Sample records for s-k asset-backed securities

  1. 76 FR 4231 - Issuer Review of Assets in Offerings of Asset-Backed Securities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-25

    ... issuers that also issue corporate securities are familiar with it. We previously have recognized that... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 229 and 230 [Release Nos. 33-9176, 34-63742; File No. S7-26-10] RIN 3235-AK76 Issuer Review of Assets in Offerings of Asset-Backed Securities AGENCY...

  2. 75 FR 64182 - Issuer Review of Assets in Offerings of Asset-Backed Securities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-19

    ... subject to Rule 13a-15, ABS issuers that also issue corporate securities are familiar with it. We... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 229, 230, 240, and 249 [Release Nos. 33-9150, 34-63091; File No. S7-26-10] RIN 3235-AK76 Issuer Review of Assets in Offerings of Asset-Backed Securities...

  3. 17 CFR 240.13a-18 - Compliance with servicing criteria for asset-backed securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... include from each party participating in the servicing function a report regarding its assessment of... function and that are backed by the same asset type backing the class of asset-backed securities (including... section, the annual report on Form 10-K must also include a report by a registered public accounting firm...

  4. 17 CFR 230.190 - Registration of underlying securities in asset-backed securities transactions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Registration of underlying securities in asset-backed securities transactions. 230.190 Section 230.190 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General...

  5. 76 FR 47947 - Re-Proposal of Shelf Eligibility Conditions for Asset-Backed Securities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-05

    ...We are revising and re-proposing certain rules that were initially proposed in April 2010 related to asset-backed securities in light of the provisions added by the Dodd-Frank Wall Street Reform and Consumer Protection Act and comments received on our April 2010 proposals. Specifically, we are re-proposing registrant and transaction requirements related to shelf registration of asset-backed securities and changes to exhibit filing deadlines. In addition, we are requesting additional comment on our proposal to require asset-level information about the pool assets. We continue to consider the other matters in our April 2010 proposing release.

  6. 17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...

  7. 17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...

  8. 17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...

  9. 17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...

  10. 75 FR 62718 - Disclosure for Asset-Backed Securities Required by Section 943 of the Dodd-Frank Wall Street...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-13

    ...Pursuant to Section 943 of the Dodd-Frank Wall Street Reform and Consumer Protection Act \\1\\ we are proposing rules related to representations and warranties in asset-backed securities offerings. Our proposals would require securitizers of asset-backed securities to disclose fulfilled and unfulfilled repurchase requests across all transactions. Our proposals would also require nationally recognized statistical rating organizations to include information regarding the representations, warranties and enforcement mechanisms available to investors in an asset-backed securities offering in any report accompanying a credit rating issued in connection with such offerings, including a preliminary credit rating. ---------------------------------------------------------------------------

  11. 76 FR 54374 - Disclosure for Asset-Backed Securities Required by Section 943 of the Dodd-Frank Wall Street...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-01

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR PART 240 [Release Nos. 33-9175A; 34-63741A; File No. S7-24-10] RIN 3235-AK75 Disclosure for Asset-Backed Securities Required by Section 943 of the Dodd-Frank Wall Street Reform and Consumer Protection Act AGENCY: Securities and Exchange Commission. ACTION...

  12. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Communications in connection with certain registered offerings of asset-backed securities. 230.167 Section 230.167 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933...

  13. 17 CFR 240.15d-23 - Reporting regarding certain securities underlying asset-backed securities under section 15(d) of...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Reporting regarding certain securities underlying asset-backed securities under section 15(d) of the Act. 240.15d-23 Section 240.15d-23 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND...

  14. 76 FR 4489 - Disclosure for Asset-Backed Securities Required by Section 943 of the Dodd-Frank Wall Street...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-26

    ... Dodd-Frank Wall Street Reform and Consumer Protection Act AGENCY: Securities and Exchange Commission... Reform and Consumer Protection Act (the ``Act'') related to asset-backed securities (``ABS'').\\11... securities. The Act broadened the mission of the MSRB to include the protection of state and local...

