to a poor anti-counterfeiting effect. In this work, unseen but significant enhanced blue down-conversion emission from oleic acid-stabilized lanthanide-doped fluoride nanocrystals is first present and the mechanism is proposed and validated. This not only endows these nanocrystals with dual-mode fluorescence, but also offers a simplified synthesis approach for dual-mode fluorescent nanocrystals involving no further complicated assembly or coating procedures, unlike the traditional methods. Furthermore, by changing the host/dopant combination or the content of dopant, these nanocrystals can exhibit simultaneously multicolor up-conversion emission under excitation at near-infrared light and unalterable blue down-conversion emission under ultraviolet light. A preliminary investigation of their anti-counterfeiting performance has been made, and the results indicate that this color tuning capability and high concealment makes these nanocrystals behave in a similar way to chameleons and can provide a strengthened and more reliable anti-counterfeiting effect. Electronic supplementary information (ESI) available: Fig. S1-S6, Table S. See DOI: 10.1039/c1nr10752f

  4. Art and authenticity: the importance of originals in judgments of value.

    PubMed

    Newman, George E; Bloom, Paul

    2012-08-01

    Why are original artworks valued more than identical duplicates? The present studies explore 2 mechanisms underlying the special value of original artwork: the assessment of the art object as a unique creative act (performance) and the degree of physical contact with the original artist (contagion). Across 5 experiments, participants were exposed to hypothetical scenarios in which an original object was duplicated. The type of object varied across experiments (e.g., a painting vs. a piece of furniture) as did the circumstances surrounding the creation of the original object and the duplicate. Overall, the results support assessments of performance and contagion as key factors underlying the value of original artwork, and they are consistent with the conclusion that the discrepancy in value between original artworks and perfect duplicates derives from people's lay theories about the domain of art, rather than from associations with particular kinds of art or certain cases of forgery. (PsycINFO Database Record (c) 2012 APA, all rights reserved).

  5. Competing English, Spanish, and French alabaster trade in Europe over five centuries as evidenced by isotope fingerprinting

    PubMed Central

    Kloppmann, W.; Leroux, L.; Bromblet, P.; Le Pogam, P.-Y.; Cooper, A. H.; Worley, N.; Guerrot, C.; Montech, A. T.; Gallas, A. M.; Aillaud, R.

    2017-01-01

    A lack of written sources is a serious obstacle in the reconstruction of the medieval trade of art and art materials, and in the identification of artists, workshop locations, and trade routes. We use the isotopes of sulfur, oxygen, and strontium (S, O, Sr) present in gypsum alabaster to unambiguously link ancient European source quarries and areas to alabaster artworks produced over five centuries (12th–17th) held by the Louvre museum in Paris and other European and American collections. Three principal alabaster production areas are identified, in central England, northern Spain, and a major, long-lived but little-documented alabaster trade radiating from the French Alps. The related trade routes are mostly fluvial, although terrestrial transport crossing the major river basin borders is also confirmed by historical sources. Our study also identifies recent artwork restoration using Italian alabaster and provides a robust geochemical framework for provenancing, including recognition of restoration and forgeries. PMID:29078309

  6. Competing English, Spanish, and French alabaster trade in Europe over five centuries as evidenced by isotope fingerprinting.

    PubMed

    Kloppmann, W; Leroux, L; Bromblet, P; Le Pogam, P-Y; Cooper, A H; Worley, N; Guerrot, C; Montech, A T; Gallas, A M; Aillaud, R

    2017-11-07

    A lack of written sources is a serious obstacle in the reconstruction of the medieval trade of art and art materials, and in the identification of artists, workshop locations, and trade routes. We use the isotopes of sulfur, oxygen, and strontium (S, O, Sr) present in gypsum alabaster to unambiguously link ancient European source quarries and areas to alabaster artworks produced over five centuries (12th-17th) held by the Louvre museum in Paris and other European and American collections. Three principal alabaster production areas are identified, in central England, northern Spain, and a major, long-lived but little-documented alabaster trade radiating from the French Alps. The related trade routes are mostly fluvial, although terrestrial transport crossing the major river basin borders is also confirmed by historical sources. Our study also identifies recent artwork restoration using Italian alabaster and provides a robust geochemical framework for provenancing, including recognition of restoration and forgeries. Copyright © 2017 the Author(s). Published by PNAS.

  7. Competing English, Spanish, and French alabaster trade in Europe over five centuries as evidenced by isotope fingerprinting

    NASA Astrophysics Data System (ADS)

    Kloppmann, W.; Leroux, L.; Bromblet, P.; Le Pogam, P.-Y.; Cooper, A. H.; Worley, N.; Guerrot, C.; Montech, A. T.; Gallas, A. M.; Aillaud, R.

    2017-11-01

    A lack of written sources is a serious obstacle in the reconstruction of the medieval trade of art and art materials, and in the identification of artists, workshop locations, and trade routes. We use the isotopes of sulfur, oxygen, and strontium (S, O, Sr) present in gypsum alabaster to unambiguously link ancient European source quarries and areas to alabaster artworks produced over five centuries (12th–17th) held by the Louvre museum in Paris and other European and American collections. Three principal alabaster production areas are identified, in central England, northern Spain, and a major, long-lived but little-documented alabaster trade radiating from the French Alps. The related trade routes are mostly fluvial, although terrestrial transport crossing the major river basin borders is also confirmed by historical sources. Our study also identifies recent artwork restoration using Italian alabaster and provides a robust geochemical framework for provenancing, including recognition of restoration and forgeries.

  8. Computer loss experience and predictions

    NASA Astrophysics Data System (ADS)

    Parker, Donn B.

    1996-03-01

    The types of losses organizations must anticipate have become more difficult to predict because of the eclectic nature of computers and the data communications and the decrease in news media reporting of computer-related losses as they become commonplace. Total business crime is conjectured to be decreasing in frequency and increasing in loss per case as a result of increasing computer use. Computer crimes are probably increasing, however, as their share of the decreasing business crime rate grows. Ultimately all business crime will involve computers in some way, and we could see a decline of both together. The important information security measures in high-loss business crime generally concern controls over authorized people engaged in unauthorized activities. Such controls include authentication of users, analysis of detailed audit records, unannounced audits, segregation of development and production systems and duties, shielding the viewing of screens, and security awareness and motivation controls in high-value transaction areas. Computer crimes that involve highly publicized intriguing computer misuse methods, such as privacy violations, radio frequency emanations eavesdropping, and computer viruses, have been reported in waves that periodically have saturated the news media during the past 20 years. We must be able to anticipate such highly publicized crimes and reduce the impact and embarrassment they cause. On the basis of our most recent experience, I propose nine new types of computer crime to be aware of: computer larceny (theft and burglary of small computers), automated hacking (use of computer programs to intrude), electronic data interchange fraud (business transaction fraud), Trojan bomb extortion and sabotage (code security inserted into others' systems that can be triggered to cause damage), LANarchy (unknown equipment in use), desktop forgery (computerized forgery and counterfeiting of documents), information anarchy (indiscriminate use of crypto without control), Internet abuse (antisocial use of data communications), and international industrial espionage (governments stealing business secrets). A wide variety of safeguards are necessary to deal with these new crimes. The most powerful controls include (1) carefully controlled use of cryptography and digital signatures with good key management and overriding business and government decryption capability and (2) use of tokens such as smart cards to increase the strength of secret passwords for authentication of computer users. Jewelry-type security for small computers--including registration of serial numbers and security inventorying of equipment, software, and connectivity--will be necessary. Other safeguards include automatic monitoring of computer use and detection of unusual activities, segmentation and filtering of networks, special paper and ink for documents, and reduction of paper documents. Finally, international cooperation of governments to create trusted environments for business is essential.

  9. Aluminum nanostructures with strong visible-range SERS activity for versatile micropatterning of molecular security labels.

    PubMed

    Lay, Chee Leng; Koh, Charlynn Sher Lin; Wang, Jing; Lee, Yih Hong; Jiang, Ruibin; Yang, Yijie; Yang, Zhe; Phang, In Yee; Ling, Xing Yi

    2018-01-03

    The application of aluminum (Al)-based nanostructures for visible-range plasmonics, especially for surface-enhanced Raman scattering (SERS), currently suffers from inconsistent local electromagnetic field distributions and/or inhomogeneous distribution of probe molecules. Herein, we lithographically fabricate structurally uniform Al nanostructures which enable homogeneous adsorption of various probe molecules. Individual Al nanostructures exhibit strong local electromagnetic field enhancements, in turn leading to intense SERS activity. The average SERS enhancement factor (EF) for individual nanostructures exceeds 10 4 for non-resonant probe molecules in the visible spectrum. These Al nanostructures also retain more than 70% of their original SERS intensities after one-month storage, displaying superb stability under ambient conditions. We further achieve tunable polarization-dependent SERS responses using anisotropic Al nanostructures, facilitating the design of sophisticated SERS-based security labels. Our micron-sized security label comprises two-tier security features, including a machine-readable hybrid quick-response (QR) code overlaid with a set of ciphertexts. Our work demonstrates the versatility of Al-based structures in low-cost modern chemical nano-analytics and forgery protection.

  10. Origin and development of forensic medicine in Egypt.

    PubMed

    Kharoshah, Magdy Abdel Azim; Zaki, Mamdouh Kamal; Galeb, Sherien Salah; Moulana, Ashraf Abdel Reheem; Elsebaay, Elsebaay Ahmed

    2011-01-01

    Egyptians are one of the first civilisations to practice the removal and examination of internal organs of humans. Their practices ranged from embalming to faith healing to surgery and autopsy. Modern radiological studies, together with various forensic techniques, allowed scientists unique glimpses of the state of health in Egypt 4000 years ago and discovered one of the earliest applications of autopsy, the main element of forensic medicine practice today. The Egyptian Forensic Medicine Authority handles a relatively large number of cases annually and depends on different assisting laboratories (forensic histopathology, microbiology, serology unit, DNA laboratory, forensic chemistry laboratory) as well as the Counterfeiting and Forgery unit. Crime scene investigations are performed mainly through the criminal laboratory related to the Ministry of Interior. Forensic Medicine is studied thoroughly in the faculty of medicine (undergraduates), as well as by forensic medical examiners at postgraduate level (diploma, master's and doctorate). This review recommends more scientific cooperation with universities in the field of forensic medicine and related sciences to solve various crimes with meticulous detail. Copyright © 2010 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  11. Finger vein extraction using gradient normalization and principal curvature

    NASA Astrophysics Data System (ADS)

    Choi, Joon Hwan; Song, Wonseok; Kim, Taejeong; Lee, Seung-Rae; Kim, Hee Chan

    2009-02-01

    Finger vein authentication is a personal identification technology using finger vein images acquired by infrared imaging. It is one of the newest technologies in biometrics. Its main advantage over other biometrics is the low risk of forgery or theft, due to the fact that finger veins are not normally visible to others. Extracting finger vein patterns from infrared images is the most difficult part in finger vein authentication. Uneven illumination, varying tissues and bones, and changes in the physical conditions and the blood flow make the thickness and brightness of the same vein different in each acquisition. Accordingly, extracting finger veins at their accurate positions regardless of their thickness and brightness is necessary for accurate personal identification. For this purpose, we propose a new finger vein extraction method which is composed of gradient normalization, principal curvature calculation, and binarization. As local brightness variation has little effect on the curvature and as gradient normalization makes the curvature fairly uniform at vein pixels, our method effectively extracts finger vein patterns regardless of the vein thickness or brightness. In our experiment, the proposed method showed notable improvement as compared with the existing methods.

  12. (t, n) Threshold d-Level Quantum Secret Sharing.

    PubMed

    Song, Xiu-Li; Liu, Yan-Bing; Deng, Hong-Yao; Xiao, Yong-Gang

    2017-07-25

    Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants' shares, even the trusted reconstructor Bob 1 is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n - 1.

  13. On the lost portrait of Galileo by the Tuscan painter Santi di Tito

    NASA Astrophysics Data System (ADS)

    Molaro, Paolo

    2016-12-01

    We study here the first established image of Galileo from the engraving made by Giuseppe Calendi at the end of the eighteenth century after a lost portrait of 1601 by Santi di Tito. We show that the engraving cannot be an exact copy, as it contains several inaccuracies which are unlikely to have been present in the original painting. A recent claim of the discovery of the painting by Santi di Tito is examined, and some reasons for suspecting it to be a forgery are outlined. As an alternative, we suggest a connection between the engraving and a portrait attributed to Tintoretto (which is currently in the collection of the Padua Civic Museum). The engraving and the Padua painting look quite different but can be traced to a common origin if we assume that Calendi added the half body, copied the painting onto copper plate directly, and adjusted the shading slightly. In this way, several features and details of the engraving find a plausible explanation. Finally, we note a remarkable similarity between the Padua portrait and a figure included in a Cologne painting by Rubens dating to about 1602-1604, which was suggested by Huemer to be Galileo.

  14. A slippery molecular assembly allows water as a self-erasable security marker

    PubMed Central

    Thirumalai, Rajasekaran; Mukhopadhyay, Rahul Dev; Praveen, Vakayil K.; Ajayaghosh, Ayyappanpillai

    2015-01-01

    Protection of currency and valuable documents from counterfeit continues to be a challenge. While there are many embedded security features available for document safety, they are not immune to forgery. Fluorescence is a sensitive property, which responds to external stimuli such as solvent polarity, temperature or mechanical stress, however practical use in security applications is hampered due to several reasons. Therefore, a simple and specific stimuli responsive security feature that is difficult to duplicate is of great demand. Herein we report the design of a fluorescent molecular assembly on which water behaves as a self-erasable security marker for checking the authenticity of documents at point of care. The underlying principle involves the disciplined self-assembly of a tailor-made fluorescent molecule, which initially form a weak blue fluorescence (λem = 425 nm, Φf = 0.13) and changes to cyan emission (λem = 488 nm,Φf = 0.18) in contact with water due to a reversible molecular slipping motion. This simple chemical tool, based on the principles of molecular self-assembly and fluorescence modulation, allows creation of security labels and optically masked barcodes for multiple documents authentication. PMID:25940779

  15. Forgery at the Snite Museum of Art? Improving AMS Radiocarbon Dating at the University of Notre Dame

    NASA Astrophysics Data System (ADS)

    Troyer, Laura; Bagwell, Connor; Anderson, Tyler; Clark, Adam; Nelson, Austin; Skulski, Michael; Collon, Philippe

    2017-09-01

    The Snite Museum of Art recently obtained several donations of artifacts. Five of the pieces lack sufficient background information to prove authenticity and require further analysis to positively determine the artwork's age. One method to determine the artwork's age is radiocarbon dating via Accelerator Mass Spectrometry (AMS) performed at the University of Notre Dame's Nuclear Science Laboratory. Samples are prepared by combustion of a small amount of material and subsequent reduction to carbon into an iron powder matrix (graphitization). The graphitization procedure affects the maximum measurement rate, and a poor graphitization can be detrimental to the AMS measurement of the sample. Previous graphitization procedures resulted in a particle current too low or inconsistent to optimize AMS measurements. Thus, there was a desire to design and refine the graphitization system. The finalized process yielded physically darker samples and increased sample currents by two orders of magnitude. Additionally, the first testing of the samples was successful, yet analysis of the dates proved inconclusive. AMS measurements will be performed again to obtain better sampling statistics in the hopes of narrowing the reported date ranges. NSF and JINA-CEE.

  16. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    NASA Astrophysics Data System (ADS)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  17. Watermarking and copyright labeling of printed images

    NASA Astrophysics Data System (ADS)

    Hel-Or, Hagit Z.

    2001-07-01

    Digital watermarking is a labeling technique for digital images which embeds a code into the digital data so the data are marked. Watermarking techniques previously developed deal with on-line digital data. These techniques have been developed to withstand digital attacks such as image processing, image compression and geometric transformations. However, one must also consider the readily available attack of printing and scanning. The available watermarking techniques are not reliable under printing and scanning. In fact, one must consider the availability of watermarks for printed images as well as for digital images. An important issue is to intercept and prevent forgery in printed material such as currency notes, back checks, etc. and to track and validate sensitive and secrete printed material. Watermarking in such printed material can be used not only for verification of ownership but as an indicator of date and type of transaction or date and source of the printed data. In this work we propose a method of embedding watermarks in printed images by inherently taking advantage of the printing process. The method is visually unobtrusive to the printed image, the watermark is easily extracted and is robust under reconstruction errors. The decoding algorithm is automatic given the watermarked image.

  18. A slippery molecular assembly allows water as a self-erasable security marker.

    PubMed

    Thirumalai, Rajasekaran; Mukhopadhyay, Rahul Dev; Praveen, Vakayil K; Ajayaghosh, Ayyappanpillai

    2015-05-05

    Protection of currency and valuable documents from counterfeit continues to be a challenge. While there are many embedded security features available for document safety, they are not immune to forgery. Fluorescence is a sensitive property, which responds to external stimuli such as solvent polarity, temperature or mechanical stress, however practical use in security applications is hampered due to several reasons. Therefore, a simple and specific stimuli responsive security feature that is difficult to duplicate is of great demand. Herein we report the design of a fluorescent molecular assembly on which water behaves as a self-erasable security marker for checking the authenticity of documents at point of care. The underlying principle involves the disciplined self-assembly of a tailor-made fluorescent molecule, which initially form a weak blue fluorescence (λem = 425 nm, Φf = 0.13) and changes to cyan emission (λem = 488 nm,Φf = 0.18) in contact with water due to a reversible molecular slipping motion. This simple chemical tool, based on the principles of molecular self-assembly and fluorescence modulation, allows creation of security labels and optically masked barcodes for multiple documents authentication.

  19. Paper Spray Mass Spectrometry for the Forensic Analysis of Black Ballpoint Pen Inks

    NASA Astrophysics Data System (ADS)

    Amador, Victoria Silva; Pereira, Hebert Vinicius; Sena, Marcelo Martins; Augusti, Rodinei; Piccin, Evandro

    2017-09-01

    This article describes the use of paper spray mass spectrometry (PS-MS) for the direct analysis of black ink writings made with ballpoint pens. The novel approach was developed in a forensic context by first performing the classification of commercially available ballpoint pens according to their brands. Six of the most commonly worldwide utilized brands (Bic, Paper Mate, Faber Castell, Pentel, Compactor, and Pilot) were differentiated according to their characteristic chemical patterns obtained by PS-MS. MS on the negative ion mode at a mass range of m/ z 100-1000 allowed prompt discrimination just by visual inspection. On the other hand, the concept of relative ion intensity (RII) and the analysis at other mass ranges were necessary for the differentiation using the positive ion mode. PS-MS combined with partial least squares (PLS) was utilized to monitor changes on the ink chemical composition after light exposure (artificial aging studies). The PLS model was optimized by variable selection, which allowed the identification of the most influencing ions on the degradation process. The feasibility of the method on forensic investigations was also demonstrated in three different applications: (1) analysis of overlapped fresh ink lines, (2) analysis of old inks from archived documents, and (3) detection of alterations (simulated forgeries) performed on archived documents. [Figure not available: see fulltext.

  20. Secrets in the Ancient Goatskins: X-Rays Reveal Archimedes' Oldest Writings

    ScienceCinema

    Bergmann, Uwe

    2017-12-22

    Archimedes of Syracruse (287 - 212 B.C.) is considered one of the most brilliant thinkers of all time. The tenth-century parchment known as the Archimedes Palimpsest is by far the oldest surviving manuscript containing works of Archimedes. it is also the unique source for three of the Greek's treatises: the Stomachion, the Method of Mechanical Theorems, and the Greek version of On Floating Bodies. The privately owned palimpsest is the subject of a integrated campaign of conservation, imaging, and scholarship being undertaken at the Walters Art Museum in Baltimore. Much of the text has been imaged by various optical techniques, but significant gaps in our knowledge of the writing of Archimedes remained. A breakthrough in uncovering the missing Archimedes writings was achieved at the Stanford Synchrotron Radiation Laboratory. Using x-ray fluorescence imaging, writings from faint traces of the partly erased iron gall ink were brought to light. The x-ray image revealed Archimedes writings from some of his most important works covered by twelfth-century biblical texts and twentieth-century gold forgeries. This talk will focus on the fascinating journal of a 1,000 year old parchment from its origin in the Mediterranean city of Constantinople to an x-ray beamline at SLAC.

  1. Collocated Dataglyphs for large-message storage and retrieval

    NASA Astrophysics Data System (ADS)

    Motwani, Rakhi C.; Breidenbach, Jeff A.; Black, John R.

    2004-06-01

    In contrast to the security and integrity of electronic files, printed documents are vulnerable to damage and forgery due to their physical nature. Researchers at Palo Alto Research Center utilize DataGlyph technology to render digital characteristics to printed documents, which provides them with the facility of tamper-proof authentication and damage resistance. This DataGlyph document is known as GlyphSeal. Limited DataGlyph carrying capacity per printed page restricted the application of this technology to a domain of graphically simple and small-sized single-paged documents. In this paper the authors design a protocol motivated by techniques from the networking domain and back-up strategies, which extends the GlyphSeal technology to larger-sized, graphically complex, multi-page documents. This protocol provides fragmentation, sequencing and data loss recovery. The Collocated DataGlyph Protocol renders large glyph messages onto multiple printed pages and recovers the glyph data from rescanned versions of the multi-page documents, even when pages are missing, reordered or damaged. The novelty of this protocol is the application of ideas from RAID to the domain of DataGlyphs. The current revision of this protocol is capable of generating at most 255 pages, if page recovery is desired and does not provide enough data density to store highly detailed images in a reasonable amount of page space.

  2. Secrets in the Ancient Goatskins: X-Rays Reveal Archimedes' Oldest Writings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bergmann, Uwe

    2008-04-02

    Archimedes of Syracruse (287 - 212 B.C.) is considered one of the most brilliant thinkers of all time. The tenth-century parchment known as the Archimedes Palimpsest is by far the oldest surviving manuscript containing works of Archimedes. it is also the unique source for three of the Greek's treatises: the Stomachion, the Method of Mechanical Theorems, and the Greek version of On Floating Bodies. The privately owned palimpsest is the subject of a integrated campaign of conservation, imaging, and scholarship being undertaken at the Walters Art Museum in Baltimore. Much of the text has been imaged by various optical techniques,more » but significant gaps in our knowledge of the writing of Archimedes remained. A breakthrough in uncovering the missing Archimedes writings was achieved at the Stanford Synchrotron Radiation Laboratory. Using x-ray fluorescence imaging, writings from faint traces of the partly erased iron gall ink were brought to light. The x-ray image revealed Archimedes writings from some of his most important works covered by twelfth-century biblical texts and twentieth-century gold forgeries. This talk will focus on the fascinating journal of a 1,000 year old parchment from its origin in the Mediterranean city of Constantinople to an x-ray beamline at SLAC.« less

  3. Archimedes Manuscript under X-ray Vision

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bergmann, Uwe

    2006-09-25

    Archimedes of Syracuse (287 - 212 BC) is considered one of the most brilliant thinkers of all times. The 10th century parchment document known as the Archimedes Palimpsest is the unique source for two of the Greek's treatises - the Stomachion, and The Method of Mechanical Theorems. It is also the only source for On Floating Bodies in Greek. The privately owned palimpsest is the subject of an integrated campaign of conservation, imaging, and scholarship being undertaken at the Walters Art Museum in Baltimore. Much of the text has been imaged by various optical techniques, but significant gaps remain inmore » our knowledge of the writings of Archimedes, while texts by other authors - potentially of major significance - remain yet unread. A breakthrough in uncovering the missing Archimedes writings has recently been achieved at the Stanford Synchrotron Radiation Laboratory. Using x-ray fluorescence imaging, writings from faint traces of the partly erased iron gall ink were brought to light. The x-ray image revealed Archimedes writings from some of his most important works covered by 12th century biblical texts and 20th century gold forgeries. Please join me in a fascinating journey of a 1000 year old parchment from its origin in the Mediterranean city of Constantinople to an x-ray beam line in Menlo Park, California.« less

  4. Secrets in the Ancient Goatskins: X-Rays Reveal archimedes' Oldest Writings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bergmann, Uwe

    2008-04-02

    Archimedes of Syracruse (287 - 212 B.C.) is considered one of the most brilliant thinkers of all time. The tenth-century parchment known as the Archimedes Palimpsest is by far the oldest surviving manuscript containing works of Archimedes. it is also the unique source for three of the Greek's treatises: the Stomachion, the Method of Mechanical Theorems, and the Greek version of On Floating Bodies. The privately owned palimpsest is the subject of a integrated campaign of conservation, imaging, and scholarship being undertaken at the Walters Art Museum in Baltimore. Much of the text has been imaged by various optical techniques,more » but significant gaps in our knowledge of the writing of Archimedes remained. A breakthrough in uncovering the missing Archimedes writings was achieved at the Stanford Synchrotron Radiation Laboratory. Using x-ray fluorescence imaging, writings from faint traces of the partly erased iron gall ink were brought to light. The x-ray image revealed Archimedes writings from some of his most important works covered by twelfth-century biblical texts and twentieth-century gold forgeries. This talk will focus on the fascinating journal of a 1,000 year old parchment from its origin in the Mediterranean city of Constantinople to an x-ray beamline at SLAC.« less

  5. FIR signature verification system characterizing dynamics of handwriting features

    NASA Astrophysics Data System (ADS)

    Thumwarin, Pitak; Pernwong, Jitawat; Matsuura, Takenobu

    2013-12-01

    This paper proposes an online signature verification method based on the finite impulse response (FIR) system characterizing time-frequency characteristics of dynamic handwriting features. First, the barycenter determined from both the center point of signature and two adjacent pen-point positions in the signing process, instead of one pen-point position, is used to reduce the fluctuation of handwriting motion. In this paper, among the available dynamic handwriting features, motion pressure and area pressure are employed to investigate handwriting behavior. Thus, the stable dynamic handwriting features can be described by the relation of the time-frequency characteristics of the dynamic handwriting features. In this study, the aforesaid relation can be represented by the FIR system with the wavelet coefficients of the dynamic handwriting features as both input and output of the system. The impulse response of the FIR system is used as the individual feature for a particular signature. In short, the signature can be verified by evaluating the difference between the impulse responses of the FIR systems for a reference signature and the signature to be verified. The signature verification experiments in this paper were conducted using the SUBCORPUS MCYT-100 signature database consisting of 5,000 signatures from 100 signers. The proposed method yielded equal error rate (EER) of 3.21% on skilled forgeries.

  6. Mediated definite delegation - Certified Grid jobs in ALICE and beyond

    NASA Astrophysics Data System (ADS)

    Schreiner, Steffen; Grigoras, Costin; Litmaath, Maarten; Betev, Latchezar; Buchmann, Johannes

    2012-12-01

    Grid computing infrastructures need to provide traceability and accounting of their users’ activity and protection against misuse and privilege escalation, where the delegation of privileges in the course of a job submission is a key concern. This work describes an improved handling of Multi-user Grid Jobs in the ALICE Grid Services. A security analysis of the ALICE Grid job model is presented with derived security objectives, followed by a discussion of existing approaches of unrestricted delegation based on X.509 proxy certificates and the Grid middleware gLExec. Unrestricted delegation has severe security consequences and limitations, most importantly allowing for identity theft and forgery of jobs and data. These limitations are discussed and formulated, both in general and with respect to an adoption in line with Multi-user Grid Jobs. A new general model of mediated definite delegation is developed, allowing a broker to dynamically process and assign Grid jobs to agents while providing strong accountability and long-term traceability. A prototype implementation allowing for fully certified Grid jobs is presented as well as a potential interaction with gLExec. The achieved improvements regarding system security, malicious job exploitation, identity protection, and accountability are emphasized, including a discussion of non-repudiation in the face of malicious Grid jobs.

  7. Recognizing ancient papyri by a combination of spectroscopic, diffractional and chromatographic analytical tools

    PubMed Central

    Łojewska, J.; Rabin, I.; Pawcenis, D.; Bagniuk, J.; Aksamit-Koperska, M. A.; Sitarz, M.; Missori, M.; Krutzsch, M.

    2017-01-01

    Ancient papyri are a written heritage of culture that flourished more than 3000 years ago in Egypt. One of the most significant collections in the world is housed in the Egyptian Museum and Papyrus Collection in Berlin, from where the samples for our investigation come. The papyrologists, curators and conservators of such collections search intensely for the analytical detail that would allow ancient papyri to be distinguished from modern fabrications, in order to detect possible forgeries, assess papyrus deterioration state, and improve the design of storage conditions and conservation methods. This has become the aim of our investigation. The samples were studied by a number of methods, including spectroscopic (FTIR, fluorescent-FS, Raman) diffractional (XRD) and chromatographic (size exclusion chromatography-SEC), selected in order to determine degradation parameters: overall oxidation of lignocellulosic material, degree of polymerization and crystallinity of cellulose. The results were correlated with those obtained from carefully selected model samples including modern papyri and paper of different composition aged at elevated temperature in humid air. The methods were classified in the order SEC > FS > FTIR > XRD, based on their effectiveness in discriminating the state of papyri degradation. However, the most trustworthy evaluation of the age of papyri samples should rely on several methods. PMID:28382971

  8. Recognizing ancient papyri by a combination of spectroscopic, diffractional and chromatographic analytical tools.

    PubMed

    Łojewska, J; Rabin, I; Pawcenis, D; Bagniuk, J; Aksamit-Koperska, M A; Sitarz, M; Missori, M; Krutzsch, M

    2017-04-06

    Ancient papyri are a written heritage of culture that flourished more than 3000 years ago in Egypt. One of the most significant collections in the world is housed in the Egyptian Museum and Papyrus Collection in Berlin, from where the samples for our investigation come. The papyrologists, curators and conservators of such collections search intensely for the analytical detail that would allow ancient papyri to be distinguished from modern fabrications, in order to detect possible forgeries, assess papyrus deterioration state, and improve the design of storage conditions and conservation methods. This has become the aim of our investigation. The samples were studied by a number of methods, including spectroscopic (FTIR, fluorescent-FS, Raman) diffractional (XRD) and chromatographic (size exclusion chromatography-SEC), selected in order to determine degradation parameters: overall oxidation of lignocellulosic material, degree of polymerization and crystallinity of cellulose. The results were correlated with those obtained from carefully selected model samples including modern papyri and paper of different composition aged at elevated temperature in humid air. The methods were classified in the order SEC > FS > FTIR > XRD, based on their effectiveness in discriminating the state of papyri degradation. However, the most trustworthy evaluation of the age of papyri samples should rely on several methods.

  9. Problem Gambling Associated with Violent and Criminal Behaviour: A Danish Population-Based Survey and Register Study.

    PubMed

    Laursen, Bjarne; Plauborg, Rikke; Ekholm, Ola; Larsen, Christina Viskum Lytken; Juel, Knud

    2016-03-01

    This study compares the number of criminal charges among problem gamblers (N = 384) and non-problem gamblers including non-gamblers (N = 18,241) and examines whether problem gambling is more strongly associated with income-generating crimes like theft, fraud and forgery than other types of crimes such as violent crimes. A cohort study was carried out, based on data from the Danish Health and Morbidity Surveys in 2005 and 2010, which were linked at the individual level with data from The Danish National Criminal Register. Multiple logistic regression analyses were used to determine the association between problem gambling and charges for different categories of crime. We found that problem gamblers had significantly higher odds of being charged than non-problem gamblers (adjusted odds ratio 1.5; 95 % confidence interval 1.1-1.9). The odds ratio for economic crime charges was 2.6 (1.5-4.5), for violence charges 2.2 (1.1-4.5), and for drug charges 3.7 (1.7-8.0). For road traffic charges the odds ratio was 1.3 (1.0-1.8). Hence, there was a strong association between problem gambling and being charged except for road traffic charges; however the association was not stronger for economic charges than for violence and drug charges.

  10. Measurement-device-independent quantum digital signatures

    NASA Astrophysics Data System (ADS)

    Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika

    2016-08-01

    Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.

  11. Structural examination of easel paintings with optical coherence tomography.

    PubMed

    Targowski, Piotr; Iwanicka, Magdalena; Tymińska-Widmer, Ludmiła; Sylwestrzak, Marcin; Kwiatkowska, Ewa A

    2010-06-15

    Identification of the order, thickness, composition, and possibly the origin of the paint layers forming the structure of a painting, that is, its stratigraphy, is important in confirming its attribution and history as well as planning conservation treatments. The most common method of examination is analysis of a sample collected from the art object, both visually with a microscope and instrumentally through a variety of sophisticated, modern analytical tools. Because of its invasiveness, however, sampling is less than ideally compatible with conservation ethics; it is severely restricted with respect to the amount of material extirpated from the artwork. Sampling is also rather limited in that it provides only very local information. There is, therefore, a great need for a noninvasive method with sufficient in-depth resolution for resolving the stratigraphy of works of art. Optical coherence tomography (OCT) is a noninvasive, noncontact method of optical sectioning of partially transparent objects, with micrometer-level axial resolution. The method utilizes near-infrared light of low intensity (a few milliwatts) to obtain cross-sectional images of various objects; it has been mostly used in medical diagnostics. Through the serial collection of many such images, volume information may be extracted. The application of OCT to the examination of art objects has been in development since 2003. In this Account, we present a short introduction to the technique, briefly discuss the apparatus we use, and provide a paradigm for reading OCT tomograms. Unlike the majority of papers published previously, this Account focuses on one, very specific, use of OCT. We then consider two examples of successful, practical application of the technique. At the request of a conservation studio, the characteristics of inscriptions on two oil paintings, originating from the 18th and 19th centuries, were analyzed. In the first case, it was possible to resolve some questions concerning the history of the work. From an analysis of the positions of the paint layers involved in three inscriptions in relation to other strata of the painting, the order of events in its history was resolved. It was evident that the original text had been overpainted and that the other inscriptions were added later, thus providing convincing evidence as to the painting's true date of creation. In the second example, a painting was analyzed with the aim of confirming the possibility of forgery of the artist's signature, and evidence strongly supporting this supposition is presented. These two specific examples of successful use of the technique on paintings further demonstrate how OCT may be readily adaptable to other similar tasks, such as in the fields of forensic or materials science. In a synergistic approach, in which information is obtained with a variety of noninvasive techniques, OCT is demonstrably effective and offers great potential for further development.

  12. 49 CFR 802.7 - Requests: How, where, and when presented; verification of identity of individuals making requests...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...; verification of identity of individuals making requests; accompanying persons; and procedures for... individuals making requests; accompanying persons; and procedures for acknowledgment of requests. (a) Requests... Request,” “Privacy Act Statement of Disagreement,” “Privacy Act Disclosure Accounting Request,” “Appeal...

  13. 12 CFR 1402.27 - Aggregating requests.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Information § 1402.27 Aggregating requests. A requester may not file multiple requests at the same time, each... in concert, is attempting to break a request down into a series of requests for the purpose of... reasonable is the time period over which the requests have occurred. ...

  14. 12 CFR 1402.27 - Aggregating requests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Information § 1402.27 Aggregating requests. A requester may not file multiple requests at the same time, each... in concert, is attempting to break a request down into a series of requests for the purpose of... reasonable is the time period over which the requests have occurred. ...

  15. 12 CFR 1402.27 - Aggregating requests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Information § 1402.27 Aggregating requests. A requester may not file multiple requests at the same time, each... in concert, is attempting to break a request down into a series of requests for the purpose of... reasonable is the time period over which the requests have occurred. ...

  16. 25 CFR 517.4 - Requirements for making requests.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... INFORMATION ACT PROCEDURES § 517.4 Requirements for making requests. (a) How to make a FOIA request. Requests... additional information. If the requester is making a request for records about another individual, the..., the requester will be notified of this decision and advised that fees associated with the processing...

  17. 76 FR 34102 - Request for Comments-LSC Budget Request for FY 2013

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-10

    ... LEGAL SERVICES CORPORATION Request for Comments--LSC Budget Request for FY 2013 AGENCY: Legal Services Corporation. ACTION: Request for Comments--LSC Budget Request for FY 2013. SUMMARY: The Legal Services Corporation is beginning the process of developing its FY 2013 budget request to Congress and is...

  18. 75 FR 54389 - Request for Comments-LSC Budget Request for FY 2012

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-07

    ... LEGAL SERVICES CORPORATION Request for Comments--LSC Budget Request for FY 2012 AGENCY: Legal Services Corporation. ACTION: Request for Comments--LSC Budget Request for FY 2012. SUMMARY: The Legal Services Corporation is beginning the process of developing its FY 2012 budget request to Congress and is...

  19. 77 FR 27801 - Request for Comments-LSC Budget Request for FY 2014

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-11

    ... LEGAL SERVICES CORPORATION Request for Comments--LSC Budget Request for FY 2014 AGENCY: Legal Services Corporation. ACTION: Request for Comments--LSC Budget Request for FY 2014. SUMMARY: The Legal Services Corporation is beginning the process of developing its FY 2014 budget request to Congress and is...

  20. 38 CFR 20.1304 - Rule 1304. Request for change in representation, request for personal hearing, or submission of...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... change in representation, request for personal hearing, or submission of additional evidence following... Miscellaneous § 20.1304 Rule 1304. Request for change in representation, request for personal hearing, or...) Request for a change in representation, request for a personal hearing, or submission of additional...

  1. 36 CFR 1007.4 - Preliminary processing of requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... requests. 1007.4 Section 1007.4 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE FREEDOM OF INFORMATION ACT § 1007.4 Preliminary processing of requests. (a) Scope of requests. Unless a... request under § 1007.6, the requester shall be notified of the delay as provided in § 1007.6(f). (5...

  2. 76 FR 24912 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Request for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... for OMB Review; Comment Request; Request for Examination and/or Treatment ACTION: Notice. SUMMARY: The... information collection request (ICR) titled, ``Request for Examination and/or Treatment,'' Form LS-1, to the... Request for Examination and/or Treatment, Form LS-1, is used by employers to authorize medical treatment...

  3. Atomic memory access hardware implementations

    DOEpatents

    Ahn, Jung Ho; Erez, Mattan; Dally, William J

    2015-02-17

    Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.

  4. 18 CFR 388.108 - Requests for Commission records not available through the Public Reference Room (FOIA requests).

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... RULES INFORMATION AND REQUESTS § 388.108 Requests for Commission records not available through the... “Freedom of Information Act Request.” (ii) The request must include: (A) A statement by the requester of a... paragraph (a)(5) of this section. (5) Except for the purpose of making a determination regarding expedited...

  5. 78 FR 66382 - Agency Information Collection Activities; Proposed Collection; Comments Requested: Request by...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-05

    ... Information Collection Activities; Proposed Collection; Comments Requested: Request by Organization for... Information Collection: New Voluntary Collection. (2) Title of the Form/Collection: Request by Organization... information collection request to the Office of Management and Budget (OMB) for review and approval in...

  6. 8 CFR 103.40 - Genealogical Research Requests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Genealogical Research Requests. 103.40... Research Requests. (a) Nature of requests. Genealogy requests are requests for searches and/or copies of historical records relating to a deceased person, usually for genealogy and family history research purposes...

  7. 8 CFR 103.40 - Genealogical Research Requests.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    .... Genealogy requests are requests for searches and/or copies of historical records relating to a deceased person, usually for genealogy and family history research purposes. (b) Manner of requesting genealogical searches and records. Requests must be submitted on Form G-1041, Genealogy Index Search Request, or Form G...

  8. 78 FR 75575 - Agency Information Collection Activities: Submission for OMB Review; Comment Request; Request for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-12

    ... Request; Request for the Site Inspection, Landowners Authorization/Ingress/Egress Agreement. AGENCY... . SUPPLEMENTARY INFORMATION: Collection of Information Title: Request for the Site Inspection, Landowners...-09, Request for the Site Inspection; FEMA Form 010-0-10, Landowner's Authorization Ingress- Egress...

  9. 18 CFR 385.2013 - Notification of requests for Federal authorizations and requests for further information (Rule...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... requests for Federal authorizations and requests for further information (Rule 2013). 385.2013 Section 385.2013 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF... Before the Commission § 385.2013 Notification of requests for Federal authorizations and requests for...

  10. 18 CFR 385.2013 - Notification of requests for Federal authorizations and requests for further information (Rule...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... requests for Federal authorizations and requests for further information (Rule 2013). 385.2013 Section 385.2013 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF... Before the Commission § 385.2013 Notification of requests for Federal authorizations and requests for...

  11. 25 CFR 517.6 - Timing of responses to requests.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... FOIA Officer will respond. Unusual circumstances warranting extension are: (i) The need to search for... the office processing the request; (ii) The need to search for, collect, and appropriately examine a... conclude that a requester or group of requesters has divided a request into a series of requests on a...

  12. 25 CFR 517.6 - Timing of responses to requests.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... FOIA Officer will respond. Unusual circumstances warranting extension are: (i) The need to search for... the office processing the request; (ii) The need to search for, collect, and appropriately examine a... conclude that a requester or group of requesters has divided a request into a series of requests on a...

  13. 25 CFR 517.6 - Timing of responses to requests.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... FOIA Officer will respond. Unusual circumstances warranting extension are: (i) The need to search for... the office processing the request; (ii) The need to search for, collect, and appropriately examine a... conclude that a requester or group of requesters has divided a request into a series of requests on a...

  14. 32 CFR 300.7 - FOIA request processing procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... (CONTINUED) FREEDOM OF INFORMATION ACT PROGRAM DEFENSE LOGISTICS AGENCY FREEDOM OF INFORMATION ACT PROGRAM... request is perfected. When a DLA FOIA Requester Service Center receives a request for records that clearly... Service Center has a telephone line to inform the requester of the status of their request (see Appendix A...

  15. 40 CFR 57.804 - Request for hearing; request to participate in hearing.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 5 2010-07-01 2010-07-01 false Request for hearing; request to participate in hearing. 57.804 Section 57.804 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... of Continuous Emission Reduction Technology § 57.804 Request for hearing; request to participate in...

  16. 32 CFR 806.29 - Administrative processing of Air Force FOIA requests.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... section. (c) Contacts with FOIA requesters and non-Air Force submitters of data. (1) Contacts with Air... memoranda documenting requester contacts with Air Force elements regarding a pending FOIA request in the requester's FOIA file. If the requester contacts Air Force elements telephonically about a pending FOIA...

  17. 32 CFR 806.29 - Administrative processing of Air Force FOIA requests.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... section. (c) Contacts with FOIA requesters and non-Air Force submitters of data. (1) Contacts with Air... memoranda documenting requester contacts with Air Force elements regarding a pending FOIA request in the requester's FOIA file. If the requester contacts Air Force elements telephonically about a pending FOIA...

  18. 32 CFR 806.29 - Administrative processing of Air Force FOIA requests.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... section. (c) Contacts with FOIA requesters and non-Air Force submitters of data. (1) Contacts with Air... memoranda documenting requester contacts with Air Force elements regarding a pending FOIA request in the requester's FOIA file. If the requester contacts Air Force elements telephonically about a pending FOIA...