  15. 17 CFR 270.3a-7 - Issuers of asset-backed securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... holders to receive payments that depend primarily on the cash flow from eligible assets; (2) Securities... parties in those eligible assets that principally generate the cash flow needed to pay the fixed-income... the cash flows derived from eligible assets for the benefit of the holders of fixed-income securities...

  16. 17 CFR 270.3a-7 - Issuers of asset-backed securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... holders to receive payments that depend primarily on the cash flow from eligible assets; (2) Securities... parties in those eligible assets that principally generate the cash flow needed to pay the fixed-income... the cash flows derived from eligible assets for the benefit of the holders of fixed-income securities...

  17. 17 CFR 270.3a-7 - Issuers of asset-backed securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... holders to receive payments that depend primarily on the cash flow from eligible assets; (2) Securities... parties in those eligible assets that principally generate the cash flow needed to pay the fixed-income... the cash flows derived from eligible assets for the benefit of the holders of fixed-income securities...

  18. 17 CFR 270.3a-7 - Issuers of asset-backed securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... holders to receive payments that depend primarily on the cash flow from eligible assets; (2) Securities... parties in those eligible assets that principally generate the cash flow needed to pay the fixed-income... the cash flows derived from eligible assets for the benefit of the holders of fixed-income securities...

  19. 17 CFR 270.3a-7 - Issuers of asset-backed securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... holders to receive payments that depend primarily on the cash flow from eligible assets; (2) Securities... parties in those eligible assets that principally generate the cash flow needed to pay the fixed-income... the cash flows derived from eligible assets for the benefit of the holders of fixed-income securities...

  20. 75 FR 23327 - Asset-Backed Securities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-03

    ... information would be provided according to proposed standards and in a tagged data format using extensible... Market Developments, March 2008 (the ``PWG March 2008 Report'') at 9 (discussing subprime mortgages and... information about underlying asset pool performance.\\41\\ Our focus on both the public and private markets for...

  1. 401(k) plan asset allocation, account balances, and loan activity in 2011.

    PubMed

    VanDerhei, Jack; Holden, Sarah; Alonso, Luis; Bass, Steven

    2012-12-01

    THE BULK OF 401(K) ASSETS CONTINUED TO BE INVESTED IN STOCKS: On average, at year-end 2011, 61 percent of 401(k) participants' assets was invested in equity securities through equity funds, the equity portion of balanced funds, and company stock. Thirty-four percent was in fixed-income securities such as stable-value investments and bond and money funds. SEVENTY-TWO PERCENT OF 401(K) PLANS INCLUDED TARGET-DATE FUNDS IN THEIR INVESTMENT LINEUP AT YEAR-END 2011: At year-end 2011, 13 percent of the assets in the EBRI/ICI 401(k) database was invested in target-date funds and 39 percent of 401(k) participants held target-date funds. Also known as lifecycle funds, these funds are designed to offer a diversified portfolio that automatically rebalances to be more focused on income over time. MORE NEW OR RECENT HIRES INVESTED THEIR 401(K) ASSETS IN BALANCED FUNDS, INCLUDING TARGET-DATE FUNDS: For example, at year-end 2011, 51 percent of the account balances of recently hired participants in their 20s was invested in balanced funds, compared with 44 percent in 2010, and about 7 percent in 1998. A significant subset of that balanced fund category is target-date funds. At year-end 2011, 40 percent of the account balances of recently hired participants in their 20s was invested in target-date funds, compared with 35 percent at year-end 2010. 401(K) PARTICIPANTS CONTINUED TO SEEK DIVERSIFICATION OF THEIR INVESTMENTS: The share of 401(k) accounts invested in company stock remained at 8 percent in 2011. This share has fallen by more than half since 1999. Recently hired 401(k) participants contributed to this trend: They tended to be less likely to hold employer stock. PARTICIPANTS' 401(K) LOAN ACTIVITY REMAINED STEADY, ALTHOUGH LOAN BALANCES INCREASED SLIGHTLY IN 2011: At year-end 2011, 21 percent of all 401(k) participants who were eligible for loans had loans outstanding against their 401(k) accounts, unchanged from year-end 2009 and year-end 2010, and up from 18 percent at year

  2. 401(k) plan asset allocation, account balances, and loan activity in 2010.