  19. 43 CFR 4.1363 - Contents of request; amendment of request; responses.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Request for Review of Approval Or Disapproval of Applications for New Permits, Permit Revisions, Permit Renewals, the Transfer, Assignment Or Sale of Rights Granted Under Permit (federal Program; Federal Lands... Contents of request; amendment of request; responses. (a) The request for review shall include— (1) A clear...

  20. 5 CFR 2604.502 - Fees to be charged-categories of requesters.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... various requester categories. The paragraphs below state, for each category of requester, the type of fees... requesters. (c) Educational and noncommercial scientific institutions and news media. If the request is from... scientific research, or a representative of the news media, and the request is not for a commercial use, the...

  1. 49 CFR 802.7 - Requests: How, where, and when presented; verification of identity of individuals making requests...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...; verification of identity of individuals making requests; accompanying persons; and procedures for... Procedures and Requirements § 802.7 Requests: How, where, and when presented; verification of identity of... which the record is contained. (d) Verification of identity of requester. (1) For written requests, the...

  2. 49 CFR 802.7 - Requests: How, where, and when presented; verification of identity of individuals making requests...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...; verification of identity of individuals making requests; accompanying persons; and procedures for... Procedures and Requirements § 802.7 Requests: How, where, and when presented; verification of identity of... which the record is contained. (d) Verification of identity of requester. (1) For written requests, the...

  3. 42 CFR 110.44 - Legal or personal representatives of requesters.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... jurisdiction, does not need a legal or personal representative to file a Request Form or Request Package on his... 42 Public Health 1 2011-10-01 2011-10-01 false Legal or personal representatives of requesters... or personal representatives of requesters. (a) Generally. Persons other than a requester (e.g., a...

  4. 78 FR 54637 - Agency Information Collection Activities; Comment Request; State Educational Agency, Local...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... requests have occurred in several iterations: Window 1, for which SEAs submitted requests in November 2011; Window 2, for which SEAs submitted requests in February 2012; Window 3, for which SEAs submitted requests in September 2012; and Window 4, for which SEAs submitted requests in spring 2013. Generally, ED...

  5. REQUEST A COLOR GUARD

    Science.gov Websites

    EMERGENCY PREPAREDNESS CONTACT REQUEST A SPEAKER REQUEST A COLOR GUARD OPERATIONAL CONTRACT SUPPORT HomeCONTACTREQUEST A COLOR GUARD Request a Color Guard Please take a moment to fill out the document at the link one month to process your request, but no more than three. Color Guard Request Form For Community

  6. 14 CFR 1206.703 - Aggregation of requests.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... RECORDS TO MEMBERS OF THE PUBLIC Search, Review, and Duplication Fees § 1206.703 Aggregation of requests... group of requesters acting in concert, is attempting to break a request down into a series of requests...

  7. 14 CFR 1206.703 - Aggregation of requests.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... RECORDS TO MEMBERS OF THE PUBLIC Search, Review, and Duplication Fees § 1206.703 Aggregation of requests... group of requesters acting in concert, is attempting to break a request down into a series of requests...

  8. 14 CFR 1206.703 - Aggregation of requests.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... RECORDS TO MEMBERS OF THE PUBLIC Search, Review, and Duplication Fees § 1206.703 Aggregation of requests... group of requesters acting in concert, is attempting to break a request down into a series of requests...

  9. 45 CFR 2106.2 - Requests for access.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... WITH 5 U.S.C. 552a, THE PRIVACY ACT OF 1974 § 2106.2 Requests for access. (a) Requirement for written.... The request should state that the request is pursuant to the Privacy Act of 1974. In the absence of... system of records, the request will be presumed to be made under the Privacy Act of 1974. The requester...

  10. 45 CFR 2106.2 - Requests for access.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... WITH 5 U.S.C. 552a, THE PRIVACY ACT OF 1974 § 2106.2 Requests for access. (a) Requirement for written.... The request should state that the request is pursuant to the Privacy Act of 1974. In the absence of... system of records, the request will be presumed to be made under the Privacy Act of 1974. The requester...

  11. 17 CFR 200.304 - Disclosure of requested records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... making the request. (b) Grant of request for access. (1) If it is determined that a request for access to... individual shall pay the cost of making the requested copies, as set forth in § 200.310 of this subpart. (2... pertaining to individuals other than the person making the request or of other information that does not...

  12. Process and outcomes of euthanasia requests under the belgian act on euthanasia: a nationwide survey.

    PubMed

    Van Wesemael, Yanna; Cohen, Joachim; Bilsen, Johan; Smets, Tinne; Onwuteaka-Philipsen, Bregje; Deliens, Luc

    2011-11-01

    Since 2002, the administration of a lethal drug by a physician at the explicit request of the patient has been legal in Belgium. The incidence of euthanasia in Belgium has been studied, but the process and outcomes of euthanasia requests have not been investigated. To describe which euthanasia requests were granted, withdrawn, and rejected since the enactment of the euthanasia law in terms of the characteristics of the patient, treating physician, and aspects of the consultation with a second physician. A representative sample of 3006 Belgian physicians received a questionnaire investigating their most recent euthanasia request. The response rate was 34%. Since 2002, 39% of respondents had received a euthanasia request. Forty-eight percent of requests had been carried out, 5% had been refused, 10% had been withdrawn, and in 23%, the patient had died before euthanasia could be performed. Physicians' characteristics associated with receiving a request were not being religious, caring for a high number of terminally ill patients, and having experience in palliative care. Patient characteristics associated with granting a request were age, having cancer, loss of dignity, having no depression, and suffering without prospect of improvement as a reason for requesting euthanasia. A positive initial position toward the request from the attending physician and positive advice from the second physician also contributed to having a request granted. Under the Belgian Act on Euthanasia, about half of the requests are granted. Factors related to the reason for the request, position of the attending physician toward the request, and advice from the second physician influence whether a request is granted or not. Copyright © 2011 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.

  13. 14 CFR 1206.703 - Aggregation of requests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... documents, solely in order to avoid payment of fees. When NASA has reason to believe that a requester or a group of requesters acting in concert, is attempting to break a request down into a series of requests...

  14. 12 CFR 1202.11 - What will it cost to get the records I requested?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) Assessment of Fees, Categories of Requesters. The fees that FHFA may assess vary depending on the type of request or the type of requester you are— (1) Commercial Use. If you request records for a commercial use..., Representative of the News Media. If you are not requesting records for commercial use and you are an educational...

  15. 12 CFR 1202.5 - How do I request information from FHFA under FOIA?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... waiver. (h) Valid Requests. FHFA will only process valid requests. A valid request must meet all the... 12 Banks and Banking 7 2011-01-01 2011-01-01 false How do I request information from FHFA under... OPERATIONS FREEDOM OF INFORMATION ACT § 1202.5 How do I request information from FHFA under FOIA? (a) Where...

  16. 12 CFR 1202.5 - How do I request information from FHFA under FOIA?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... waiver. (h) Valid Requests. FHFA will only process valid requests. A valid request must meet all the... 12 Banks and Banking 7 2010-01-01 2010-01-01 false How do I request information from FHFA under... OPERATIONS FREEDOM OF INFORMATION ACT § 1202.5 How do I request information from FHFA under FOIA? (a) Where...

  17. Who Is Influencing Whom? Latino Parent–Child Request Interactions and Product Purchases in Food Retail Environments

    PubMed Central

    Castro, Iana A.; Calderon, Joanna; Ayala, Guadalupe X.

    2017-01-01

    This study examines Latino parent–child interactions about foods and beverages requested in food retail environments in San Diego, CA. It seeks to extend our understanding of parent–child request interactions and purchases by studying how the number of product request interactions and purchases differ based on four factors that have been understudied in previous parent–child interaction research: parent gender, child gender, product healthfulness, and who initiated the request interaction (parent or child). By unobtrusively observing Latino parent–child dyads for the duration of a brief shopping trip, we found that parent and child gender are related to the number of request interactions initiated by parents and children. For gender-specific child-initiated request interactions, sons initiated more request interactions with fathers while daughters initiated more request interactions with mothers. Most request interactions were for products that were categorized as calorie dense, and a higher percentage of these products were purchased as a result of parent-initiated (vs. child-initiated) request interactions. The results provide important considerations for practitioners and researchers working on improving nutrition and reducing obesity. Assumptions about who is influencing whom in food store request interactions are challenged, requiring more research. PMID:29081718

  18. 21 CFR 1401.12 - Fees to be charged-categories of requesters.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... are sought for scholarly or scientific research not a commercial use. (3) Requesters who are... requesters: commercial use requesters; educational and non-commercial scientific institutions... reproduction of documents. (2) Educational and non-commercial scientific institution requesters. ONDCP will...

  19. 78 FR 72078 - Information Collection Request Submitted to OMB for Review and Approval; Comment Request; NSPS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-02

    ... Request Submitted to OMB for Review and Approval; Comment Request; NSPS for Phosphate Rock Plants (Renewal... Agency has submitted an information collection request (ICR), ``NSPS for Phosphate Rock Plants (40 CFR... 72079

  20. 78 FR 20102 - Proposed Information Collection Request; Comment Request; Reformulated Gasoline Commingling...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-03

    ... Request; Comment Request; Reformulated Gasoline Commingling Provisions AGENCY: Environmental Protection... information collection request (ICR), ``Reformulated Gasoline Commingling Provisions'' (EPA ICR No.2228.04.... Abstract: EPA would like to continue collecting notifications from gasoline retailers and wholesale...

  1. 36 CFR § 404.8 - Fees to be charged-categories of requesters.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...-commercial scientific institution) research. Requesters must reasonably describe the records sought. (c... use requesters; educational and noncommercial scientific institutions; representatives of the news... record sought. Requesters must reasonably describe the records sought. Commercial use requesters are not...

  2. 14 CFR 1206.701 - Categories of requesters.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... scientific institution) research. Requesters must reasonably describe the records sought. (c) Requesters who... RECORDS TO MEMBERS OF THE PUBLIC Search, Review, and Duplication Fees § 1206.701 Categories of requesters... scientific institutions; representatives of the news media; and all other requesters. The Act prescribes...

  3. 21 CFR 1401.12 - Fees to be charged-categories of requesters.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... requesters: commercial use requesters; educational and non-commercial scientific institutions... reproduction of documents. (2) Educational and non-commercial scientific institution requesters. ONDCP will... the request is authorized by and under the auspices of a qualifying institution and that the records...

  4. 21 CFR 1401.12 - Fees to be charged-categories of requesters.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... requesters: commercial use requesters; educational and non-commercial scientific institutions... reproduction of documents. (2) Educational and non-commercial scientific institution requesters. ONDCP will... the request is authorized by and under the auspices of a qualifying institution and that the records...

  5. 14 CFR 1206.701 - Categories of requesters.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... scientific institution) research. Requesters must reasonably describe the records sought. (c) Requesters who... RECORDS TO MEMBERS OF THE PUBLIC Search, Review, and Duplication Fees § 1206.701 Categories of requesters... scientific institutions; representatives of the news media; and all other requesters. The Act prescribes...

  6. 14 CFR 1206.701 - Categories of requesters.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... scientific institution) research. Requesters must reasonably describe the records sought. (c) Requesters who... RECORDS TO MEMBERS OF THE PUBLIC Search, Review, and Duplication Fees § 1206.701 Categories of requesters... scientific institutions; representatives of the news media; and all other requesters. The Act prescribes...

  7. 21 CFR 1401.12 - Fees to be charged-categories of requesters.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... requesters: commercial use requesters; educational and non-commercial scientific institutions... reproduction of documents. (2) Educational and non-commercial scientific institution requesters. ONDCP will... the request is authorized by and under the auspices of a qualifying institution and that the records...

  8. 31 CFR 14.4 - Contents of request.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... § 14.4 Contents of request. The formal written request shall be in the form of a letter or memorandum... forth that official's name, title, business address and business phone number. The request shall also... order shall be attached to the formal written request. ...

  9. 45 CFR 612.6 - Processing requests.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Processing requests. 612.6 Section 612.6 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION AVAILABILITY OF RECORDS AND INFORMATION § 612.6 Processing requests. (a) Acknowledgment of requests. Each request is...

  10. 45 CFR 612.6 - Processing requests.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Processing requests. 612.6 Section 612.6 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION AVAILABILITY OF RECORDS AND INFORMATION § 612.6 Processing requests. (a) Acknowledgment of requests. Each request is...

  11. 45 CFR 612.6 - Processing requests.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Processing requests. 612.6 Section 612.6 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION AVAILABILITY OF RECORDS AND INFORMATION § 612.6 Processing requests. (a) Acknowledgment of requests. Each request is...

  12. 8 CFR 103.40 - Genealogical Research Requests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Genealogical Research Requests. 103.40... DUTIES; AVAILABILITY OF RECORDS § 103.40 Genealogical Research Requests. (a) Nature of requests... person, usually for genealogy and family history research purposes. (b) Manner of requesting genealogical...

  13. 77 FR 18849 - Notice of Proposed Information Collection: Comment Request: Insurance Termination Request for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-28

    ... Information Collection: Comment Request: Insurance Termination Request for Multifamily Mortgage AGENCY: Office... also lists the following information: Title of Proposal: Insurance Termination Request for Multifamily... mortgagee mutually agree to terminate the HUD multifamily mortgage insurance. Agency form numbers, if...

  14. 76 FR 60133 - Proposed Information Collection (Request for Supplies (Chapter 31-Vocational Rehabilitation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    ... (Request for Supplies (Chapter 31--Vocational Rehabilitation)); Comment Request AGENCY: Veterans Benefits... to determine whether supplies requested for a veteran's rehabilitation program are necessary. DATES.... Title: Request for Supplies (Chapter 31--Vocational Rehabilitation), VA Form 28-1905m. OMB Control...

  15. 32 CFR 1700.6 - Fees for records services.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... explanation or argument as to how his or her request satisfies the requirements of this regulation and the Act... scientific institution requesters, representatives of the news media requesters, and all other requesters... duplicating responsive records (if any); (2) Educational and non-commercial scientific institution requesters...

  16. 32 CFR 1700.6 - Fees for records services.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... explanation or argument as to how his or her request satisfies the requirements of this regulation and the Act... scientific institution requesters, representatives of the news media requesters, and all other requesters... duplicating responsive records (if any); (2) Educational and non-commercial scientific institution requesters...

  17. 78 FR 41926 - Proposed Information Collection Request; Comment Request; Performance Evaluation Studies on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-12

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OECA-2013-0413; FRL--9832-8] Proposed Information Collection Request; Comment Request; Performance Evaluation Studies on Wastewater Laboratories (Renewal); EPA... request (ICR), ``Performance Evaluation Studies on Wastewater Laboratories'' (EPA ICR No. 0234.11, OMB...

  18. 78 FR 69140 - CSMI, LLC; Request for Action

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-18

    ... NUCLEAR REGULATORY COMMISSION [Docket No. NRC-2013-0250] CSMI, LLC; Request for Action AGENCY: Nuclear Regulatory Commission. ACTION: Request for action; receipt. SUMMARY: The U.S. Nuclear Regulatory... petitioner) has requested that the NRC take action with regard to CSMI. The petitioner's requests are...

  19. Larger differences in utilization of rarely requested tests in primary care in Spain.

    PubMed

    Salinas, Maria; López-Garrigós, Maite; Flores, Emilio; Uris, Joaquín; Leiva-Salinas, Carlos

    2015-01-01

    The study was performed to compare and analyze the inter-departmental variability in the request of rarely requested laboratory tests in primary care, as opposed to other more common and highly requested tests. Data from production statistics for the year 2012 from 76 Spanish laboratories was used. The number of antinuclear antibodies, antistreptolysin O, creatinine, cyclic citrullinated peptide antibodies, deaminated peptide gliadine IgA antibodies, glucose, protein electrophoresis, rheumatoid factor, transglutaminase IgA antibodies, urinalysis and uric acid tests requested was collected. The number of test requests per 1000 inhabitants was calculated. In order to explore the variability the coefficient of quartile dispersion was calculated. The smallest variation was seen for creatinine, glucose, uric acid and urinalysis; the most requested tests. The tests that were least requested showed the greatest variability. Our study shows through a very simplified approach, in a population close to twenty million inhabitants, how in primary care, the variability in the request of laboratory tests is inversely proportional to the request rate.

  20. 7 CFR 1.6 - Aggregating requests.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 1 2013-01-01 2013-01-01 false Aggregating requests. 1.6 Section 1.6 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.6 Aggregating requests. When an agency reasonably believes that a requester, or a group of requesters acting in concert...

  1. 22 CFR 1002.4 - Written requests.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Written requests. 1002.4 Section 1002.4 Foreign Relations INTER-AMERICAN FOUNDATION AVAILABILITY OF RECORDS § 1002.4 Written requests. In order to facilitate the processing of written requests, every petitioner should: (a) Address his request to: General...

  2. 32 CFR 1900.13 - Fees for record services.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... encouraged to provide any explanation or argument as to how his or her request satisfies the statutory... requesters for fee purposes: Commercial use requesters, educational and non-commercial scientific institution... scientific institution requesters as well as “representatives of the news media” requesters: Only charges for...

  3. 32 CFR 1900.13 - Fees for record services.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... encouraged to provide any explanation or argument as to how his or her request satisfies the statutory... requesters for fee purposes: Commercial use requesters, educational and non-commercial scientific institution... scientific institution requesters as well as “representatives of the news media” requesters: Only charges for...

  4. 78 FR 55252 - Proposed Information Collection Request; Comment Request; State Review Framework

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OECA-2010-0291; FRL-9900-88-OECA] Proposed Information Collection Request; Comment Request; State Review Framework AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: The Environmental Protection Agency is planning to submit a request to renew an...

  5. 78 FR 75342 - Information Collection Request Submitted to OMB for Review and Approval; Comment Request; NESHAP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-11

    ... Request Submitted to OMB for Review and Approval; Comment Request; NESHAP for Lime Manufacturing (Renewal... Agency has submitted an information collection request (ICR), ``NESHAP for Lime Manufacturing (40 CFR... required semiannually. Form Numbers: None. Respondents/affected entities: Lime manufacturing plants...

  6. 15 CFR 4.6 - Time limits and expedited processing.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... to the extent reasonably necessary to properly process the particular request: (i) The need to search... office processing the request; (ii) The need to search for, collect, and appropriately examine a... reasonably believes that multiple requests submitted by a requester, or by a group of requesters acting in...

  7. 15 CFR 4.6 - Time limits and expedited processing.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... to the extent reasonably necessary to properly process the particular request: (i) The need to search... office processing the request; (ii) The need to search for, collect, and appropriately examine a... reasonably believes that multiple requests submitted by a requester, or by a group of requesters acting in...

  8. 40 CFR 1601.24 - Timing of responses to requests.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... by a group of requesters acting in concert, constitute a single request that would otherwise involve... means that there is a need to: (1) Search for and collect the requested records from facilities that are separate from the office processing the request; (2) Search for, collect, and appropriately examine a...

  9. 75 FR 67975 - Agency Information Collection Request; 30-Day Public Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-04

    ... Information Request Form. The Civil Rights Information Request Form is designed to collect data from health... of the Medicare certification process, health care facilities must receive a civil rights clearance... regulations. The civil rights information is requested only when a health care provider applies for Medicare...

  10. 75 FR 5801 - Notice of Proposed Information Collection for 1029-0120

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-04

    ... request for its Nomination and Request for Payment Form for OSM Technical Training Courses, has been... Nomination and Request for Payment Form for OSM Technical Training Courses. OSM is requesting a 3- year term... information collection activity: Title: Nomination and Request for Payment Form for OSM Technical Training...

  11. 28 CFR 513.60 - Freedom of Information Act requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Freedom of Information Act requests. 513... AND ADMINISTRATION ACCESS TO RECORDS Release of Information Freedom of Information Act Requests for Information § 513.60 Freedom of Information Act requests. Requests for any Bureau record (including Program...

  12. 38 CFR 1.554 - Requirements for making requests.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... must contain an image of the requester's handwritten signature. To make a request for VA records, write... by another confidentiality statute, the e-mail transmission must contain an image of the requester's... assure prompt processing, e-mail FOIA requests must be sent to official VA FOIA mailboxes established for...

  13. 38 CFR 1.554 - Requirements for making requests.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... must contain an image of the requester's handwritten signature. To make a request for VA records, write... by another confidentiality statute, the e-mail transmission must contain an image of the requester's... assure prompt processing, e-mail FOIA requests must be sent to official VA FOIA mailboxes established for...

  14. 38 CFR 1.554 - Requirements for making requests.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... must contain an image of the requester's handwritten signature. To make a request for VA records, write... by another confidentiality statute, the e-mail transmission must contain an image of the requester's... assure prompt processing, e-mail FOIA requests must be sent to official VA FOIA mailboxes established for...

  15. 77 FR 30306 - Notice of Proposed Information Collection: Comment Request; Request for Acceptance of Changes in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-22

    ... Information Collection: Comment Request; Request for Acceptance of Changes in Approved Drawings and... also lists the following information: Title of Proposal: Changes in Approved Drawings and... proposed use: Builders who request changes to HUD's accepted drawings and specifications for proposed...

  16. 32 CFR 1665.5 - Request for review.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PROCEDURES § 1665.5 Request for review. (a) Individuals wishing to request a review of the decision by SSS... the information specified in § 1665.5(b). Individuals desiring assistance in the preparation of their... requester believes that access should be granted or the disputed information amended. The request for review...

  17. 78 FR 25058 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-29

    ... tags: designation 10 minutes, requests for tags, 2 minutes; lobster area waiver, 20 minutes and request... also required to request gillnet and lobster tags through the Northeast region permit office when using gillnet gear or lobster traps. Lastly, vessel owners that own multiple vessels, but would like to request...

  18. 22 CFR 1502.4 - Written requests.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Written requests. 1502.4 Section 1502.4 Foreign Relations AFRICAN DEVELOPMENT FOUNDATION AVAILABILITY OF RECORDS § 1502.4 Written requests. In order to facilitate the processing of written requests, every petitioner should: (a) Address his or her request to...

  19. 78 FR 63496 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Medical...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-24

    ... for OMB Review; Comment Request; Medical Travel Refund Request ACTION: Notice. SUMMARY: The Department... information collection request (ICR) titled, ``Medical Travel Refund Request,'' to the Office of Management... reimbursement for out-of-pocket expenses incurred when traveling to medical providers for covered medical...

  20. 29 CFR 1921.5 - Motions and requests.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... motion or request shall state the particular order, ruling, or action desired, and the grounds therefor... 29 Labor 7 2011-07-01 2011-07-01 false Motions and requests. 1921.5 Section 1921.5 Labor... WORKERS' COMPENSATION ACT Prehearing Procedures § 1921.5 Motions and requests. Motions or requests shall...

  1. 29 CFR 1921.5 - Motions and requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... motion or request shall state the particular order, ruling, or action desired, and the grounds therefor... 29 Labor 7 2010-07-01 2010-07-01 false Motions and requests. 1921.5 Section 1921.5 Labor... WORKERS' COMPENSATION ACT Prehearing Procedures § 1921.5 Motions and requests. Motions or requests shall...

  2. 78 FR 77119 - Proposed Information Collection Request; Comment Request; Regulation of Fuels and Fuel Additives...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-20

    ... Collection Request; Comment Request; Regulation of Fuels and Fuel Additives: 2011 Renewable Fuel Standards... collection request (ICR), ``Regulation of Fuels and Fuel Additives: 2011 Renewable Fuel Standards--Petition... whose disclosure is restricted by statute. FOR FURTHER INFORMATION CONTACT: Geanetta Heard, Fuels...

  3. 10 CFR 1705.05 - Processing of requests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Processing of requests. 1705.05 Section 1705.05 Energy DEFENSE NUCLEAR FACILITIES SAFETY BOARD PRIVACY ACT § 1705.05 Processing of requests. (a) Requests in writing. The Privacy Act Officer will acknowledge receipt of the request within five working days of its...

  4. 5 CFR 2604.502 - Fees to be charged-categories of requesters.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... requester will put the records sought, or where the use is not clear from the request itself, the Office... requesters. (c) Educational and noncommercial scientific institutions and news media. If the request is from an educational institution or a noncommercial scientific institution, operated for scholarly or...

  5. 10 CFR 1705.05 - Processing of requests.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Processing of requests. 1705.05 Section 1705.05 Energy DEFENSE NUCLEAR FACILITIES SAFETY BOARD PRIVACY ACT § 1705.05 Processing of requests. (a) Requests in writing. The Privacy Act Officer will acknowledge receipt of the request within five working days of its...

  6. 10 CFR 1705.05 - Processing of requests.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Processing of requests. 1705.05 Section 1705.05 Energy DEFENSE NUCLEAR FACILITIES SAFETY BOARD PRIVACY ACT § 1705.05 Processing of requests. (a) Requests in writing. The Privacy Act Officer will acknowledge receipt of the request within five working days of its...

  7. 78 FR 35631 - Proposed Information Collection Request; Comment Request; 40 CFR Part 64 Compliance Assurance...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-13

    ... the fact that most facilities are now using electronic monitoring to conduct their recording, thus... Request; Comment Request; 40 CFR Part 64 Compliance Assurance Monitoring Program AGENCY: Environmental... an information collection request, ``40 CFR Part 64 Compliance Assurance Monitoring Program'' (EPA...

  8. 10 CFR 501.131 - Filing a request for interpretation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Filing a request for interpretation. 501.131 Section 501.131 Energy DEPARTMENT OF ENERGY (CONTINUED) ALTERNATE FUELS ADMINISTRATIVE PROCEDURES AND SANCTIONS Requests for Interpretation § 501.131 Filing a request for interpretation. A proceeding to request an...

  9. 10 CFR 501.132 - Contents of a request for interpretation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Contents of a request for interpretation. 501.132 Section 501.132 Energy DEPARTMENT OF ENERGY (CONTINUED) ALTERNATE FUELS ADMINISTRATIVE PROCEDURES AND SANCTIONS Requests for Interpretation § 501.132 Contents of a request for interpretation. (a) A request for...

  10. 78 FR 73524 - Information Collection Request Submitted to OMB for Review and Approval; Comment Request; NSPS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-06

    ... Request Submitted to OMB for Review and Approval; Comment Request; NSPS for Rubber Tire Manufacturing... Protection Agency has submitted an information collection request (ICR), ``NSPS for Rubber Tire Manufacturing.../dockets . Abstract: Respondents are owners or operators of rubber tire manufacturing plants which include...

  11. 10 CFR 1705.05 - Processing of requests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Processing of requests. 1705.05 Section 1705.05 Energy DEFENSE NUCLEAR FACILITIES SAFETY BOARD PRIVACY ACT § 1705.05 Processing of requests. (a) Requests in writing. The Privacy Act Officer will acknowledge receipt of the request within five working days of its...

  12. 10 CFR 1705.05 - Processing of requests.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Processing of requests. 1705.05 Section 1705.05 Energy DEFENSE NUCLEAR FACILITIES SAFETY BOARD PRIVACY ACT § 1705.05 Processing of requests. (a) Requests in writing. The Privacy Act Officer will acknowledge receipt of the request within five working days of its...

  13. 76 FR 20987 - Agency Information Collection Request; 60-Day Public Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-14

    ... Information Collection Request; 60-Day Public Comment Request AGENCY: Office of the Secretary, HHS. In... of a proposed information collection request for public comment. Interested persons are invited to send comments regarding this burden estimate or any other aspect of this collection of information...

  14. Message passing with queues and channels

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dozsa, Gabor J; Heidelberger, Philip; Kumar, Sameer

    In an embodiment, a reception thread receives a source node identifier, a type, and a data pointer from an application and, in response, creates a receive request. If the source node identifier specifies a source node, the reception thread adds the receive request to a fast-post queue. If a message received from a network does not match a receive request on a posted queue, a polling thread adds a receive request that represents the message to an unexpected queue. If the fast-post queue contains the receive request, the polling thread removes the receive request from the fast-post queue. If themore » receive request that was removed from the fast-post queue does not match the receive request on the unexpected queue, the polling thread adds the receive request that was removed from the fast-post queue to the posted queue. The reception thread and the polling thread execute asynchronously from each other.« less

  15. 49 CFR 701.7 - Timing of responses to requests.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... by a requester or by a group of requesters acting in concert constitute a single request that would... circumstances that may justify delay include: (i) The need to search for and collect the requested records from other facilities that are separate from Amtrak's headquarters offices. (ii) The need to search for...

  16. 4 CFR 201.5 - Requests for Board records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Requests for Board records. 201.5 Section 201.5 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PUBLIC INFORMATION AND REQUESTS § 201.5 Requests for Board... of Information Act Request” on the letter and envelope or in the subject line of the e-mail request...

  17. 78 FR 15377 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Requests To...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-11

    ... for OMB Review; Comment Request; Requests To Approve Conformed Wage Classifications and Unconventional... Classifications and Unconventional Fringe Benefit Plans Under the Davis-Bacon and Related Acts and Contract Work... collection consist of: (A) Reports of conformed classifications and wage rates and (B) requests for approval...

  18. 40 CFR 1601.24 - Timing of responses to requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... an imminent threat to the life or physical safety of an individual; (ii) An urgency to inform the... affect public confidence. (2) A request for expedited processing may be made at the time of the initial... shall notify the requester of the decision. If a request for expedited treatment is granted, the request...

  19. 78 FR 62629 - Proposed Information Collection Request; Comment Request; Clean Water Act Section 404 State...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-22

    ... comments to OMB. Abstract: Section 404(g) of the Clean Water Act authorizes States [and Tribes] to assume... States/Tribes requesting assumption of the Clean Water Act section 404 permit program; States/ [[Page... Collection Request; Comment Request; Clean Water Act Section 404 State-Assumed Programs (Renewal) AGENCY...

  20. 78 FR 12782 - Notice of Proposed Information Collection; Request for Comments for 1029-0120

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-25

    ... information collection request for the Nomination and Request for Payment Form for OSM's Technical Training... Payment Form for OSM Technical Training Courses. OSM is requesting a 3-year term of approval for this... collection activity: Title: Nomination and Request for Payment Form for OSM Technical Training Courses. OMB...

  1. 78 FR 22252 - Agency Information Collection Activities; Comment Request; FFEL/Direct Loan/Perkins Military...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-15

    ...; Comment Request; FFEL/ Direct Loan/Perkins Military Service Deferment/Post-Active Duty Student Deferment... Deferment/Post-Active Duty Student Deferment Request & SCRA Request. OMB Control Number: 1845-0080. Type of...: 9,177. Abstract: The Military Service/Post-Active Duty Student Deferment request form serves as the...

  2. 78 FR 45965 - Research Lease on the Outer Continental Shelf (OCS) Offshore Virginia, Request for Competitive...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-30

    ...; MMAA104000] Research Lease on the Outer Continental Shelf (OCS) Offshore Virginia, Request for Competitive... Unsolicited Request for an OCS Research Lease; Request for Competitive Interest (RFCI); and Request for Public... for wind energy research activities; (2) solicit indications of interest in a renewable energy lease...

  3. 78 FR 118 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-02

    ... form number: NA Forms 13022, 13064, 13068. Type of review: Regular. Affected public: Former Federal... nature of the request. The NA Form 13022, Returned Request Form, is used to request additional information about the former Federal employee. The NA Form 13064, Reply to Request Involving Relief Agencies...

  4. 15 CFR 2005.6 - Request for review.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... person making the request in writing of the decision on the request for review within 30 days (excluding... wishing to request a review of the decision by STR with regard to an initial request to amend a record in... extent possible, include the information specified in § 2005.5(a). Individuals desiring assistance in the...

  5. 16 CFR 610.3 - Streamlined process for requesting annual file disclosures from nationwide specialty consumer...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... and prominently posted on any website owned or maintained by the nationwide specialty consumer... by any additional available request methods; and (2) Be designed, funded, implemented, maintained... consumers request while the consumer is in the process of making a request; (B) For a website request method...

  6. 10 CFR 1303.105 - Requests for Board records.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Requests for Board records. 1303.105 Section 1303.105 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PUBLIC INFORMATION AND REQUESTS § 1303.105 Requests for Board records. (a) A written FOIA request must be submitted. You may: (1) Write: NWTRB Designated FOIA Officer...

  7. 10 CFR 1303.105 - Requests for Board records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Requests for Board records. 1303.105 Section 1303.105 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PUBLIC INFORMATION AND REQUESTS § 1303.105 Requests for Board records. (a) A written FOIA request must be submitted. You may: (1) Write: NWTRB Designated FOIA Officer...

  8. 10 CFR 1303.105 - Requests for Board records.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Requests for Board records. 1303.105 Section 1303.105 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PUBLIC INFORMATION AND REQUESTS § 1303.105 Requests for Board records. (a) A written FOIA request must be submitted. You may: (1) Write: NWTRB Designated FOIA Officer...

  9. 10 CFR 1303.105 - Requests for Board records.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Requests for Board records. 1303.105 Section 1303.105 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PUBLIC INFORMATION AND REQUESTS § 1303.105 Requests for Board records. (a) A written FOIA request must be submitted. You may: (1) Write: NWTRB Designated FOIA Officer...

  10. 10 CFR 1303.105 - Requests for Board records.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Requests for Board records. 1303.105 Section 1303.105 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PUBLIC INFORMATION AND REQUESTS § 1303.105 Requests for Board records. (a) A written FOIA request must be submitted. You may: (1) Write: NWTRB Designated FOIA Officer...

  11. 12 CFR 792.62 - Requests for accounting for disclosures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Requests for accounting for disclosures. 792.62... § 792.62 Requests for accounting for disclosures. At the time of the request for access or correction or at any other time, an individual may request an accounting of disclosures made of the individual's...

  12. 42 CFR 423.2014 - Request for an ALJ hearing.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Request for an ALJ hearing. 423.2014 Section 423.2014 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES..., and Judicial Review § 423.2014 Request for an ALJ hearing. (a) Content of the request. The request for...

  13. 29 CFR 458.72 - Motions and requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Motions and requests. 458.72 Section 458.72 Labor... STANDARDS OF CONDUCT Hearing and Related Matters § 458.72 Motions and requests. (a) Motions and requests... shall serve a copy of all motions and requests on all other parties. Motions during the course of the...

  14. 7 CFR 283.18 - Motions and requests.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... particular order, ruling, or action desired and the grounds therefor. (d) Response to motions and requests... 7 Agriculture 4 2011-01-01 2011-01-01 false Motions and requests. 283.18 Section 283.18... Claims of $50,000 or More § 283.18 Motions and requests. (a) Filing. All motions and requests shall be...

  15. 7 CFR 283.18 - Motions and requests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... particular order, ruling, or action desired and the grounds therefor. (d) Response to motions and requests... 7 Agriculture 4 2010-01-01 2010-01-01 false Motions and requests. 283.18 Section 283.18... Claims of $50,000 or More § 283.18 Motions and requests. (a) Filing. All motions and requests shall be...

  16. 40 CFR 1602.1 - General provisions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... request an accounting of disclosures of those records by the CSB. In addition, the CSB processes all... access, a request for amendment or correction, or a request for an accounting under the Privacy Act... subsection (d)(2) of the Privacy Act, 5 U.S.C. 552a. Request for an accounting means a request made as...

  17. 22 CFR 713.7 - What will OPIC do with my request?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... disclosure would interfere with law enforcement proceedings, compromise constitutional rights, or hamper OPIC...) Review of your request. OPIC will process your request in the order it is received. OPIC will try to... request or subpoena be modified or withdrawn, or may try to resolve the request or subpoena informally...

  18. 22 CFR 713.7 - What will OPIC do with my request?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... disclosure would interfere with law enforcement proceedings, compromise constitutional rights, or hamper OPIC...) Review of your request. OPIC will process your request in the order it is received. OPIC will try to... request or subpoena be modified or withdrawn, or may try to resolve the request or subpoena informally...

  19. 22 CFR 303.8 - Requests for records.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., a requester should try to provide the following kinds of information, if known; (1) The specific... determination may be expected to be dispatched, and the requester's right to treat the delay as a denial and to... extension thereof, the requester may deem the request denied, and exercise a right of appeal in accordance...

  20. 22 CFR 713.7 - What will OPIC do with my request?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... disclosure would interfere with law enforcement proceedings, compromise constitutional rights, or hamper OPIC...) Review of your request. OPIC will process your request in the order it is received. OPIC will try to... request or subpoena be modified or withdrawn, or may try to resolve the request or subpoena informally...

  1. 22 CFR 303.8 - Requests for records.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., a requester should try to provide the following kinds of information, if known; (1) The specific... determination may be expected to be dispatched, and the requester's right to treat the delay as a denial and to... extension thereof, the requester may deem the request denied, and exercise a right of appeal in accordance...

  2. 22 CFR 303.8 - Requests for records.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., a requester should try to provide the following kinds of information, if known; (1) The specific... determination may be expected to be dispatched, and the requester's right to treat the delay as a denial and to... extension thereof, the requester may deem the request denied, and exercise a right of appeal in accordance...

  3. 22 CFR 303.8 - Requests for records.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., a requester should try to provide the following kinds of information, if known; (1) The specific... determination may be expected to be dispatched, and the requester's right to treat the delay as a denial and to... extension thereof, the requester may deem the request denied, and exercise a right of appeal in accordance...

  4. 22 CFR 713.7 - What will OPIC do with my request?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... disclosure would interfere with law enforcement proceedings, compromise constitutional rights, or hamper OPIC...) Review of your request. OPIC will process your request in the order it is received. OPIC will try to... request or subpoena be modified or withdrawn, or may try to resolve the request or subpoena informally...

  5. 22 CFR 713.7 - What will OPIC do with my request?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... disclosure would interfere with law enforcement proceedings, compromise constitutional rights, or hamper OPIC...) Review of your request. OPIC will process your request in the order it is received. OPIC will try to... request or subpoena be modified or withdrawn, or may try to resolve the request or subpoena informally...

  6. 10 CFR 1703.106 - Requests for waiver or reduction of fees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Requests for waiver or reduction of fees. 1703.106 Section 1703.106 Energy DEFENSE NUCLEAR FACILITIES SAFETY BOARD PUBLIC INFORMATION AND REQUESTS § 1703.106... request within five working days of the request coming into his possession. No determination shall be made...

  7. 22 CFR 505.3 - Procedures for requests.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Foreign Relations BROADCASTING BOARD OF GOVERNORS PRIVACY ACT REGULATION § 505.3 Procedures for requests... to herself/himself as a request made under the Privacy Act of 1974, as amended (5 U.S.C. 552a) whether or not the individual specifically cites the Privacy Act when making the request. (b) All requests...

  8. 36 CFR 1007.3 - Requests for records.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false Requests for records. 1007.3... INFORMATION ACT § 1007.3 Requests for records. (a) Submission of requests. A request to inspect or copy records shall be submitted to the Presidio Trust's FOIA Officer at P.O. Box 29052, San Francisco, CA 94129...

  9. 10 CFR 1703.106 - Requests for waiver or reduction of fees.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Requests for waiver or reduction of fees. 1703.106 Section 1703.106 Energy DEFENSE NUCLEAR FACILITIES SAFETY BOARD PUBLIC INFORMATION AND REQUESTS § 1703.106... request within five working days of the request coming into his possession. No determination shall be made...

  10. 10 CFR 1703.106 - Requests for waiver or reduction of fees.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Requests for waiver or reduction of fees. 1703.106 Section 1703.106 Energy DEFENSE NUCLEAR FACILITIES SAFETY BOARD PUBLIC INFORMATION AND REQUESTS § 1703.106... request within five working days of the request coming into his possession. No determination shall be made...

  11. 10 CFR 1703.106 - Requests for waiver or reduction of fees.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Requests for waiver or reduction of fees. 1703.106 Section 1703.106 Energy DEFENSE NUCLEAR FACILITIES SAFETY BOARD PUBLIC INFORMATION AND REQUESTS § 1703.106... request within five working days of the request coming into his possession. No determination shall be made...

  12. 10 CFR 1703.106 - Requests for waiver or reduction of fees.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Requests for waiver or reduction of fees. 1703.106 Section 1703.106 Energy DEFENSE NUCLEAR FACILITIES SAFETY BOARD PUBLIC INFORMATION AND REQUESTS § 1703.106... request within five working days of the request coming into his possession. No determination shall be made...

  13. 78 FR 24194 - Information Collection Request Submitted to OMB for Review and Approval; Comment Request; Solid...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-24

    ... Request Submitted to OMB for Review and Approval; Comment Request; Solid Waste Disposal Facility Criteria... Protection Agency has submitted an information collection request (ICR), Solid Waste Disposal Facility... 40 CFR Part 258 on a State level, owners/operators of municipal solid waste landfills have to comply...

  14. 16 CFR 610.3 - Streamlined process for requesting annual file disclosures from nationwide specialty consumer...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... and prominently posted on any website owned or maintained by the nationwide specialty consumer... by any additional available request methods; and (2) Be designed, funded, implemented, maintained... consumers request while the consumer is in the process of making a request; (B) For a website request method...

  15. 16 CFR 610.3 - Streamlined process for requesting annual file disclosures from nationwide specialty consumer...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... and prominently posted on any website owned or maintained by the nationwide specialty consumer... by any additional available request methods; and (2) Be designed, funded, implemented, maintained... consumers request while the consumer is in the process of making a request; (B) For a website request method...

  16. 75 FR 44256 - Rotenone; Notice of Receipt of Requests to Voluntarily Cancel Pesticide Registrations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-28

    ... that would merit its further review of the requests, or unless the registrants withdraw their requests. If these requests are granted, any sale, distribution, or use of products listed in this notice will... voluntarily cancel their rotenone registrations. The requests would not terminate the last rotenone products...

  17. 75 FR 17733 - Monosodium Methanearsonate (MSMA); Notice of Receipt of Requests to Voluntarily Cancel Pesticide...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-07

    ... that would merit its further review of the requests, or unless the registrants withdraw their requests within this period. Upon acceptance of these requests, any sale, distribution, or use of products listed... arsenical monosodium methanearsonate (MSMA). The requests would not terminate the last MSMA products...

  18. 13 CFR 102.26 - Responses to requests for access to records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Responses to requests for access to records. 102.26 Section 102.26 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION RECORD... request, an office shall send an acknowledgement letter to the requester. (b) Grants of requests for...

  19. 39 CFR 233.5 - Requesting financial records from a financial institution.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the formal written request procedure authorized by section 1108 of the Act and (2) to set forth the... written request under the Act only if: (1) No administrative summons or subpoena authority reasonably... (e.g., section 1113(g)) where no notice is required. (d) Written request. (1) The formal request must...