    PubMed

    VanDerhei, Jack; Holden, Sarah; Alonso, Luis; Bass, Steven

    2011-12-01

    THE BULK OF 401(K) ASSETS CONTINUED TO BE INVESTED IN STOCKS: On average, at year-end 2010, 62 percent of 401(k) participants' assets were invested in equity securities through equity funds, the equity portion of balanced funds, and company stock. Thirty-three percent were in fixed-income securities such as stable value investments and bond and money funds. SEVENTY PERCENT OF 401(K) PLANS INCLUDED TARGET-DATE FUNDS IN THEIR INVESTMENT LINEUP AT YEAR-END 2010: At year-end 2010, 11 percent of the assets in the EBRI/ICI 401(k) database were invested in target-date funds and 36 percent of 401(k) participants held target-date funds. Also known as lifecycle funds, they are designed to offer a diversified portfolio that automatically rebalances to be more focused on income over time. MORE NEW OR RECENT HIRES INVESTED THEIR 401(K) ASSETS IN BALANCED FUNDS, INCLUDING TARGET-DATE FUNDS: For example, at year-end 2010, 44 percent of the account balances of recently hired participants in their 20s were invested in balanced funds, compared with 42 percent in 2009, and about 7 percent in 1998. A significant subset of that balanced fund category is target-date funds. At year-end 2010, 35 percent of the account balances of recently hired participants in their 20s were invested in target-date funds, compared with 31 percent at year-end 2009. 401(K) PARTICIPANTS CONTINUED TO SEEK DIVERSIFICATION OF THEIR INVESTMENTS: The share of 401(k) accounts invested in company stock continued to shrink, falling by more than a percentage point (to 8 percent) in 2010, continuing a steady decline that started in 1999. Recently hired 401(k) participants contributed to this trend: They tended to be less likely to hold employer stock. PARTICIPANTS' 401(K) LOAN BALANCES DECLINED SLIGHTLY IN 2010: In 2010, 21 percent of all 401(k) participants who were eligible for loans had loans outstanding against their 401(k) accounts, unchanged from year-end 2009, and up from 18 percent at year-end 2008. Loans

  3. Asset securitization and rate of return: A study on letters of guarantee

    NASA Astrophysics Data System (ADS)

    Wu, Binghui

    2018-01-01

    Using the theory of asset securitization, we analyze the feasibility of the securitization of letters of guarantee in theory. In the process of constructing the model of rate of return of securities backed by letters of guarantee, we propose two indices: the risk probability of asset-backed securities and the loss rate of asset-backed securities to analyze the cash flow of securities. On the basis of no arbitrage principle, the expression of rate of return of securities backed by letters of guarantee is put forward. In order to study the relationship between the rate of return of securities and other influential factor in the model, a simulation experiment is designed. The experiment results show that (i) an increasing risk probability of cash flow or a short maturity date also make the return rate of securities increase and (ii) the return rate of securities is higher in economic boom than that in economic recession when other parameters remain unchanged.

  4. 401(k) plan asset allocation, account balances, and loan activity in 1998.

    PubMed

    VanDerhei, J; Holden, S; Quick, C

    2000-02-01

    The Employee Benefit Research Institute (EBRI) and the Investment Company Institute (ICI) have been collaborating for the past three years to collect data on participants in 401(k) plans. This effort, known as the EBRI/ICI Participant-Directed Retirement Plan Data Collection Project, has obtained data for 401(k) plan participants from certain of EBRI and ICI members serving as plan record keepers and administrators. The report includes 1998 information on 7.9 million active participants in 30,102 plans holding nearly $372 billion in assets. The data include demographic information, annual contributions, plan balances, asset allocation, and loans, and are broadly representative of the universe of 401(k) plans. The database also includes three years of longitudinal information on approximately 3.3 million participants. Key findings include: For all 401(k) participants in the 1998 EBRI/ICI database, almost three-quarters of plan balances are invested directly or indirectly in equity securities. Specifically, 49.8 percent of total plan balances are invested in equity funds, 17.7 percent in company stock, 11.4 percent in guaranteed investment contracts (GICs), 8.4 percent in balanced funds, 6.1 percent in bond funds, 4.7 percent in money funds, and 0.3 percent in other stable value funds. Participant asset allocation varies considerably with age. Younger participants tend to favor equity funds, while older participants are more disposed to invest in GICs and bond funds. On average, participants in their 20s have 62.1 percent of their account balances invested in equity funds, in contrast to 39.8 percent for those in their 60s. Participants in their 20s invest 4.7 percent of their assets in GICs, while those in their 60s invest 20.6 percent. Bond funds, which represent 4.7 percent of the assets of participants in their 20s, amount to 9.0 percent of the assets of participants in their 60s. Investment options offered by 401(k) plans appear to influence asset allocation

  5. 13 CFR 107.880 - Assets acquired in liquidation of Portfolio securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Portfolio securities. 107.880 Section 107.880 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION... liquidation of Portfolio securities. You may acquire assets in full or partial liquidation of a Small Business... assets. You must dispose of assets acquired in liquidation of a Portfolio security within a reasonable...

  6. 401(k) plan asset allocation, account balances, and loan activity in 2008.

    PubMed

    VanDerhei, Jack; Holden, Sarah; Alonso, Luis

    2009-10-01

    Because 401(k) balances can fluctuate with market returns from year to year, meaningful analysis of 401(k) plans must examine how participants' accounts have performed over the long term. Looking at consistent participants in the EBRI/ICI 401(k) database over the five-year period from 2003 to 2008 (which included one of the worst bear markets for stocks since the Great Depression), the study found: After rising in 2003 and for the next four consecutive years, the average 401(k) retirement account fell 24.3 percent in 2008. The average 401(k) account balance moved up and down with stock market performance, but over the entire five-year time period increased at an average annual growth rate of 7.2 percent, attaining $86,513 at year-end 2008. The median (mid-point) 401(k) account balance increased at an average annual growth rate of 11.4 percent over the 2003-2008 period to $43,700 at year-end 2008. THE BULK OF 401(K) ASSETS CONTINUED TO BE INVESTED IN STOCKS. On average, at year-end 2008, 56 percent of 401(k) participants' assets were invested in equity securities through equity funds, the equity portion of balanced funds, and company stock. Forty-one percent was in fixed-income securities such as stable-value investments and bond and money market funds. THREE-QUARTERS OF 401(K) PLANS INCLUDED LIFECYCLE FUNDS IN THEIR INVESTMENT LINEUP AT YEAR-END 2008. At year-end 2008, nearly 7 percent of the assets in the EBRI/ICI 401(k) database were invested in lifecycle funds and 31 percent of 401(k) participants held lifecycle funds. Also known as "target-date" funds, they are designed to simplify investing and automate account rebalancing. NEW EMPLOYEES CONTINUED TO USE BALANCED FUNDS, INCLUDING LIFECYCLE FUNDS. Across all age groups, more new or recent hires invested their 401(k) assets in balanced funds, including lifecycle funds. At year-end 2008, 36 percent of the account balances of recently hired participants in their 20s were invested in balanced funds, compared with

  7. 401(k) plan asset allocation, account balances, and loan activity in 2009.