  20. 40 CFR 205.160-1 - Test request.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false Test request. 205.160-1 Section 205... TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS Motorcycles § 205.160-1 Test request. (a) The Administrator will request all testing under § 205.160 by means of a test request addressed to the manufacturer. (b) The test...

  1. 40 CFR 204.57-1 - Test request.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false Test request. 204.57-1 Section 204.57... NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT Portable Air Compressors § 204.57-1 Test request. (a) The Administrator will request all testing under this subpart by means of a test request addressed to...

  2. 40 CFR 205.171-1 - Test request.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false Test request. 205.171-1 Section 205... TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS Motorcycle Exhaust Systems § 205.171-1 Test request. (a) The Administrator will request all testing under § 205.171 by means of a test request addressed to the manufacturer...

  3. 40 CFR 205.57-1 - Test request.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false Test request. 205.57-1 Section 205.57... TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS Medium and Heavy Trucks § 205.57-1 Test request. (a) The Administrator will request all testing under § 205.57 by means of a test request addressed to the manufacturer...

  4. 40 CFR 205.57-1 - Test request.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false Test request. 205.57-1 Section 205.57... TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS Medium and Heavy Trucks § 205.57-1 Test request. (a) The Administrator will request all testing under § 205.57 by means of a test request addressed to the manufacturer...

  5. 40 CFR 211.212-1 - Test request.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false Test request. 211.212-1 Section 211... PRODUCT NOISE LABELING Hearing Protective Devices § 211.212-1 Test request. (a) The Administrator will request all testing under this section by means of a test request addressed to the -manufacturer. (b) The...

  6. 40 CFR 204.57-1 - Test request.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false Test request. 204.57-1 Section 204.57... NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT Portable Air Compressors § 204.57-1 Test request. (a) The Administrator will request all testing under this subpart by means of a test request addressed to...

  7. An audit of request forms submitted in a multidisciplinary diagnostic center in Lagos.

    PubMed

    Oyedeji, Olufemi Abiola; Ogbenna, Abiola Ann; Iwuala, Sandra Omozehio

    2015-01-01

    Request forms are important means of communication between physicians and diagnostic service providers. Pre-analytical errors account for over two thirds of errors encountered in diagnostic service provision. The importance of adequate completion of request forms is usually underestimated by physicians which may result in medical errors or delay in instituting appropriate treatment. The aim of this study was to audit the level of completion of request forms presented at a multidisciplinary diagnostic center. A review of all requests forms for investigations which included radiologic, laboratory and cardiac investigations received between July and December 2011 was performed to assess their level of completeness. The data was entered into a spreadsheet and analyzed. Only 1.3% of the 7,841 request forms reviewed were fully completed. Patient's names, the referring physician's name and gender were the most completed information on the forms evaluated with 99.0%, 99.0% and 90.3% completion respectively. Patient's age was provided in 68.0%, request date in 88.2%, and clinical notes/ diagnosis in 65.9% of the requests. Patient's full address was provided in only 5.6% of requests evaluated. This study shows that investigation request forms are inadequately filled by physicians in our environment. Continuous medical education of physicians on the need for adequate completion of request forms is needed.

  8. Forensic intelligence applied to questioned document analysis: A model and its application against organized crime.

    PubMed

    De Alcaraz-Fossoul, Josep; Roberts, Katherine A

    2017-07-01

    The capability of forensic sciences to fight crime, especially against organized criminal groups, becomes relevant in the recent economic downturn and the war on terrorism. In view of these societal challenges, the methods of combating crime should experience critical changes in order to improve the effectiveness and efficiency of the current resources available. It is obvious that authorities have serious difficulties combating criminal groups of transnational nature. These are characterized as well structured organizations with international connections, abundant financial resources and comprised of members with significant and diverse expertise. One common practice among organized criminal groups is the use of forged documents that allow for the commission of illegal cross-border activities. Law enforcement can target these movements to identify counterfeits and establish links between these groups. Information on document falsification can become relevant to generate forensic intelligence and to design new strategies against criminal activities of this nature and magnitude. This article discusses a methodology for improving the development of forensic intelligence in the discipline of questioned document analysis. More specifically, it focuses on document forgeries and falsification types used by criminal groups. It also describes the structure of international criminal organizations that use document counterfeits as means to conduct unlawful activities. The model presented is partially based on practical applications of the system that have resulted in satisfactory outcomes in our laboratory. Copyright © 2017 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.

  9. Impact of fossil fuel emissions on atmospheric radiocarbon and various applications of radiocarbon over this century.

    PubMed

    Graven, Heather D

    2015-08-04

    Radiocarbon analyses are commonly used in a broad range of fields, including earth science, archaeology, forgery detection, isotope forensics, and physiology. Many applications are sensitive to the radiocarbon ((14)C) content of atmospheric CO2, which has varied since 1890 as a result of nuclear weapons testing, fossil fuel emissions, and CO2 cycling between atmospheric, oceanic, and terrestrial carbon reservoirs. Over this century, the ratio (14)C/C in atmospheric CO2 (Δ(14)CO2) will be determined by the amount of fossil fuel combustion, which decreases Δ(14)CO2 because fossil fuels have lost all (14)C from radioactive decay. Simulations of Δ(14)CO2 using the emission scenarios from the Intergovernmental Panel on Climate Change Fifth Assessment Report, the Representative Concentration Pathways, indicate that ambitious emission reductions could sustain Δ(14)CO2 near the preindustrial level of 0‰ through 2100, whereas "business-as-usual" emissions will reduce Δ(14)CO2 to -250‰, equivalent to the depletion expected from over 2,000 y of radioactive decay. Given current emissions trends, fossil fuel emission-driven artificial "aging" of the atmosphere is likely to occur much faster and with a larger magnitude than previously expected. This finding has strong and as yet unrecognized implications for many applications of radiocarbon in various fields, and it implies that radiocarbon dating may no longer provide definitive ages for samples up to 2,000 y old.

  10. New color-shifting security devices

    NASA Astrophysics Data System (ADS)

    Moia, Franco

    2004-06-01

    The unbroken global increase of forgery and counterfeiting of valuable documents and products steadily requires improved types of optical security devices. Hence, the "security world" is actively seeking for new features which meet high security standards, look attractively and allow easy recognition. One special smart security device created by ROLIC's technology represents a cholesteric device combined with a phase image. On tilting, such devices reveal strong color shifts which are clearly visible to the naked eye. The additional latent image is invisible under normal lighting conditions but can be revealed to human eyes by means of a simple, commercially available linear sheet polarizer. Based on our earlier work, first published in 1981, we now have developed phase change guest-host devices combined with dye-doped cholesteric material for application in new security features. ROLIC has developed sophisticated material systems of cross-linkable cholesteric liquid crystals and suitable cross-linkable dyes which allow to create outstanding cholesteric color-shifting effects not only on light absorbing dark backgrounds but also on bright or even white backgrounds preserving the circularly polarizing state. The new security devices combine unambiguously 1st and 2nd level inspection features and show brilliant colors on black as well as on white substrates. On tilting, the security devices exhibit remarkable color shifts while the integrated hidden images can be revealed by use of a sheet polarizer. Furthermore, due to its very thin material layers, even demanding applications, such as on banknotes can be considered.

  11. Thus Spoke Galileo - The great scientist's ideas and their relevance to the present day

    NASA Astrophysics Data System (ADS)

    Frova, Andrea; Marenzana, Mariapiera

    2006-04-01

    Any reasonably educated person knows what is said about Galileo, but not what Galileo himself actually said. This has allowed a variety of different interpretations to be put upon his stands as a scientist and as a man, in particular from within the Catholic world, where a sense of guilt for his dramatic destiny has never been completely erased. Let him speak, then so that he can bring to everybody's attention, in particular the young, his message of reason, of intellectual honesty, of free thinking. A message that more than ever, is of great relevance in the rampant irrationality of the new millennium. The selection of writings offered here is preferred by a blunt self-portrait, which is of course a "forgery" - however, one that is based entirely on extracts from Galileo's writings and private letters, though he would never have dared, nor been allowed to write it himself. The anthology touches upon the themes dearest to Galileo and a lively commentary, from both the scientific and the literary-historical viewpoints, should help make the extracts accessible. The reader will be able to appreciate the work and the writing-style of a very great scientist and author and will probably also be surprised to find with the aid of a test with answers provided, just how many of the misconceptions about the "workings of the world" that were rife prior to Galileo, still survive today among the common beliefs of even well-educated, non scientific people.

  12. Impact of fossil fuel emissions on atmospheric radiocarbon and various applications of radiocarbon over this century

    PubMed Central

    Graven, Heather D.

    2015-01-01

    Radiocarbon analyses are commonly used in a broad range of fields, including earth science, archaeology, forgery detection, isotope forensics, and physiology. Many applications are sensitive to the radiocarbon (14C) content of atmospheric CO2, which has varied since 1890 as a result of nuclear weapons testing, fossil fuel emissions, and CO2 cycling between atmospheric, oceanic, and terrestrial carbon reservoirs. Over this century, the ratio 14C/C in atmospheric CO2 (Δ14CO2) will be determined by the amount of fossil fuel combustion, which decreases Δ14CO2 because fossil fuels have lost all 14C from radioactive decay. Simulations of Δ14CO2 using the emission scenarios from the Intergovernmental Panel on Climate Change Fifth Assessment Report, the Representative Concentration Pathways, indicate that ambitious emission reductions could sustain Δ14CO2 near the preindustrial level of 0‰ through 2100, whereas “business-as-usual” emissions will reduce Δ14CO2 to −250‰, equivalent to the depletion expected from over 2,000 y of radioactive decay. Given current emissions trends, fossil fuel emission-driven artificial “aging” of the atmosphere is likely to occur much faster and with a larger magnitude than previously expected. This finding has strong and as yet unrecognized implications for many applications of radiocarbon in various fields, and it implies that radiocarbon dating may no longer provide definitive ages for samples up to 2,000 y old. PMID:26195757

  13. [Literature review of the influences on error rates when identifying equids with transponder and hot-iron branding].

    PubMed

    Campe, Amely; Schulz, Sophia; Bohnet, Willa

    2016-01-01

    Although equids have had to be tagged with a transponder since 2009, breeding associations in Germany disagree as to which method is best suited for identification (with or without hot iron branding). Therefore, the aim of this systematic literature review was to gain an overview of how effective identification is using transponders and hot iron branding and as to which factors influence the success of identification. Existing literature showed that equids can be identified by means of transponders with a probability of 85-100%, whereas symbol brandings could be identified correctly in 78-89%, whole number brandings in 0-87% and single figures in 37-92% of the readings, respectively. The successful reading of microchips can be further optimised by a correctly operated implantation process and thorough training of the applying persons. affect identification with a scanner. The removal of transponders for manipulation purposes is virtually impossible. Influences during the application of branding marks can hardly, if at all, be standardised, but influence the subsequent readability relevantly. Therefore, identification by means of hot branding cannot be considered sufficiently reliable. Impaired quality of identification can be reduced during reading but cannot be counteracted. Based on the existing studies it can be concluded that the transponder method is the best suited of the investigated methods for clearly identifying equids, being forgery-proof and permanent. It is not to be expected that applying hot branding in addition to microchips would optimise the probability of identification relevantly.

  14. A lab-on-a-chip-based multiplex platform to detect potential fraud of introducing pig, dog, cat, rat and monkey meat into the food chain.

    PubMed

    Razzak, Md Abdur; Hamid, Sharifah Bee Abd; Ali, Md Eaqub

    2015-01-01

    Food forgery has posed considerable risk to public health, religious rituals, personal budget and wildlife. Pig, dog, cat, rat and monkey meat are restricted in most religions, but their sporadic adulteration are rampant. Market controllers need a low-cost but reliable technique to track and trace suspected species in the food chain. Considering the need, here we documented a lab-on-a-chip-based multiplex polymerase chain reaction (PCR) assay for the authentication of five non-halal meat species in foods. Using species-specific primers, 172, 163, 141, 129 and 108-bp sites of mitochondrial ND5, ATPase 6 and cytochrome b genes were amplified to detect cat, dog, pig, monkey and rat species under complex matrices. Species-specificity was authenticated against 20 different species with the potential to be used in food. The targets were stable under extreme sterilisation (121°C at 45 psi for 2.5 h) which severely degrades DNA. The assay was optimised under the backgrounds of various commercial meat products and validated for the analysis of meatballs, burgers and frankfurters, which are popular fast food items across the globe. The assay was tested to detect 0.1% suspected meats under commercial backgrounds of marketed foods. Instead of simplex PCR which detects only one species at a time, such a multiplex platform can reduce cost by at least fivefolds by detecting five different species in a single assay platform.

  15. Insecurity of Wireless Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Weber, John Mark; Yoo, Seong-Moo

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA,more » allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.« less

  16. 4 CFR 201.17 - How to track a FOIA request.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false How to track a FOIA request. 201.17 Section 201.17 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PUBLIC INFORMATION AND REQUESTS § 201.17 How to track a FOIA request. (a) Tracking number. The Board will issue a tracking number to all FOIA requesters...

  17. 76 FR 64379 - Agency Information Collection Activities: Proposed Collection; Comments Requested; eForm 6 Access...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-18

    ...] Agency Information Collection Activities: Proposed Collection; Comments Requested; eForm 6 Access Request... Form/Collection: eForm 6 Access Request. (3) Agency form number, if any, and the applicable component...: Respondents must complete the eForm 6 Access Request form in order to receive a user ID and password to obtain...

  18. 39 CFR 3005.13 - Subpoenas issued in response to a third-party request.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the issuance of a subpoena to a covered person pursuant to § 3005.11. (1) Subpoenas may be requested... Postal Service shall transmit a copy of the request to any covered person that it deems likely to be affected by the request and shall provide the person requesting the subpoena with the name, business...

  19. 39 CFR 3005.13 - Subpoenas issued in response to a third-party request.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the issuance of a subpoena to a covered person pursuant to § 3005.11. (1) Subpoenas may be requested... Postal Service shall transmit a copy of the request to any covered person that it deems likely to be affected by the request and shall provide the person requesting the subpoena with the name, business...

  20. 36 CFR 1120.31 - A&TBCB receipt of requests; responsibilities of Freedom of Information Officer.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...; responsibilities of Freedom of Information Officer. 1120.31 Section 1120.31 Parks, Forests, and Public Property... Available Upon Request § 1120.31 A&TBCB receipt of requests; responsibilities of Freedom of Information Officer. (a) Upon receipt of a written request, the Freedom of Information Officer must mark the request...

  1. 32 CFR 1901.21 - Processing requests for access to or amendment of records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Action on Privacy Act Requests... requester cites one Act in the request, both, or neither. This action is taken in order to ensure the... written response, shall so inform the requester and advise of his or her right to an administrative appeal...

  2. 4 CFR 200.5 - Requests for access to records.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... facsimile at (202) 254-7970. (d) Requests by phone. A person may request access to his or her records by... 4 Accounts 1 2014-01-01 2013-01-01 true Requests for access to records. 200.5 Section 200.5... records. (a) All requests for records should include the following information: (1) Full name, address...

  3. 4 CFR 200.5 - Requests for access to records.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... facsimile at (202) 254-7970. (d) Requests by phone. A person may request access to his or her records by... 4 Accounts 1 2011-01-01 2011-01-01 false Requests for access to records. 200.5 Section 200.5... records. (a) All requests for records should include the following information: (1) Full name, address...

  4. 4 CFR 200.5 - Requests for access to records.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... facsimile at (202) 254-7970. (d) Requests by phone. A person may request access to his or her records by... 4 Accounts 1 2013-01-01 2013-01-01 false Requests for access to records. 200.5 Section 200.5... records. (a) All requests for records should include the following information: (1) Full name, address...

  5. 4 CFR 200.5 - Requests for access to records.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... facsimile at (202) 254-7970. (d) Requests by phone. A person may request access to his or her records by... 4 Accounts 1 2012-01-01 2012-01-01 false Requests for access to records. 200.5 Section 200.5... records. (a) All requests for records should include the following information: (1) Full name, address...

  6. 37 CFR 1.294 - Examination of request for publication of a statutory invention registration and patent...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... publication of a statutory invention registration and patent application to which the request is directed. 1... Public Use Proceedings § 1.294 Examination of request for publication of a statutory invention registration and patent application to which the request is directed. (a) Any request for a statutory invention...

  7. Polite Requestive Strategies in Emails: An Investigation of Pragmatic Competence of Chinese EFL Learners

    ERIC Educational Resources Information Center

    Zhu, Wuhan

    2012-01-01

    This paper is motivated by the premise that little is known about the use of requestive strategies in request emails in Chinese English-as-a-Foreign-Language (EFL) context. Specifically, the paper examines and compares requestive strategies in request emails between two groups of university students, namely English majors (EM) and non-English…

  8. 34 CFR 5.83 - Contents of request for review.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PURSUANT TO PUB. L. 90-23 (Eff. until 7-14-10) Administrative Review § 5.83 Contents of request for review. The request for review shall include a copy of the written request and the denial. ... 34 Education 1 2010-07-01 2010-07-01 false Contents of request for review. 5.83 Section 5.83...

  9. 36 CFR § 1007.3 - Requests for records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Requests for records. § 1007... INFORMATION ACT § 1007.3 Requests for records. (a) Submission of requests. A request to inspect or copy records shall be submitted to the Presidio Trust's FOIA Officer at P.O. Box 29052, San Francisco, CA 94129...

  10. 36 CFR 1260.58 - What are the procedures for requesting a mandatory review of White House originated information?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... requesting a mandatory review of White House originated information? 1260.58 Section 1260.58 Parks, Forests... review of White House originated information? (a) Requests for mandatory review must describe the...) NARA will promptly acknowledge to the requester the receipt of a request for White House originated...

  11. 16 CFR 1014.7 - Agency review of request for correction or amendment of a record.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Agency review of request for correction or... POLICIES AND PROCEDURES IMPLEMENTING THE PRIVACY ACT OF 1974 § 1014.7 Agency review of request for... review the request and either make the requested correction or amendment or notify the individual of his...

  12. 12 CFR 1102.306 - Procedures for requesting records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... a request for records. (1) The request shall be submitted in writing to the Executive Director: (i... period of: (A) Ten (10) working days as provided by written notice to the requester, setting forth the... ASC will advise the requester in writing: (A) If the denial is in part or in whole; (B) The name and...

  13. 20 CFR 404.820 - Filing a request for correction of the record of your earnings.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Filing a request for correction of the record of your earnings. 404.820 Section 404.820 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL... evidence of the date when the request was mailed. (e) Withdrawal of a request for correction. A request for...

  14. 76 FR 55999 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-09

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information [email protected] . [[Page 56000

  15. Interlanguage request modification: a case in vocational college

    NASA Astrophysics Data System (ADS)

    Widanta, I. M. R. J.; Sitawati, A. A. R.; Suciani, N. K.; Handayani, L. N. C.

    2018-01-01

    There has been much attention given by scholars to the investigation of inter-language pragmatics (ILP), and some of them have been concentrating on how ILP speakers modify their speech acts (SA) of request. This study was aimed at investigating request modification produced by Indonesian English speakers. A group of 23 college students majoring in tourism was involved as research participants. The participants were given two tests using two role play cards with two hotel-context request situations, i.e. low imposing request (R-Rq) and high imposing request (R+ Rq). Pretest was given prior to and post-test was given upon treatment. The situation was chosen based on[1] exemplar generation1 model. The data of request utterances was analyzed and compared with request taxonomies proposed by some scholars. Data analysis showed that the research participants were more competent pragmatically upon the treatment, indicated with the fact where they were able to produce 13 request modification patterns being compared to 11 patterns prior to the treatment.

  16. A Study of the First Year of the End-of-Life Clinic for Physician-Assisted Dying in the Netherlands.

    PubMed

    Snijdewind, Marianne C; Willems, Dick L; Deliens, Luc; Onwuteaka-Philipsen, Bregje D; Chambaere, Kenneth

    2015-10-01

    Right to Die NL, an organization in the Netherlands that advocates for the option of euthanasia, founded the End-of-Life Clinic in 2012 to provide euthanasia or physician-assisted suicide for patients who meet all legal requirements but whose regular physicians rejected their request. Many patients whose requests are rejected have less common situations, such as a psychiatric or psychological condition, dementia, or being tired of living. To study outcomes of requests for euthanasia or physician-assisted suicide received by the clinic and factors associated with granting or rejecting requests. Analysis of application forms and registration files from March 1, 2012, to March 1, 2013, the clinic's first year of operation, for 645 patients who applied to the clinic with a request for euthanasia or physician-assisted suicide and whose cases were concluded during the study period. A request could be granted, rejected, or withdrawn or the patient could have died before a final decision was reached. We analyzed bivariate and multivariate associations with medical conditions, type of suffering, and sociodemographic variables. Of the 645 requests made by patients, 162 requests (25.1%) were granted, 300 requests (46.5%) were refused, 124 patients (19.2%) died before the request could be assessed, and 59 patients (9.1%) withdrew their requests. Patients with a somatic condition (113 of 344 [32.8%]) or with cognitive decline (21 of 56 [37.5%]) had the highest percentage of granted requests. Patients with a psychological condition had the smallest percentage of granted requests. Six (5.0%) of 121 requests from patients with a psychological condition were granted, as were 11 (27.5%) of 40 requests from patients who were tired of living. Physicians in the Netherlands have more reservations about less common reasons that patients request euthanasia and physician-assisted suicide, such as psychological conditions and being tired of living, than the medical staff working for the End-of-Life Clinic. The physicians and nurses employed by the clinic, however, often confirmed the assessment of the physician who previously cared for the patient; they rejected nearly half of the requests for euthanasia and physician-assisted suicide, possibly because the legal due care criteria had not been met.