    PubMed

    VanDerhei, Jack; Holden, Sarah; Alonso, Luis

    2010-11-01

    CONSISTENT SAMPLE: Because 401(k) balances can fluctuate with market returns from year to year, meaningful analysis of 401(k) plans must examine how participants' accounts have performed over the long term. Looking at consistent participants in the EBRI/ICI 401(k) database over the six-year period from 2003 to 2009 (which included one of the worst bear markets for stocks since the Great Depression), the study found: After rising in 2003 and for the next four consecutive years, the average 401(k) retirement account fell 27.8 percent in 2008, before rising 31.9 percent in 2009. The average 401(k) account balance moved up and down with stock market performance, but over the entire six-year time period increased at an average annual growth rate of 10.5 percent, attaining $109,723 at year-end 2009. The median (or midpoint, half above and half below) 401(k) account balance increased at an average annual growth rate of 14.7 percent over the 2003-2009 period to $59,381 at year-end 2009. THE BULK OF 401(K) ASSETS CONTINUED TO BE INVESTED IN STOCKS: On average, at year-end 2009, 60 percent of 401(k) participants' assets were invested in equity securities through equity funds, the equity portion of balanced funds, and company stock. Thirty-six percent was in fixed-income securities such as stable-value investments and bond and money funds. MORE THAN THREE-QUARTERS OF 401(K) PLANS INCLUDED TARGET-DATE FUNDS IN THEIR INVESTMENT LINEUP AT YEAR-END 2009: At year-end 2009, nearly 10 percent of the assets in the EBRI/ICI 401(k) database was invested in target-date funds and 33 percent of 401(k) participants held target-date funds. Also known as lifecycle funds, they are designed to simplify investing and to automate account rebalancing. NEW EMPLOYEES CONTINUED TO USE BALANCED FUNDS, INCLUDING TARGET-DATE FUNDS: Across all but the oldest age group, more new or recent hires invested their 401(k) assets in balanced funds, including target-date funds. At year-end 2009, about 42 percent

  8. 401(k) plan asset allocation, account balances, and loan activity in 2007.

    PubMed

    VanDerhei, Jack; Holden, Sarah; Alonso, Luis; Copeland, Craig

    2008-12-01

    The bulk of 401(k) assets continued to be invested in stocks. On average, at year-end 2007, about two-thirds of 401(k) participants' assets were invested in equity securities through equity funds, the equity portion of balanced funds, and company stock. About one-third was in fixed-income securities such as stable value investments and bond and money market funds. Although these relative shares have changed little over the past 12 years, the underlying fund composition has changed over time. About two-thirds of 401(k) plans included lifecycle funds in their investment lineup at year-end 2007. New analysis shows that at year-end 2007, more than 7 percent of the assets in the EBRI/ICI database were invested in lifecycle funds and one-quarter of 401(k) participants held lifecycle funds. Also known as "target date" funds, they are designed to simplify investing and automate account rebalancing. New employees continued to utilize balanced funds, including lifecyclefunds. Across all age groups, more new or recent hires invested their 401(k) assets in balanced funds, including lifecycle funds. At year-end 2007, 28 percent of the account balances of recently hired participants in their 20s were invested in balanced funds, compared with 24 percent in 2006, 19 percent in 2005, and about 7 percent in 1998. At year-end 2007, almost 19 percent of the account balances of recently hired participants in their 20s were invested in lifecycle funds compared with 16 percent at year-end 2006. 401(k) participants continued to seek diversification of their investments. The share of 401(k) accounts invested in company stock continued to shrink, falling by 0.5 percentage point (to 10.6 percent) in 2007. That continued a steady decline that started in 1999. Recently hired 401(k) participants contributed to this trend: they were less likely to hold employer stock. Participants' 401(k) loan activity was stable. In 2007, 18 percent of all 401(k) participants eligible for loans had a loan

  9. A Methodology for Dynamic Security Risk Quantification and Optimal Resource Allocation of Security Assets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brigantic, Robert T.; Betzsold, Nick J.; Bakker, Craig KR

    In this presentation we overview a methodology for dynamic security risk quantification and optimal resource allocation of security assets for high profile venues. This methodology is especially applicable to venues that require security screening operations such as mass transit (e.g., train or airport terminals), critical infrastructure protection (e.g., government buildings), and largescale public events (e.g., concerts or professional sports). The method starts by decomposing the three core components of risk -- threat, vulnerability, and consequence -- into their various subcomponents. For instance, vulnerability can be decomposed into availability, accessibility, organic security, and target hardness and each of these can bemore » evaluated against the potential threats of interest for the given venue. Once evaluated, these subcomponents are rolled back up to compute the specific value for the vulnerability core risk component. Likewise, the same is done for consequence and threat, and then risk is computed as the product of these three components. A key aspect of our methodology is dynamically quantifying risk. That is, we incorporate the ability to uniquely allow the subcomponents and core components, and in turn, risk, to be quantified as a continuous function of time throughout the day, week, month, or year as appropriate.« less

  10. Information Security Management Practices of K-12 School Districts

    ERIC Educational Resources Information Center

    Nyachwaya, Samson

    2013-01-01

    The research problem addressed in this quantitative correlational study was the inadequacy of sound information security management (ISM) practices in K-12 school districts, despite their increasing ownership of information assets. Researchers have linked organizational and sociotechnical factors to the implementation of information security…

  11. Computer Security: Improvements Needed to Reduce Risk to Critical Federal Operations and Assets

    DTIC Science & Technology

    2001-11-09

    COMPUTER SECURITY Improvements Needed to Reduce Risk to Critical Federal Operations and Assets Statement of Robert F. Dacey Director, Information...Improvements Needed to Reduce Risk to Critical Federal Operations and Assets Contract Number Grant Number Program Element Number Author(s...The benefits have been enormous. Vast amounts of information are now literally at our fingertips, facilitating research on virtually every topic

  12. 75 FR 65442 - Disclosure for Asset-Backed Securities Required by Section 943 of the Dodd-Frank Wall Street...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ...-Backed Securities Required by Section 943 of the Dodd-Frank Wall Street Reform and Consumer Protection Act AGENCY: Securities and Exchange Commission. ACTION: Proposed rule; correction. SUMMARY: The..., October 25, 2010 / Proposed Rules#0;#0; [[Page 65442

  13. 17 CFR 230.145 - Reclassification of securities, mergers, consolidations and acquisitions of assets.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., mergers, consolidations and acquisitions of assets. 230.145 Section 230.145 Commodity and Securities... § 230.145 Reclassification of securities, mergers, consolidations and acquisitions of assets.... A statutory merger or consolidation or similar plan or acquisition in which securities of such...

  14. 17 CFR 250.44 - Sales of securities and assets.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...) GENERAL RULES AND REGULATIONS, PUBLIC UTILITY HOLDING COMPANY ACT OF 1935 Regulation and Exemption of... or assets. No registered holding company shall, directly or indirectly, sell to any person any security which it owns of any public utility company, or any utility assets, except pursuant to a...

  15. 75 FR 66298 - Prompt Corrective Action; Amended Definition of Low-Risk Assets

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-28

    ...,'' ``Investments,'' ``Low-risk assets,'' ``Average-risk assets,'' ``Loans sold with recourse,'' ``Unused MBL...-backed securities (``the distressed assets'') held in the investment portfolios of CCUs. In several cases... legally permissible investments for federal credit unions. For state-chartered credit unions, the NGNs are...

  16. 401(k) plan asset allocation, account balances, and loan activity.

    PubMed

    VanDerhei, J; Galer, R; Quick, C; Rea, J

    1999-01-01

    The Employee Benefit Research Institute (EBRI) and the Investment Company Institute (ICI) have been collaborating for the past two years to collect data on participants in 401(k) plans. This effort, known as the EBRI/ICI Participant-Directed Retirement Plan Data Collection Project, has obtained data for 401(k) plan participants from certain of EBRI and ICI sponsors and members serving as plan recordkeepers and administrators. The report includes 1996 information on 6.6 million active participants in 27,762 plans holding nearly $246 billion in assets. The data include demographic information, annual contributions, plan balances, asset allocation, and loans, and are currently the most comprehensive source of information on individual plan participants. In 1996, the first year for which data are ready for analysis, the EBRI/ICI database appears to be broadly representative of the universe of 401(k) plans. Key findings include: for all participants, 44.0 percent of the total plan balance is invested in equity funds, 19.1 percent in employer stock, 15.1 percent in guaranteed investment contracts (GICs), 7.8 percent in balanced funds, 6.8 percent in bond funds, 5.4 percent in money funds, 0.8 percent in other stable value funds, and 1.0 percent in other or unidentified investments. This allocation implies that over two-thirds of plan balances are invested directly or indirectly in equity securities. Asset allocation varies with age. For instance, on average, individuals in their twenties invested 76.8 percent of assets in equities and only 22.1 percent in fixed-income investments. By comparison, individuals in their sixties invested 53.2 percent of their assets in equities and 45.9 percent of assets in fixed-income investments. Investment options offered by 401(k) plans appear to influence asset allocation. For example, the addition of company stock substantially reduces the allocation to equity funds and the addition of GICs lowers allocations to bond and money funds