  17. Deferred Compensation Plan | Alaska Division of Retirement and Benefits

    Science.gov Websites

    Account Info Online General Info Empower Retirement Customer Service PIN Request Plan Booklet Investment Format Request Customer Service Request Status Refund Requests Resources Benefit Mailing Dates Booklets

  18. 12 CFR 602.16 - Combining requests.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ....16 Combining requests. You may not avoid paying fees by filing multiple requests at the same time. When FCA reasonably believes that you, alone or with others, are breaking down a request into a series...

  19. 41 CFR 51-8.6 - Aggregating requests.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., or a group of requesters acting in concert, is attempting to break a request down into a series of... include the time period in which the requests have occurred and the subject matter involved. ...

  20. 12 CFR 602.16 - Combining requests.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ....16 Combining requests. You may not avoid paying fees by filing multiple requests at the same time. When FCA reasonably believes that you, alone or with others, are breaking down a request into a series...

  1. 12 CFR 602.16 - Combining requests.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ....16 Combining requests. You may not avoid paying fees by filing multiple requests at the same time. When FCA reasonably believes that you, alone or with others, are breaking down a request into a series...

  2. 41 CFR 51-8.6 - Aggregating requests.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., or a group of requesters acting in concert, is attempting to break a request down into a series of... include the time period in which the requests have occurred and the subject matter involved. ...

  3. 41 CFR 51-8.6 - Aggregating requests.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., or a group of requesters acting in concert, is attempting to break a request down into a series of... include the time period in which the requests have occurred and the subject matter involved. ...

  4. 16 CFR § 1015.5 - Time limitation on responses to requests for records and requests for expedited processing.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... circumstances: (1) The need to search for and collect the requested records from field facilities or other establishments that are separate from the Office of the Secretary. (2) The need to search for, collect and... requester, or a group of requesters acting in concert, if the Secretary or delegate reasonably believes that...

  5. User Accounts | High-Performance Computing | NREL

    Science.gov Websites

    see information on user account policies. ACCOUNT PASSWORDS Logging in for the first time? Forgot your Accounts User Accounts Learn how to request an NREL HPC user account. Request an HPC Account To request an HPC account, please complete our request form. This form is provided using DocuSign. REQUEST

  6. 12 CFR 1102.102 - Times, places and requirements for requests pertaining to individual records in a record system...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Times, places and requirements for requests... Individuals and Systems of Records Maintained by the Appraisal Subcommittee § 1102.102 Times, places and... individuals making requests for access to records pertaining to them. (a) Place to make request. Any request...

  7. 31 CFR 256.13 - Are agencies required to supply a taxpayer identification number (TIN) when submitting a request...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... taxpayer identification number (TIN) when submitting a request for payment? 256.13 Section 256.13 Money and... BILLS Requesting Payments § 256.13 Are agencies required to supply a taxpayer identification number (TIN) when submitting a request for payment? Yes, agencies must include a valid TIN on all requests for...

  8. 31 CFR 256.13 - Are agencies required to supply a taxpayer identification number (TIN) when submitting a request...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... taxpayer identification number (TIN) when submitting a request for payment? 256.13 Section 256.13 Money and... BILLS Requesting Payments § 256.13 Are agencies required to supply a taxpayer identification number (TIN) when submitting a request for payment? Yes, agencies must include a valid TIN on all requests for...

  9. 31 CFR 256.13 - Are agencies required to supply a taxpayer identification number (TIN) when submitting a request...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... taxpayer identification number (TIN) when submitting a request for payment? 256.13 Section 256.13 Money and... BILLS Requesting Payments § 256.13 Are agencies required to supply a taxpayer identification number (TIN) when submitting a request for payment? Yes, agencies must include a valid TIN on all requests for...

  10. 31 CFR 256.13 - Are agencies required to supply a taxpayer identification number (TIN) when submitting a request...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... taxpayer identification number (TIN) when submitting a request for payment? 256.13 Section 256.13 Money and... BILLS Requesting Payments § 256.13 Are agencies required to supply a taxpayer identification number (TIN) when submitting a request for payment? Yes, agencies must include a valid TIN on all requests for...

  11. 31 CFR 256.13 - Are agencies required to supply a taxpayer identification number (TIN) when submitting a request...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... taxpayer identification number (TIN) when submitting a request for payment? 256.13 Section 256.13 Money and... BILLS Requesting Payments § 256.13 Are agencies required to supply a taxpayer identification number (TIN) when submitting a request for payment? Yes, agencies must include a valid TIN on all requests for...

  12. 34 CFR 5.81 - Time for initiation of request for review.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PUBLIC PURSUANT TO PUB. L. 90-23 (Eff. until 7-14-10) Administrative Review § 5.81 Time for initiation of request for review. A person whose request has been denied may initiate a review by filing a request for... 34 Education 1 2010-07-01 2010-07-01 false Time for initiation of request for review. 5.81 Section...

  13. Method and apparatus for granting processors access to a resource

    DOEpatents

    Blumrich, Matthias A.; Salapura, Valentina

    2010-03-16

    An apparatus and method for granting one or more requesting entities access to a resource in a predetermined time interval. The apparatus includes a first circuit receiving one or more request signals, and implementing logic for assigning a priority to the one or more request signals, and, generating a set of first_request signals based on the priorities assigned. One or more priority select circuits for receiving the set of first_request signals and generating corresponding one or more fixed grant signals representing one or more highest priority request signals when asserted during the predetermined time interval. A second circuit device receives the one or more fixed grant signals generates one or more grant signals associated with one or more highest priority request signals assigned, the grant signals for enabling one or more respective requesting entities access to the resource in the predetermined time interval, wherein the priority assigned to the one or more request signals changes each successive predetermined time interval. In one embodiment, the assigned priority is based on a numerical pattern, the first circuit changing the numerical pattern with respect to the first_request signals generated at each successive predetermined time interval.

  14. Longitudinal evaluation of a World Wide Web-based antimicrobial stewardship program: assessing factors associated with approval patterns and trends over time.

    PubMed

    Venugopal, Vidya; Lehmann, Christoph U; Diener-West, Marie; Agwu, Allison L

    2014-02-01

    The Johns Hopkins Children's Medical and Surgery Center developed a Web-based Antimicrobial Stewardship Program (ASP) in 2005. The present study aimed to assess longitudinal antimicrobial request and approval patterns for this ASP. We analyzed a total of 16,229 antimicrobial requests for 3,542 patients between June 1, 2005, and June 30, 2009. Antimicrobial approval was the outcome of interest. We assessed gaming by studying trends in automatically approved requests. Nonparametric tests for trend were performed to detect changes in approval patterns. Multiple logistic regression was used to identify factors associated with approval. The vast majority (91.3%) of antimicrobial requests were approved, with an increase of 6.1% over time (P < .01). Renewal requests were more likely than primary requests (adjusted odds ratio [aOR], 1.72; 95% confidence interval [CI], 1.45-2.04) to be approved. Antiviral requests had higher odds of approval than antibiotic requests (aOR, 1.27; 95% CI, 1.04-1.56). Compared with requests by medical services, requests by surgical services had lower odds of approval (aOR, 0.70; 95% CI, 0.59-0.83), whereas pediatric intensive care requests had higher odds of approval (aOR, 1.18; 95% CI, 1.00-1.40). The number of auto-approved requests remained consistent. The Web-based ASP allows management of a large number of antimicrobial requests, without apparent gaming. Observed differences in approval patterns based on patient, requestor, and antimicrobial factors may inform the development of ASPs and evaluation of provider education and training. Copyright © 2014 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Mosby, Inc. All rights reserved.

  15. 75 FR 52313 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-25

    .... Title, Form and OMB Number: Request for Armed Forces Participation in Public Events (Non-Aviation), DD Form 2536 and Request for Military Aerial Support, DD Form 2535; OMB Number 0704-0290. Type of Request...

  16. 5 CFR 2604.301 - Requests for records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... submit his request under the FOIA in writing. In the case of a written request, the envelope containing... requested records can be shown. (2) “Compelling need” means: (i) Circumstances in which failure to obtain...

  17. 32 CFR 806b.22 - Responding to amendment requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ADMINISTRATION PRIVACY ACT PROGRAM Amending the Record § 806b.22 Responding to amendment requests. (a) Anyone may request minor corrections orally. Requests for more serious modifications should be in writing. (b) After...

  18. 32 CFR 806b.22 - Responding to amendment requests.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ADMINISTRATION PRIVACY ACT PROGRAM Amending the Record § 806b.22 Responding to amendment requests. (a) Anyone may request minor corrections orally. Requests for more serious modifications should be in writing. (b) After...

  19. A pilot study of naturally occurring high-probability request sequences in hostage negotiations.

    PubMed

    Hughes, James

    2009-01-01

    In the current study, the audiotapes from three hostage-taking situations were analyzed. Hostage negotiator requests to the hostage taker were characterized as either high or low probability. The results suggested that hostage-taker compliance to a hostage negotiator's low-probability request was more likely when a series of complied-with high-probability requests preceded the low-probability request. However, two of the three hostage-taking situations ended violently; therefore, the implications of the high-probability request sequence for hostage-taking situations should be assessed in future research.

  20. A PILOT STUDY OF NATURALLY OCCURRING HIGH-PROBABILITY REQUEST SEQUENCES IN HOSTAGE NEGOTIATIONS

    PubMed Central

    Hughes, James

    2009-01-01

    In the current study, the audiotapes from three hostage-taking situations were analyzed. Hostage negotiator requests to the hostage taker were characterized as either high or low probability. The results suggested that hostage-taker compliance to a hostage negotiator's low-probability request was more likely when a series of complied-with high-probability requests preceded the low-probability request. However, two of the three hostage-taking situations ended violently; therefore, the implications of the high-probability request sequence for hostage-taking situations should be assessed in future research. PMID:19949541

  1. Ethical analysis of withdrawing ventricular assist device support.

    PubMed

    Mueller, Paul S; Swetz, Keith M; Freeman, Monica R; Carter, Kari A; Crowley, Mary Eliot; Severson, Cathy J Anderson; Park, Soon J; Sulmasy, Daniel P

    2010-09-01

    To describe a series of patients with heart failure supported with a ventricular assist device (VAD) who requested (or whose surrogates requested) withdrawal of VAD support and the legal and ethical aspects pertaining to these requests. We retrospectively reviewed the medical records of patients at Mayo Clinic, Rochester, MN, from March 1, 2003, through January 31, 2009, who requested (or whose surrogates requested) withdrawal of VAD support and for whom the requests were fulfilled. We then explored the legal and ethical permissibility of carrying out such requests. The median age of the 14 patients identified (13 men, 1 woman) was 57 years. Requests were made by 2 patients and 12 surrogates. None of the patients' available advance directives mentioned the VAD. For 11 patients, multidisciplinary care conferences were held before withdrawal of VAD support. Only 1 patient had an ethics consultation. All 14 patients died within 1 day of withdrawal of VAD support. Patients have the right to refuse or request the withdrawal of any unwanted treatment, and we argue that this right extends to VAD support. We also argue that the cause of death in these cases is the underlying heart disease, not assisted suicide or euthanasia. Therefore, patients with heart failure supported with VADs or their surrogates may request withdrawal of this treatment. In our view, carrying out such requests is permissible in accordance with the principles that apply to withdrawing other life-sustaining treatments.

  2. 7 CFR 780.10 - State committee appeals.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... adverse decision to NAD before requesting an appeal to the State Committee. (c) If a participant requests mediation or requests an appeal to NAD before a request for an appeal to the State Committee has been acted...

  3. 12 CFR 563g.15 - Requests for interpretive advice or waiver.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., Corporate and Securities Division; (b) The provisions of this part to which the request relates, the... SECURITIES OFFERINGS § 563g.15 Requests for interpretive advice or waiver. Any requests to the Office for...

  4. 12 CFR 563g.15 - Requests for interpretive advice or waiver.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., Corporate and Securities Division; (b) The provisions of this part to which the request relates, the... SECURITIES OFFERINGS § 563g.15 Requests for interpretive advice or waiver. Any requests to the Office for...

  5. 12 CFR 563g.15 - Requests for interpretive advice or waiver.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., Corporate and Securities Division; (b) The provisions of this part to which the request relates, the... SECURITIES OFFERINGS § 563g.15 Requests for interpretive advice or waiver. Any requests to the Office for...

  6. 12 CFR 563g.15 - Requests for interpretive advice or waiver.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., Corporate and Securities Division; (b) The provisions of this part to which the request relates, the... SECURITIES OFFERINGS § 563g.15 Requests for interpretive advice or waiver. Any requests to the Office for...

  7. 12 CFR 563g.15 - Requests for interpretive advice or waiver.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ..., Corporate and Securities Division; (b) The provisions of this part to which the request relates, the... SECURITIES OFFERINGS § 563g.15 Requests for interpretive advice or waiver. Any requests to the Office for...

  8. Using one-way communications in a market-based resource allocation system

    DOEpatents

    Chassin, David P.; Pratt, Robert G.

    2014-07-22

    Disclosed herein are representative embodiments of methods, apparatus, and systems for distributing a resource (such as electricity) using a resource allocation system. In one exemplary embodiment, a plurality of requests for electricity are received from a plurality of end-use consumers. The requests indicate a requested quantity of electricity and a consumer-requested index value indicative of a maximum price a respective end-use consumer will pay for the requested quantity of electricity. A plurality of offers for supplying electricity are received from a plurality of resource suppliers. The offers indicate an offered quantity of electricity and a supplier-requested index value indicative of a minimum price for which a respective supplier will produce the offered quantity of electricity. A dispatched index value is computed at which electricity is to be supplied based at least in part on the consumer-requested index values and the supplier-requested index values.

  9. Electric power grid control using a market-based resource allocation system

    DOEpatents

    Chassin, David P

    2014-01-28

    Disclosed herein are representative embodiments of methods, apparatus, and systems for distributing a resource (such as electricity) using a resource allocation system. In one exemplary embodiment, a plurality of requests for electricity are received from a plurality of end-use consumers. The requests indicate a requested quantity of electricity and a consumer-requested index value indicative of a maximum price a respective end-use consumer will pay for the requested quantity of electricity. A plurality of offers for supplying electricity are received from a plurality of resource suppliers. The offers indicate an offered quantity of electricity and a supplier-requested index value indicative of a minimum price for which a respective supplier will produce the offered quantity of electricity. A dispatched index value is computed at which electricity is to be supplied based at least in part on the consumer-requested index values and the supplier-requested index values.

  10. Using bi-directional communications in a market-based resource allocation system

    DOEpatents

    Chassin, David P; Pratt, Robert G

    2014-04-01

    Disclosed herein are representative embodiments of methods, apparatus, and systems for distributing a resource (such as electricity) using a resource allocation system. In one exemplary embodiment, a plurality of requests for electricity are received from a plurality of end-use consumers. The requests indicate a requested quantity of electricity and a consumer-requested index value indicative of a maximum price a respective end-use consumer will pay for the requested quantity of electricity. A plurality of offers for supplying electricity are received from a plurality of resource suppliers. The offers indicate an offered quantity of electricity and a supplier-requested index value indicative of a minimum price for which a respective supplier will produce the offered quantity of electricity. A dispatched index value is computed at which electricity is to be supplied based at least in part on the consumer-requested index values and the supplier-requested index values.

  11. Electric power grid control using a market-based resource allocation system

    DOEpatents

    Chassin, David P.

    2015-07-21

    Disclosed herein are representative embodiments of methods, apparatus, and systems for distributing a resource (such as electricity) using a resource allocation system. In one exemplary embodiment, a plurality of requests for electricity are received from a plurality of end-use consumers. The requests indicate a requested quantity of electricity and a consumer-requested index value indicative of a maximum price a respective end-use consumer will pay for the requested quantity of electricity. A plurality of offers for supplying electricity are received from a plurality of resource suppliers. The offers indicate an offered quantity of electricity and a supplier-requested index value indicative of a minimum price for which a respective supplier will produce the offered quantity of electricity. A dispatched index value is computed at which electricity is to be supplied based at least in part on the consumer-requested index values and the supplier-requested index values.

  12. Using bi-directional communications in a market-based resource allocation system

    DOEpatents

    Chassin, David P.; Pratt, Robert G.

    2015-09-08

    Disclosed herein are representative embodiments of methods, apparatus, and systems for distributing a resource (such as electricity) using a resource allocation system. In one exemplary embodiment, a plurality of requests for electricity are received from a plurality of end-use consumers. The requests indicate a requested quantity of electricity and a consumer-requested index value indicative of a maximum price a respective end-use consumer will pay for the requested quantity of electricity. A plurality of offers for supplying electricity are received from a plurality of resource suppliers. The offers indicate an offered quantity of electricity and a supplier-requested index value indicative of a minimum price for which a respective supplier will produce the offered quantity of electricity. A dispatched index value is computed at which electricity is to be supplied based at least in part on the consumer-requested index values and the supplier-requested index values.

  13. Using bi-directional communications in a market-based resource allocation system

    DOEpatents

    Chassin, David P; Pratt, Robert G

    2015-05-05

    Disclosed herein are representative embodiments of methods, apparatus, and systems for distributing a resource (such as electricity) using a resource allocation system. In one exemplary embodiment, a plurality of requests for electricity are received from a plurality of end-use consumers. The requests indicate a requested quantity of electricity and a consumer-requested index value indicative of a maximum price a respective end-use consumer will pay for the requested quantity of electricity. A plurality of offers for supplying electricity are received from a plurality of resource suppliers. The offers indicate an offered quantity of electricity and a supplier-requested index value indicative of a minimum price for which a respective supplier will produce the offered quantity of electricity. A dispatched index value is computed at which electricity is to be supplied based at least in part on the consumer-requested index values and the supplier-requested index values.

  14. 78 FR 25091 - Submission for OMB Review; 30-Day Comment Request: Request for Human Embryonic Stem Cell Line To...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-29

    ...; 30-Day Comment Request: Request for Human Embryonic Stem Cell Line To Be Approved for Use in NIH... Embryonic Stem Cell Line to be Approved for Use in NIH-Funded Research, 0925-0601, Expiration Date 04/30... Information Collection: The form is used by applicants to request that human embryonic stem cell lines be...

  15. 10 CFR 1703.109 - Procedure for appeal of denial of requests for board records and denial of requests for fee...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Procedure for appeal of denial of requests for board records and denial of requests for fee waiver or reduction. 1703.109 Section 1703.109 Energy DEFENSE NUCLEAR FACILITIES SAFETY BOARD PUBLIC INFORMATION AND REQUESTS § 1703.109 Procedure for appeal of denial...

  16. 10 CFR 1703.109 - Procedure for appeal of denial of requests for board records and denial of requests for fee...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Procedure for appeal of denial of requests for board records and denial of requests for fee waiver or reduction. 1703.109 Section 1703.109 Energy DEFENSE NUCLEAR FACILITIES SAFETY BOARD PUBLIC INFORMATION AND REQUESTS § 1703.109 Procedure for appeal of denial...

  17. 10 CFR 1703.109 - Procedure for appeal of denial of requests for board records and denial of requests for fee...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Procedure for appeal of denial of requests for board records and denial of requests for fee waiver or reduction. 1703.109 Section 1703.109 Energy DEFENSE NUCLEAR FACILITIES SAFETY BOARD PUBLIC INFORMATION AND REQUESTS § 1703.109 Procedure for appeal of denial...

  18. 10 CFR 1703.109 - Procedure for appeal of denial of requests for board records and denial of requests for fee...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Procedure for appeal of denial of requests for board records and denial of requests for fee waiver or reduction. 1703.109 Section 1703.109 Energy DEFENSE NUCLEAR FACILITIES SAFETY BOARD PUBLIC INFORMATION AND REQUESTS § 1703.109 Procedure for appeal of denial...

  19. 10 CFR 1703.109 - Procedure for appeal of denial of requests for board records and denial of requests for fee...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Procedure for appeal of denial of requests for board records and denial of requests for fee waiver or reduction. 1703.109 Section 1703.109 Energy DEFENSE NUCLEAR FACILITIES SAFETY BOARD PUBLIC INFORMATION AND REQUESTS § 1703.109 Procedure for appeal of denial...

  20. 77 FR 12827 - Alaska Energy Authority; Notice of Intent To File License Application, Filing of Pre-Application...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-02

    ... Study Requests a. Type of Filing: Notice of Intent to File License Application for an Original License... well as study requests. All comments on the PAD and SD1, and study requests should be sent to the address above in paragraph h. In addition, all comments on the PAD and SD1, study requests, requests for...