  17. 16 CFR 801.13 - Aggregation of voting securities, assets and non-corporate interests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... COVERAGE RULES § 801.13 Aggregation of voting securities, assets and non-corporate interests. (a) Voting... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Aggregation of voting securities, assets and non-corporate interests. 801.13 Section 801.13 Commercial Practices FEDERAL TRADE COMMISSION RULES...

  18. 16 CFR 801.13 - Aggregation of voting securities, assets and non-corporate interests.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... COVERAGE RULES § 801.13 Aggregation of voting securities, assets and non-corporate interests. (a) Voting... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Aggregation of voting securities, assets and non-corporate interests. 801.13 Section 801.13 Commercial Practices FEDERAL TRADE COMMISSION RULES...

  19. 16 CFR 801.13 - Aggregation of voting securities, assets and non-corporate interests.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... COVERAGE RULES § 801.13 Aggregation of voting securities, assets and non-corporate interests. (a) Voting... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Aggregation of voting securities, assets and non-corporate interests. 801.13 Section 801.13 Commercial Practices FEDERAL TRADE COMMISSION RULES...

  20. 16 CFR 801.13 - Aggregation of voting securities, assets and non-corporate interests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... COVERAGE RULES § 801.13 Aggregation of voting securities, assets and non-corporate interests. (a) Voting... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Aggregation of voting securities, assets and non-corporate interests. 801.13 Section 801.13 Commercial Practices FEDERAL TRADE COMMISSION RULES...

  1. 16 CFR 801.13 - Aggregation of voting securities, assets and non-corporate interests.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... COVERAGE RULES § 801.13 Aggregation of voting securities, assets and non-corporate interests. (a) Voting... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Aggregation of voting securities, assets and non-corporate interests. 801.13 Section 801.13 Commercial Practices FEDERAL TRADE COMMISSION RULES...

  2. Measuring Poverty for Food Security Analysis: Consumption- Versus Asset-Based Approaches.

    PubMed

    Hjelm, Lisa; Mathiassen, Astrid; Wadhwa, Amit

    2016-06-22

    Poverty and food insecurity are intrinsically linked as poor households often lack the resources required to access sufficient nutritious food to live an active and healthy life. Consumption and expenditure surveys are typically used to identify poor versus nonpoor households but are detailed and costly. Measures of wealth based on asset ownership and housing characteristics can be generated from lighter, less costly surveys. To examine whether indices based on asset ownership and housing characteristics (stock) complement household consumption (flow) when used to analyze inequalities in food security outcomes. Comprehensive data from Nepal, Malawi, Tanzania, Uganda, and Madagascar are used to examine correlations and overlaps in classification between indices of household wealth and consumption per capita. Inequality in food security indicators representing quantity, quality, and vulnerability is examined across wealth and consumption per capita quintiles. Wealth indices are correlated with consumption per capita, with coefficients between 0.5 and 0.6. The prevalence of food insecurity decreases from poorer to wealthier quintiles for all variables and for all food security measures in all countries. Energy deficiency varies much more across consumption quintiles than wealth index quintiles. Interestingly, inequalities in the share of consumption of food are more pronounced across the wealth index quintiles than per capita consumption. Although wealth indices and consumption per capita are related and both are drivers of food security, they cannot be used interchangeably for food security analysis. Each inequality measure is important for describing different aspects of food security. © The Author(s) 2016.

  3. 16 CFR 801.10 - Value of voting securities, non-corporate interests and assets to be acquired.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Value of voting securities, non-corporate... ACT OF 1976 COVERAGE RULES § 801.10 Value of voting securities, non-corporate interests and assets to... value of all consideration for such voting securities, non-corporate interests or assets to be acquired...