  1. Patient-initiated electronic health record amendment requests

    PubMed Central

    Hanauer, David A; Preib, Rebecca; Zheng, Kai; Choi, Sung W

    2014-01-01

    Background and objective Providing patients access to their medical records offers many potential benefits including identification and correction of errors. The process by which patients ask for changes to be made to their records is called an ‘amendment request’. Little is known about the nature of such amendment requests and whether they result in modifications to the chart. Methods We conducted a qualitative content analysis of all patient-initiated amendment requests that our institution received over a 7-year period. Recurring themes were identified along three analytic dimensions: (1) clinical/documentation area, (2) patient motivation for making the request, and (3) outcome of the request. Results The dataset consisted of 818 distinct requests submitted by 181 patients. The majority of these requests (n=636, 77.8%) were made to rectify incorrect information and 49.7% of all requests were ultimately approved. In 6.6% of the requests, patients wanted valid information removed from their record, 27.8% of which were approved. Among all of the patients requesting a copy of their chart, only a very small percentage (approximately 0.2%) submitted an amendment request. Conclusions The low number of amendment requests may be due to inadequate awareness by patients about how to make changes to their records. To make this approach effective, it will be important to inform patients of their right to view and amend records and about the process for doing so. Increasing patient access to medical records could encourage patient participation in improving the accuracy of medical records; however, caution should be used. PMID:24863430

  2. Failure to review STAT clinical laboratory requests and its economical impact.

    PubMed

    Rodriguez-Borja, Enrique; Villalba-Martinez, Celia; Barba-Serrano, Esther; Carratala-Calvo, Arturo

    2016-01-01

    Failure to follow-up laboratory test results has been described as one of the major processes contributing to unsafe patient care. Currently, most of the laboratories do not know with certainty not only their rate of missed (or unreviewed) requests but the economical cost and impact that this issue implies. The aim of our study was to measure that rate and calculate the resulting costs. In January 2015, we checked in our Laboratory Information Management System (LIMS) for every emergency request from 1(st) July 2011 to 30(th) June 2014, if they had been reviewed by any allowed user or not. 319,064 requests were ordered during that period of time. Results were expressed as "ordered requests", "missed requests" and its percentage. Additionally, total cost of missed requests was calculated in euros (€). "Non-productive days" were theorised (as the days producing requests that were not reviewed) based on these results. 7924 requests (2.5%) were never reviewed by clinicians. This represented a total cost of 203,039 € and 27 "non-productive" days in three years. Significant differences between inpatients, outpatients and emergency department as well as different emergencies units were found after application of statistical analysis. In terms of resources, never reviewed or missed requests appear to be a not negligible problem for the clinical laboratory management. Electronic result delivery, with electronic endorsement to indicate follow-up of requests along with better systems of electronic requesting should be investigated as a way of improving patient outcomes and save unnecessary expenses.

  3. A mixed-method examination of food marketing directed towards children in Australian supermarkets.

    PubMed

    Campbell, Sarah; James, Erica L; Stacey, Fiona G; Bowman, Jennifer; Chapman, Kathy; Kelly, Bridget

    2014-06-01

    The purpose of this study was to determine the prevalence of children's food requests, and parents' experiences of food marketing directed towards children, in the supermarket environment. A mixed-method design was used. Firstly, intercept interviews were conducted with parents accompanied by a child/children on exiting supermarkets (sampled from a large regional centre in Australia). Parents were asked about the prevalence and types of food requests by child/children during their supermarket visit and whether they purchased these foods. Secondly, focus groups (n = 13) and telephone interviews (n = 3) were conducted exploring parents' experiences of supermarket shopping with children and the impact of child-directed marketing. Of the 158 intercept survey participants (30% response rate), 73% reported a food request during the supermarket visit. Most requested food items (88%) were unhealthy foods, with chocolate/confectionery being the most common food category requested (40%). Most parents (70%) purchased at least one food item requested during the shopping trip. Qualitative interviews identified four themes associated with food requests and prompts in the supermarket: parents' experience of pester power in the supermarket; prompts for food requests in the supermarket; parental responses to pestering in the supermarket environment, and; strategies to manage pestering and minimize requests for food items. Food requests from children are common during supermarket shopping. Despite the majority of the requests being unhealthy, parents often purchase these foods. Parents reported difficulties dealing with constant requests and expressed desire for environmental changes including confectionery-free checkouts, minimization of child friendly product placement and reducing children's exposure to food marketing.

  4. Predictors of outpatients' request for palliative care service at a medical oncology clinic of a German comprehensive cancer center.

    PubMed

    Tewes, Mitra; Rettler, Teresa; Wolf, Nathalie; Hense, Jörg; Schuler, Martin; Teufel, Martin; Beckmann, Mingo

    2018-05-05

    Early integration of palliative care (PC) is recommended. The determination of predictors for patients' request for PC may guide implementation in clinical practice. Toward this end, we analyzed the symptom burden and distress of cancer patients in outpatient care and examined their need and request for PC. Between October 2013 and March 2016, 705 patients receiving outpatient cancer treatment took part in the survey. We used the new MInimal DOcumentation System to detect symptom clusters. Additionally, patients' request for palliative and psychosocial support was assessed. Groups of patients with PC request were compared to patients without PC request regarding their symptom clusters. Logistic regression analysis was applied to discover significant predictors for the requested inclusion of PC. A total of 159 patients (25.5%) requested additional support by PC. Moderate and severe tiredness (40.3%), weakness (37.9%), pain (25.0%), loss of appetite (22.3%), and dyspnea (19.1%) were the most frequent symptoms. The group of patients requesting PC differed significantly in terms of pain, nausea, dyspnea, constipation, weakness, loss of appetite, tiredness, depression, and anxiety from patients without request for PC (p < .01). The perceived need for PC was identified by the significant predictors "depression," "anxiety," and "weakness" with an explained variance of 22%. Combining a standardized screening questionnaire and the assessment of patients' request for PC allows systematic monitoring for patients' need for PC in a large Medical Oncology clinic. Depression, anxiety, and weakness are predictors of requesting PC service by patients receiving outpatient cancer treatment.

  5. 78 FR 39054 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-28

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202- 395-6974, Email address: [email protected] . (SSA) Social Security Administration...

  6. 5 CFR 1209.8 - Filing a request for a stay.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... WHISTLEBLOWING Stay Requests § 1209.8 Filing a request for a stay. (a) Time of filing. An appellant may request a stay of a personnel action allegedly based on whistleblowing at any time after the appellant becomes...

  7. 14 CFR § 1206.703 - Aggregation of requests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... AGENCY RECORDS TO MEMBERS OF THE PUBLIC Search, Review, and Duplication Fees § 1206.703 Aggregation of... requester or a group of requesters acting in concert, is attempting to break a request down into a series of...

  8. 76 FR 41320 - Agency Information Collection Activities; Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-13

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities; Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: [email protected] . (SSA), Social Security Administration, DCBFM, Attn: Reports Clearance...

  9. 77 FR 71204 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-29

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, Email address: [email protected] . (SSA), Social Security Administration...

  10. 78 FR 56265 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, Email address: [email protected] . (SSA), Social Security Administration...

  11. 76 FR 71105 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-16

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: (202) 395-6974, Email address: [email protected] . (SSA), Social Security Administration...

  12. 77 FR 58903 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-24

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... . (SSA), Social Security Administration, DCRDP, Attn: Reports Clearance Director, 107 Altmeyer Building...

  13. 76 FR 72994 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-28

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information [email protected] . (SSA) Social Security Administration, DCRDP, Attn: Reports Clearance Officer, 107...

  14. 78 FR 22935 - Agency Information Collection Activities; Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-17

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities; Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... . (SSA) Social Security Administration, DCRDP, Attn: Reports Clearance Director, 107 Altmeyer Building...

  15. 77 FR 37728 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-22

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...), Social Security Administration, DCRDP, Attn: Reports Clearance Director, 107 Altmeyer Building, 6401...

  16. 76 FR 23640 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-27

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, E-mail address: [email protected] . (SSA), Social Security Administration...

  17. 76 FR 27378 - Request for Service Corporation Activity

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-11

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Request for Service Corporation Activity AGENCY: Office of Thrift Supervision (OTS), Treasury. ACTION: Notice and request for comment. SUMMARY... on the following information collection. Title of Proposal: Request for Service Corporation Activity...

  18. 78 FR 33142 - Agency Information Collection Activities; Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-03

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities; Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, Email address: [email protected] . (SSA) Social Security Administration, DCRDP...

  19. 78 FR 79723 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-31

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, Email address: [email protected] . (SSA) Social Security Administration, OLCA...

  20. 14 CFR 1206.701 - Categories of requesters.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... scientific institutions; representatives of the news media; and all other requesters. The Act prescribes... reproduction of documents. (b) Education and noncommercial scientific institution requesters. NASA shall... are representatives of the news media. NASA shall provide documents to requesters in this category for...

  1. 22 CFR 9.9 - Declassification and downgrading.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... occur: (1) After review of material in response to a Freedom of Information Act (FOIA) request, mandatory declassification review request, discovery request, subpoena, classification challenge, or other information access or declassification request; (2) After review as part of the Department's systematic...

  2. 78 FR 54889 - Proposed Information Collection Request; Comment Request; Confidentiality Rules (Renewal)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-06

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OEI-2013-0565; FRL -9535-9] Proposed Information Collection Request; Comment Request; Confidentiality Rules (Renewal) AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: The Environmental Protection Agency is planning to submit an...

  3. 77 FR 16587 - Proposed Collection; Comment Request for Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-21

    ... DEPARTMENT OF THE TREASURY Internal Revenue Service Proposed Collection; Comment Request for Notice AGENCY: Internal Revenue Service (IRS), Treasury. ACTION: Notice and request for comments. SUMMARY...., Washington, DC 20224. FOR FURTHER INFORMATION CONTACT: Requests for additional information or copies of...

  4. 30 CFR 250.530 - When does my casing pressure request approval become invalid?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... request approval become invalid? A casing pressure request becomes invalid when: (a) The casing or riser... different casing or riser on the same well requires a casing pressure request; or (e) A well has more than...

  5. 30 CFR 250.531 - When does my casing pressure request approval become invalid?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... request approval become invalid? A casing pressure request becomes invalid when: (a) The casing or riser... different casing or riser on the same well requires a casing pressure request; or (e) A well has more than...

  6. 30 CFR 250.531 - When does my casing pressure request approval become invalid?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... request approval become invalid? A casing pressure request becomes invalid when: (a) The casing or riser... different casing or riser on the same well requires a casing pressure request; or (e) A well has more than...

  7. 78 FR 72744 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-03

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, Email address: [email protected] . (SSA) Social Security Administration, OLCA...

  8. 5 CFR 1303.50 - Fees to be charged-categories of requesters.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... disclosure of records (see § 1303.60(b)). (b) Educational and non-commercial scientific institution...-commercial scientific institution) research. Requesters must reasonably describe the records sought. (c... requesters: commercial use requesters; educational and non-commercial scientific institutions...

  9. 5 CFR 1303.50 - Fees to be charged-categories of requesters.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... disclosure of records (see § 1303.60(b)). (b) Educational and non-commercial scientific institution...-commercial scientific institution) research. Requesters must reasonably describe the records sought. (c... requesters: commercial use requesters; educational and non-commercial scientific institutions...

  10. 5 CFR 1303.50 - Fees to be charged-categories of requesters.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... disclosure of records (see § 1303.60(b)). (b) Educational and non-commercial scientific institution...-commercial scientific institution) research. Requesters must reasonably describe the records sought. (c... requesters: commercial use requesters; educational and non-commercial scientific institutions...

  11. 5 CFR 1303.50 - Fees to be charged-categories of requesters.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... disclosure of records (see § 1303.60(b)). (b) Educational and non-commercial scientific institution...-commercial scientific institution) research. Requesters must reasonably describe the records sought. (c... requesters: commercial use requesters; educational and non-commercial scientific institutions...

  12. 75 FR 35512 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-22

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, E-mail address: [email protected] . (SSA), Social Security Administration...

  13. 78 FR 70391 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-25

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, Email address: [email protected] . (SSA), Social Security Administration, OLCA...

  14. 75 FR 59318 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-27

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202- 395-6974, E-mail address: [email protected] . (SSA) Social Security Administration...

  15. 76 FR 18290 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-01

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, E-mail address: [email protected] ; (SSA), Social Security Administration...

  16. 76 FR 19175 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-06

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, E-mail address: [email protected] . (SSA), Social Security Administration...

  17. 76 FR 48200 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-08

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, E-mail address: [email protected] . (SSA), Social Security Administration...

  18. 76 FR 17977 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-31

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202- 395-6974, E-mail address: [email protected] . (SSA) Social Security Administration...

  19. 76 FR 5233 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-28

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974. E-mail address: [email protected] . (SSA) Social Security Administration...

  20. Requester's Acceptance and Non-Acceptance of the Refusal of the Initial Request: How to Improve the Door-in-the-Face Effects?

    ERIC Educational Resources Information Center

    Terrier, Lohyd; Joule, Robert-Vincent; Marfaing, Benedicte

    2011-01-01

    The door-in-the-face technique (Cialdini, Vincent, Lewis, Catalan, Wheeler & Darby, 1975) increases the likelihood that subjects will comply with a target request after they have been submitted first to a request too costly to for agreement. This study tests the effects of the requester's acceptance versus non-acceptance of the refusal of the…

  1. Potential over request in anemia laboratory tests in primary care in Spain.

    PubMed

    Salinas, María; López-Garrigós, Maite; Flores, Emilio; Uris, Joaquín; Leiva-Salinas, Carlos

    2015-07-01

    The aim was to study the inter-practice variability in anemia laboratory tests requested by general practitioners in Spain, to evaluate for a potential requesting inappropriateness. Laboratories from diverse Spanish regions filled out the number of cell blood count, ferritin, folate, iron, transferrin, and vitamin B12 requested by general practitioners during 2012. The number of test requests per 1000 inhabitants and ratios of related tests requests were calculated. The results obtained in hospitals from different areas (urban, rural, or urban-rural), type of management (public or private), and geographic regions were compared. There was a high variability in the number of test requests and ratios of related tests. Cell blood count was over requested in rural areas and in hospitals with private management. Andalucía was the community with the lowest number of iron requests and the lowest folate/vitamin B12 indicator value. Iron and transferrin seemed over requested in some areas; as were folate and ferritin when compared to vitamin B12 and cell blood count, respectively. The differences observed between areas indicate that other factors besides clinical reasons could be behind that variability and emphasize the need to accomplish interventions to improve the appropriate use of anemia laboratory tests.

  2. Indications for laboratory tests in primary care: assessment of the most frequent indications and requests with blank clinical information

    PubMed Central

    Salinas, Maria; López-Garrigós, Maite; Flores, Emilio; Leiva-Salinas, Maria; Esteban, Patricia; Ahumada, Miguel; Leiva-Salinas, Carlos

    2016-01-01

    Introduction The aim of this work is twofold. Firstly, to study the temporal evolution in the number of laboratory requests from primary care without clinical indication, and to analyse the number of such requests before and after the implementation of an automated requesting procedure. Secondly, to investigate what are the most frequent clinical indications that prompted laboratory testing. Materials and methods This is a retrospective observational study conducted from January 2009 to December 2015. We counted the requests without clinical question, calculated the number of such requests per total number of requests and listed the most frequent indications. Results The number of tests requests with a blank clinical indication was significantly higher in 2009 when compared to 2015 (80% vs. 20%; P < 0.001). For every year in this 7-year period, dyslipidemia, essential hypertension and diabetes were the most prevalent diagnoses that prompted a laboratory test in primary care, accounting for more than 20% of all indications. Conclusions The number of primary care requests without patient clinical question has decreased after the implementation of an automated requesting procedure. Disorders of lipid metabolism, essential hypertension and diabetes mellitus were the most prevalent diagnoses that prompted a laboratory test in primary care. PMID:27812310

  3. A path analysis model of factors influencing children's requests for unhealthy foods.

    PubMed

    Pettigrew, Simone; Jongenelis, Michelle; Miller, Caroline; Chapman, Kathy

    2017-01-01

    Little is known about the complex combination of factors influencing the extent to which children request unhealthy foods from their parents. The aim of this study was to develop a comprehensive model of influencing factors to provide insight into potential methods of reducing these requests. A web panel provider was used to administer a national online survey to a sample of 1302 Australian parent-child dyads (total sample n=2604). Initial univariate analyses identified potential predictors of children's requests for and consumption of unhealthy foods. The identified variables were subsequently incorporated into a path analysis model that included both parents' and children's reports of children's requests for unhealthy foods. The resulting model accounted for a substantial 31% of the variance in parent-reported food request frequency and 27% of the variance in child-reported request frequency. The variable demonstrating the strongest direct association with both parents' and children's reports of request frequency was the frequency of children's current intake of unhealthy foods. Parents' and children's exposure to food advertising and television viewing time were also positively associated with children's unhealthy food requests. The results highlight the need to break the habitual provision of unhealthy foods to avoid a vicious cycle of requests resulting in consumption. Copyright © 2016 Elsevier Ltd. All rights reserved.

  4. TASAR Flight Trial 2: Assessment of Air Traffic Controller Acceptability of TASAR Requests

    NASA Technical Reports Server (NTRS)

    Idris, Husni; Enea, Gabriele

    2016-01-01

    In support of the Flight Trial (FT-2) of NASA's prototype of the Traffic Aware Strategic Aircrew Requests (TASAR) concept, observations were conducted at the air traffic facilities to identify and assess the main factors that affect the acceptability of pilot requests by air traffic controllers. Two observers shadowed air traffic controllers at the Atlanta (ZTL) and Jacksonville (ZJX) air traffic control centers as the test flight pilot made pre-scripted requests to invoke acceptability issues and then they interviewed the observed and other controllers voluntarily. Fifty controllers were interviewed with experience ranging from one to thirty-five years. All interviewed controllers were enthusiastic about the technology and accounting for sector boundaries in pilot requests, particularly if pilots can be made aware of high workload situations. All interviewed controllers accept more than fifty percent of pilot requests; forty percent of them reject less than ten percent of requests. The most common reason for rejecting requests is conflicting with traffic followed by violating letters of agreement (LOAs) and negatively impacting neighboring sector workload, major arrival and departure flows and flow restrictions. Thirty-six requests were made during the test, eight of which were rejected due to: the aircraft already handed off to another sector, violating LOA, opposing traffic, intruding into an active special use airspace (SUA), intruding into another center, weather, and unfamiliarity with the requested waypoint. Nine requests were accepted with delay mostly because the controller needed to locate unfamiliar waypoints or to coordinate with other controllers.

  5. When the topic is you: genetic counselor responses to prenatal patients' requests for self-disclosure.

    PubMed

    Balcom, Jessica R; Veach, Patricia McCarthy; Bemmels, Heather; Redlinger-Grosse, Krista; LeRoy, Bonnie S

    2013-06-01

    A limited amount of research indicates patient requests play a major role in genetic counselors' self-disclosure decisions and that disclosure and non-disclosure responses to patient requests may differentially affect genetic counseling processes. Studies further suggest patient requests may be more common in prenatal settings, particularly when counselors are pregnant. Empirical evidence is limited however, concerning the nature of patient requests. This study explored genetic counselors' experiences of prenatal patients' requests for self-disclosure. Four major research questions were: (1) What types of questions do prenatal patients ask that invite self-disclosure?; (2) Do pregnant genetic counselors have unique experiences with prenatal patient disclosure requests?; (3) How do genetic counselors typically respond to disclosure requests?; and (4) What strategies are effective and ineffective in responding to disclosure requests? One hundred seventy-six genetic counselors completed an online survey and 40 also participated in telephone interviews. Inductive analysis of 21 interviews revealed patient questions vary, although questions about counselor demographics are most common, and patients are more likely to ask pregnant counselors questions about their personal pregnancy decisions. Participants reported greater discomfort with self-disclosure requests during pregnancy, yet also disclosing more frequently during pregnancy. Counselor responses included personal self-disclosure, professional self-disclosure, redirection, and declining to disclose. Factors perceived as influencing disclosure included: topic, patient motivations, timing of request, quality of counseling relationship, patient characteristics, and ethical/legal responsibilities. Disclosure practices changed over time for most counselors. Additional findings, practice implications, and research recommendations are discussed.

  6. Open access to MRI for general practitioners: 12 years' experience at one institution -- a retrospective analysis.

    PubMed

    Gough-Palmer, A L; Burnett, C; Gedroyc, W M

    2009-08-01

    The aim of this study was to evaluate 12 years of general practitioner (GP) use of open access MRI services at a single London teaching hospital. A retrospective analysis of reports from all GP requests for MRI scans between 1994 and 2005 was performed. The date, scanned body part, and requester details from 1798 scans requested by 209 individual GPs over a continuous 12-year period were recorded. All scans were then graded into four categories based on the severity of reported findings from normal to gross abnormality. Over the study period, GP requests as a percentage of the total (MRI) department workload remained low at approximately 2.6%. Spine, knee and brain requests constituted 86% (n = 1546) of requested scans. 48% (n = 868) of scans were reported as normal or minor degenerative changes only. 26% (n = 466) of scans demonstrated serious pathology that was likely to warrant hospital consultant referral. There was a wide range of scans requested per requester, from 1 to 240 over the period, with an average of 8.5 scans per GP. In conclusion, any department wishing to set up open access to MRI services for GPs could cover the majority of requests by offering spine, knee and brain imaging. The percentage of normal report rates for GP requests is comparable with previous studies of outpatient referrals. A large variation in requesting patterns between GPs suggests the need for increased communication between GPs and imaging departments to optimise use of the service.

  7. Norwegian obstetricians' opinions about cesarean section on maternal request: should women pay themselves?

    PubMed

    Fuglenes, Dorthe; Oian, Pål; Gyrd-Hansen, Dorte; Olsen, Jan Abel; Kristiansen, Ivar S

    2010-12-01

    to explore obstetricians' opinions on cesarean section (CS) on maternal request in the absence of a medical indication, and the potential to regulate CS on maternal request through financial incentives such as patient co-payment. cross-sectional study. Norway. a total of 507 obstetricians (response rate 71%). Questionnaire covering socio-demographic variables, professional experience and attitudes about CS on maternal request (such as willingness to perform, views on how CS on maternal request should be financed). obstetricians' opinions about CS on maternal request including funding and use of patient co-payments. clinical encounters with CS on maternal request were considered problematic from a clinical viewpoint by 62% of the respondents. While 35% considered the costs of CS on maternal request to be a public responsibility, 40% suggested use of co-payments ranging from €188- €7,500. Male obstetricians less frequently considered CS on maternal request problematic and were more likely to favor public funding than females. Female obstetricians favored use of co-payments more often than males (64% female vs. 37% male obstetricians, χ(2) = 23.94, p < 0.001) and suggested higher co-payments. The median co-payment was €1,875 for female and €1,250 for male obstetricians (p < 0.001). the study supports the existence of a gender difference concerning obstetricians' responses to patient requested cesarean section. The results indicate that a substantial proportion of obstetricians welcome some form of constraint concerning cesarean section requests in the absence of a medical indication.

  8. 31 CFR 1.7 - Fees for services.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... located. (2) Educational and Non-Commercial Scientific Institution Requesters. Records shall be provided... furtherance of scholarly (if the request is from an educational institution) or scientific (if the request is from a non-commercial scientific institution) research. These categories do not include requesters who...

  9. 76 FR 13273 - Request for Service Corporation Activity

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-10

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Request for Service Corporation Activity AGENCY: Office of Thrift Supervision (OTS), Treasury. ACTION: Notice and request for comment. SUMMARY... collection. Title of Proposal: Request for Service Corporation Activity. OMB Number: 1550-0013. Form Numbers...

  10. 78 FR 79510 - Proposed Collection; Comment Request Upon Written Request Copies Available From: Securities and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-30

    ... SECURITIES AND EXCHANGE COMMISSION Proposed Collection; Comment Request Upon Written Request Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy... seq.), the Securities and Exchange Commission (``Commission'') is soliciting comments on the...

  11. 5 CFR 911.104 - Procedures for requesting an indemnification agreement.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Procedures for requesting an indemnification agreement. 911.104 Section 911.104 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT... INDEMNIFICATION § 911.104 Procedures for requesting an indemnification agreement. When requesting an...

  12. 5 CFR 911.104 - Procedures for requesting an indemnification agreement.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Procedures for requesting an indemnification agreement. 911.104 Section 911.104 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT... INDEMNIFICATION § 911.104 Procedures for requesting an indemnification agreement. When requesting an...

  13. 5 CFR 911.104 - Procedures for requesting an indemnification agreement.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Procedures for requesting an indemnification agreement. 911.104 Section 911.104 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT... INDEMNIFICATION § 911.104 Procedures for requesting an indemnification agreement. When requesting an...

  14. 5 CFR 911.104 - Procedures for requesting an indemnification agreement.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 2 2011-01-01 2011-01-01 false Procedures for requesting an indemnification agreement. 911.104 Section 911.104 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT... INDEMNIFICATION § 911.104 Procedures for requesting an indemnification agreement. When requesting an...

  15. 5 CFR 911.104 - Procedures for requesting an indemnification agreement.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 2 2012-01-01 2012-01-01 false Procedures for requesting an indemnification agreement. 911.104 Section 911.104 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT... INDEMNIFICATION § 911.104 Procedures for requesting an indemnification agreement. When requesting an...

  16. 36 CFR § 1120.51 - Charges for services, generally.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... TRANSPORTATION BARRIERS COMPLIANCE BOARD PUBLIC AVAILABILITY OF INFORMATION Copies of Records and Fees for... requested records. (b) Categories of requesters. For the purpose of standard FOIA fee assessment, the four categories of requesters are: Commercial use requesters; educational and non-commercial scientific...

  17. 78 FR 45283 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: Desk Officer for SSA, Fax: 202-395-6974, Email address: [email protected] . (SSA) Social...

  18. 78 FR 67434 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-12

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... Officer for SSA, Fax: 202-395-6974, Email address: [email protected] . (SSA) Social Security...

  19. 77 FR 29441 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-17

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... Officer for SSA, Fax: 202-395-6974, Email address: [email protected] . (SSA), Social Security...

  20. 78 FR 21181 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-09

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... Officer for SSA, Fax: 202-395-6974, Email address: [email protected] . (SSA) Social Security...

  1. 77 FR 6853 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-09

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... Officer for SSA, Fax: 202-395-6974, Email address: [email protected] . (SSA), Social Security...

  2. 78 FR 9102 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-07

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... Officer for SSA, Fax: 202-395-6974, Email address: [email protected] . (SSA) Social Security...

  3. COMPONENT COMMANDS

    Science.gov Websites

    EMERGENCY PREPAREDNESS CONTACT REQUEST A SPEAKER REQUEST A COLOR GUARD OPERATIONAL CONTRACT SUPPORT every two years and makes recommendations to the President, through the Secretary of Defense, on changes Preparedness Contact Request A Speaker Request A Color Guard Stay Connected Privacy & Security Inspector

  4. Evaluating OpenSHMEM Explicit Remote Memory Access Operations and Merged Requests

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boehm, Swen; Pophale, Swaroop S; Gorentla Venkata, Manjunath

    The OpenSHMEM Library Specification has evolved consid- erably since version 1.0. Recently, non-blocking implicit Remote Memory Access (RMA) operations were introduced in OpenSHMEM 1.3. These provide a way to achieve better overlap between communication and computation. However, the implicit non-blocking operations do not pro- vide a separate handle to track and complete the individual RMA opera- tions. They are guaranteed to be completed after either a shmem quiet(), shmem barrier() or a shmem barrier all() is called. These are global com- pletion and synchronization operations. Though this semantic is expected to achieve a higher message rate for the applications, themore » drawback is that it does not allow fine-grained control over the completion of RMA operations. In this paper, first, we introduce non-blocking RMA operations with requests, where each operation has an explicit request to track and com- plete the operation. Second, we introduce interfaces to merge multiple requests into a single request handle. The merged request tracks multiple user-selected RMA operations, which provides the flexibility of tracking related communication operations with one request handle. Lastly, we explore the implications in terms of performance, productivity, usability and the possibility of defining different patterns of communication via merging of requests. Our experimental results show that a well designed and implemented OpenSHMEM stack can hide the overhead of allocating and managing the requests. The latency of RMA operations with requests is similar to blocking and implicit non-blocking RMA operations. We test our implementation with the Scalable Synthetic Compact Applications (SSCA #1) benchmark and observe that using RMA operations with requests and merging of these requests outperform the implementation using blocking RMA operations and implicit non-blocking operations by 49% and 74% respectively.« less

  5. 45 CFR 1226.9 - Exceptions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... draft, review, testify or make representations to a legislative body regarding a legislative measure upon request of the legislative body, a committee, or a member thereof, provided that: (1) The request... body. (2) The request states the type of representation or assistance requested and the issue to be...

  6. 77 FR 59664 - Agency Information Collection Activities: Extension Requested; Comments Requested, Monitoring...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-28

    ... DEPARTMENT OF JUSTICE [OMB Number 1103-0100] Agency Information Collection Activities: Extension Requested; Comments Requested, Monitoring Information Collections ACTION: 60-day notice. The Department of.... (2) Title of the Form/Collection: Monitoring Information Collections. (3) Agency form number, if any...

  7. 45 CFR 612.4 - Responding to requests.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION AVAILABILITY OF RECORDS AND INFORMATION § 612.4 Responding to requests. (a) Monitoring of requests. The NSF Office of the... the part of the request that has been referred, unless such notification would disclose information...

  8. 45 CFR 612.4 - Responding to requests.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION AVAILABILITY OF RECORDS AND INFORMATION § 612.4 Responding to requests. (a) Monitoring of requests. The NSF Office of the... the part of the request that has been referred, unless such notification would disclose information...

  9. 45 CFR 612.6 - Responses to requests.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION AVAILABILITY OF RECORDS AND INFORMATION § 612.6 Responses to requests. (a) Acknowledgment of requests. The NSF or OIG will... the location of the information deleted where practicable. (c) Denials of requests. (1) Denials of...

  10. 45 CFR 612.4 - Responding to requests.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION AVAILABILITY OF RECORDS AND INFORMATION § 612.4 Responding to requests. (a) Monitoring of requests. The NSF Office of the... the part of the request that has been referred, unless such notification would disclose information...

  11. 45 CFR 612.6 - Responses to requests.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION AVAILABILITY OF RECORDS AND INFORMATION § 612.6 Responses to requests. (a) Acknowledgment of requests. The NSF or OIG will... the location of the information deleted where practicable. (c) Denials of requests. (1) Denials of...

  12. 10 CFR 1004.5 - Processing requests for records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) FREEDOM OF INFORMATION § 1004.5 Processing requests for records. (a) Freedom of Information Officers will be responsible for processing requests for records submitted pursuant to this part. Upon receiving such a request, the Freedom of Information Officer will...

  13. 78 FR 52191 - Information Collection Request Submitted to OMB for Review and Approval; Comment Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-22

    ... Submitted to OMB for Review and Approval; Comment Request; Reformulated Gasoline Commingling Provisions... Protection Agency has submitted an information collection request (ICR), Reformulated Gasoline Commingling...: EPA would like to continue collecting notifications from gasoline retailers and wholesale purchaser...

  14. 19 CFR 357.109 - Request for reconsideration.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Request for reconsideration. 357.109 Section 357.109 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE SHORT SUPPLY PROCEDURES § 357.109 Request for reconsideration. Interested parties may file a request for reconsideration with...

  15. 19 CFR 201.12 - Requests.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 3 2013-04-01 2013-04-01 false Requests. 201.12 Section 201.12 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION Initiation and Conduct of Investigations § 201.12 Requests. Any party to a nonadjudicative investigation may request the...

  16. 19 CFR 357.109 - Request for reconsideration.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 3 2011-04-01 2011-04-01 false Request for reconsideration. 357.109 Section 357.109 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE SHORT SUPPLY PROCEDURES § 357.109 Request for reconsideration. Interested parties may file a request for reconsideration with...

  17. 19 CFR 201.12 - Requests.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 3 2014-04-01 2014-04-01 false Requests. 201.12 Section 201.12 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION Initiation and Conduct of Investigations § 201.12 Requests. Any party to a nonadjudicative investigation may request the...

  18. 19 CFR 357.109 - Request for reconsideration.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 3 2012-04-01 2012-04-01 false Request for reconsideration. 357.109 Section 357.109 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE SHORT SUPPLY PROCEDURES § 357.109 Request for reconsideration. Interested parties may file a request for reconsideration with...

  19. 44 CFR 6.83 - Prepayment of fees.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... (a) or (b). [52 FR 13679, Apr. 24, 1987] ... before continuing to process the request. (b) When a requester has previously failed to pay a fee charged... or a pending request from that requester. (c) When FEMA acts under § 5.44 (a) or (b), the...

  20. 44 CFR 6.83 - Prepayment of fees.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... (a) or (b). [52 FR 13679, Apr. 24, 1987] ... before continuing to process the request. (b) When a requester has previously failed to pay a fee charged... or a pending request from that requester. (c) When FEMA acts under § 5.44 (a) or (b), the...

  1. 44 CFR 6.83 - Prepayment of fees.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... (a) or (b). [52 FR 13679, Apr. 24, 1987] ... before continuing to process the request. (b) When a requester has previously failed to pay a fee charged... or a pending request from that requester. (c) When FEMA acts under § 5.44 (a) or (b), the...

  2. 44 CFR 6.83 - Prepayment of fees.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... (a) or (b). [52 FR 13679, Apr. 24, 1987] ... before continuing to process the request. (b) When a requester has previously failed to pay a fee charged... or a pending request from that requester. (c) When FEMA acts under § 5.44 (a) or (b), the...

  3. 44 CFR 6.83 - Prepayment of fees.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... (a) or (b). [52 FR 13679, Apr. 24, 1987] ... before continuing to process the request. (b) When a requester has previously failed to pay a fee charged... or a pending request from that requester. (c) When FEMA acts under § 5.44 (a) or (b), the...

  4. 40 CFR 91.1011 - Submission of exemption requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE SPARK-IGNITION ENGINES Exclusion and Exemption of Marine SI Engines § 91.1011 Submission of exemption requests. Requests for exemption or further information concerning exemptions and/or the exemption request review procedure should be addressed to: Manager, Engine...

  5. 77 FR 63924 - Proposed Collection; Comment Request for Form 8633

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... DEPARTMENT OF THE TREASURY Internal Revenue Service Proposed Collection; Comment Request for Form 8633 AGENCY: Internal Revenue Service (IRS), Treasury. ACTION: Notice and request for comments. SUMMARY... 20224. FOR FURTHER INFORMATION CONTACT: Requests for additional information or copies of the form and...

  6. 7 CFR 2018.254 - Requests for records.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 15 2014-01-01 2014-01-01 false Requests for records. 2018.254 Section 2018.254 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, RURAL BUSINESS...) ADMINISTRATIVE REGULATIONS GENERAL Availability of Information § 2018.254 Requests for records. Requests for...

  7. 7 CFR 2018.254 - Requests for records.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 15 2012-01-01 2012-01-01 false Requests for records. 2018.254 Section 2018.254 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, RURAL BUSINESS...) ADMINISTRATIVE REGULATIONS GENERAL Availability of Information § 2018.254 Requests for records. Requests for...

  8. 7 CFR 2018.254 - Requests for records.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 15 2011-01-01 2011-01-01 false Requests for records. 2018.254 Section 2018.254 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, RURAL BUSINESS...) ADMINISTRATIVE REGULATIONS GENERAL Availability of Information § 2018.254 Requests for records. Requests for...

  9. 7 CFR 2018.254 - Requests for records.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 15 2013-01-01 2013-01-01 false Requests for records. 2018.254 Section 2018.254 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, RURAL BUSINESS...) ADMINISTRATIVE REGULATIONS GENERAL Availability of Information § 2018.254 Requests for records. Requests for...

  10. 14 CFR 1212.300 - Requesting amendment.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Requesting amendment. 1212.300 Section 1212.300 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION PRIVACY ACT-NASA REGULATIONS Amendments to Privacy Act Records § 1212.300 Requesting amendment. Individuals may request that NASA amend...

  11. 78 FR 7778 - Information Collection Request Submitted to OMB for Review and Approval; Comment Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPP-2010-0793; FRL-9527-3] Information Collection Request... Annual Measures Reporting AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: The Environmental Protection Agency has submitted an information collection request (ICR), ``Pesticide Environmental...

  12. 75 FR 7295 - Submission of Information Collection for OMB Review; Comment Request; Administrative Appeals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-18

    ... PENSION BENEFIT GUARANTY CORPORATION Submission of Information Collection for OMB Review; Comment Request; Administrative Appeals AGENCY: Pension Benefit Guaranty Corporation. ACTION: Notice of request for extension of OMB approval. SUMMARY: The Pension Benefit Guaranty Corporation (PBGC) is requesting...

  13. 7 CFR 1430.204 - Requesting benefits.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Requesting benefits. 1430.204 Section 1430.204... Program § 1430.204 Requesting benefits. (a) A request for benefits or contract application, under this... MILC benefits must certify the accuracy and truthfulness of the information in their contract...

  14. 78 FR 13712 - Submission of Information Collection for OMB Review; Comment Request; Administrative Appeals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-28

    ... PENSION BENEFIT GUARANTY CORPORATION Submission of Information Collection for OMB Review; Comment Request; Administrative Appeals AGENCY: Pension Benefit Guaranty Corporation. ACTION: Notice of request for extension of OMB approval. SUMMARY: The Pension Benefit Guaranty Corporation (PBGC) is requesting...

  15. 7 CFR 1430.204 - Requesting benefits.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Requesting benefits. 1430.204 Section 1430.204... Program § 1430.204 Requesting benefits. (a) A request for benefits or contract application, under this... MILC benefits must certify the accuracy and truthfulness of the information in their contract...

  16. 7 CFR 1430.204 - Requesting benefits.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Requesting benefits. 1430.204 Section 1430.204... Program § 1430.204 Requesting benefits. (a) A request for benefits or contract application, under this... MILC benefits must certify the accuracy and truthfulness of the information in their contract...

  17. 7 CFR 1430.204 - Requesting benefits.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Requesting benefits. 1430.204 Section 1430.204... Program § 1430.204 Requesting benefits. (a) A request for benefits or contract application, under this... MILC benefits must certify the accuracy and truthfulness of the information in their contract...

  18. 7 CFR 1430.204 - Requesting benefits.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Requesting benefits. 1430.204 Section 1430.204... Program § 1430.204 Requesting benefits. (a) A request for benefits or contract application, under this... MILC benefits must certify the accuracy and truthfulness of the information in their contract...

  19. 40 CFR 94.911 - Submission of exemption requests.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 21 2012-07-01 2012-07-01 false Submission of exemption requests. 94.911 Section 94.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... § 94.911 Submission of exemption requests. Requests for exemption or further information concerning...

  20. 40 CFR 92.911 - Submission of exemption requests.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false Submission of exemption requests. 92.911 Section 92.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Provisions § 92.911 Submission of exemption requests. Requests for exemption or further information...

  1. 40 CFR 89.911 - Submission of exemption requests.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 20 2014-07-01 2013-07-01 true Submission of exemption requests. 89.911 Section 89.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Provisions § 89.911 Submission of exemption requests. Requests for exemption or further information...

  2. 40 CFR 90.911 - Submission of exemption requests.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false Submission of exemption requests. 90.911 Section 90.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Exemption of Nonroad Engines from Regulations § 90.911 Submission of exemption requests. Requests for...

  3. 40 CFR 94.911 - Submission of exemption requests.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 20 2014-07-01 2013-07-01 true Submission of exemption requests. 94.911 Section 94.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... § 94.911 Submission of exemption requests. Requests for exemption or further information concerning...

  4. 40 CFR 89.911 - Submission of exemption requests.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 21 2013-07-01 2013-07-01 false Submission of exemption requests. 89.911 Section 89.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Provisions § 89.911 Submission of exemption requests. Requests for exemption or further information...

  5. 40 CFR 92.911 - Submission of exemption requests.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 21 2013-07-01 2013-07-01 false Submission of exemption requests. 92.911 Section 92.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Provisions § 92.911 Submission of exemption requests. Requests for exemption or further information...

  6. 40 CFR 94.911 - Submission of exemption requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Submission of exemption requests. 94.911 Section 94.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... § 94.911 Submission of exemption requests. Requests for exemption or further information concerning...

  7. 40 CFR 90.911 - Submission of exemption requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Submission of exemption requests. 90.911 Section 90.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Exemption of Nonroad Engines from Regulations § 90.911 Submission of exemption requests. Requests for...

  8. 40 CFR 89.911 - Submission of exemption requests.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false Submission of exemption requests. 89.911 Section 89.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Provisions § 89.911 Submission of exemption requests. Requests for exemption or further information...

  9. 40 CFR 89.911 - Submission of exemption requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Submission of exemption requests. 89.911 Section 89.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Provisions § 89.911 Submission of exemption requests. Requests for exemption or further information...

  10. 40 CFR 92.911 - Submission of exemption requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Submission of exemption requests. 92.911 Section 92.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Provisions § 92.911 Submission of exemption requests. Requests for exemption or further information...

  11. 40 CFR 90.911 - Submission of exemption requests.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 20 2014-07-01 2013-07-01 true Submission of exemption requests. 90.911 Section 90.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Exemption of Nonroad Engines from Regulations § 90.911 Submission of exemption requests. Requests for...

  12. 40 CFR 92.911 - Submission of exemption requests.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 20 2014-07-01 2013-07-01 true Submission of exemption requests. 92.911 Section 92.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Provisions § 92.911 Submission of exemption requests. Requests for exemption or further information...

  13. 40 CFR 94.911 - Submission of exemption requests.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 21 2013-07-01 2013-07-01 false Submission of exemption requests. 94.911 Section 94.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... § 94.911 Submission of exemption requests. Requests for exemption or further information concerning...

  14. 40 CFR 90.911 - Submission of exemption requests.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 21 2013-07-01 2013-07-01 false Submission of exemption requests. 90.911 Section 90.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Exemption of Nonroad Engines from Regulations § 90.911 Submission of exemption requests. Requests for...

  15. 40 CFR 90.911 - Submission of exemption requests.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 21 2012-07-01 2012-07-01 false Submission of exemption requests. 90.911 Section 90.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Exemption of Nonroad Engines from Regulations § 90.911 Submission of exemption requests. Requests for...

  16. 40 CFR 89.911 - Submission of exemption requests.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 21 2012-07-01 2012-07-01 false Submission of exemption requests. 89.911 Section 89.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Provisions § 89.911 Submission of exemption requests. Requests for exemption or further information...

  17. 40 CFR 94.911 - Submission of exemption requests.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false Submission of exemption requests. 94.911 Section 94.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... § 94.911 Submission of exemption requests. Requests for exemption or further information concerning...

  18. 40 CFR 92.911 - Submission of exemption requests.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 21 2012-07-01 2012-07-01 false Submission of exemption requests. 92.911 Section 92.911 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Provisions § 92.911 Submission of exemption requests. Requests for exemption or further information...

  19. 75 FR 15761 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-30

    ... technology. Mail, e-mail, or fax your comments and recommendations on the information collection(s) to the... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...

  20. 76 FR 58567 - Proposed Information Collection (Request for Transportation Expense Reimbursement) Activity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-21

    ... (Request for Transportation Expense Reimbursement) Activity; Comment Request AGENCY: Veterans Benefits... needed to determine children with spina bifida eligibility for reimbursement of transportation expenses...: Request for Transportation Expense Reimbursement (38 CFR 21.8370). OMB Control Number: 2900-0580. Type of...

Top