  4. 16 CFR 801.10 - Value of voting securities, non-corporate interests and assets to be acquired.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Value of voting securities, non-corporate... ACT OF 1976 COVERAGE RULES § 801.10 Value of voting securities, non-corporate interests and assets to... value of all consideration for such voting securities, non-corporate interests or assets to be acquired...

  5. 16 CFR 801.10 - Value of voting securities, non-corporate interests and assets to be acquired.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Value of voting securities, non-corporate... ACT OF 1976 COVERAGE RULES § 801.10 Value of voting securities, non-corporate interests and assets to... value of all consideration for such voting securities, non-corporate interests or assets to be acquired...

  6. 16 CFR 801.10 - Value of voting securities, non-corporate interests and assets to be acquired.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Value of voting securities, non-corporate... ACT OF 1976 COVERAGE RULES § 801.10 Value of voting securities, non-corporate interests and assets to be acquired. Except as provided in § 801.13, the value of voting securities and assets to be acquired...

  7. 16 CFR 801.10 - Value of voting securities, non-corporate interests and assets to be acquired.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Value of voting securities, non-corporate... ACT OF 1976 COVERAGE RULES § 801.10 Value of voting securities, non-corporate interests and assets to be acquired. Except as provided in § 801.13, the value of voting securities and assets to be acquired...

  8. The Relationship Between Developmental Assets and Food Security In Adolescents From A Low-Income Community

    PubMed Central

    Shtasel-Gottlieb, Zoë; Palakshappa, Deepak; Yang, Fanyu; Goodman, Elizabeth

    2014-01-01

    Purpose To explore the association between developmental assets (characteristics, experiences, and relationships that shape healthy development) and food insecurity among adolescents from a low-income, urban community. Methods This mixed methods study occurred in two phases. In Phase 1, using a census approach, 2350 6-12th graders from the public school district completed an anonymous survey that included the Development Assets Profile (DAP), youth self-report form of the Core Food Security Module, and demographic questions. Logistic and multinomial regression analyses determined independent associations between developmental assets and food security adjusting for demographics. In Phase 2, 20 adult key informant interviews and four semi-structured student focus groups were performed to explain findings from Phase 1. Results On average, DAP scores were consistent with national norms. Food insecurity was prevalent; 14.9% reported low food security and 8.6% very low food security (VLFS). Logistic regression revealed that higher DAP was associated with lower odds of food insecurity (OR=.96, 95% CI=.95-.97); family assets drove this association(OR=.93, 95% CI=.91-.95). In multinomial regression modeling, these associations persisted and, paradoxically, higher community assets were also associated with VLFS (ORVLFS=1.08, 95% CI=1.04-1.13). Qualitative analyses suggested that greater need among VLFS youth led to increased connections to community resources despite barriers to access such as stigma, home instability, and cultural differences. Conclusion Food insecurity is a pervasive problem among adolescents from low-income communities and is associated with lower developmental assets, particularly family assets. That community assets were higher among VLFS youth underscores the importance of community-level resources in struggling areas. PMID:25620305

  9. The relationship between developmental assets and food security in adolescents from a low-income community.

    PubMed

    Shtasel-Gottlieb, Zoë; Palakshappa, Deepak; Yang, Fanyu; Goodman, Elizabeth

    2015-02-01

    To explore the association between developmental assets (characteristics, experiences, and relationships that shape healthy development) and food insecurity among adolescents from a low-income urban community. This mixed-methods study occurred in two phases. In phase 1, using a census approach, 2,350 6th to 12th graders from the public school district completed an anonymous survey that included the developmental assets profile (DAP), the youth self-report form of the Core Food Security Module, and demographic questions. Logistic and multinomial regression analyses determined independent associations between developmental assets and food security adjusting for demographics. In phase 2, 20 adult key informant interviews and four semistructured student focus groups were performed to explain findings from phase 1. On average, DAP scores were consistent with national norms. Food insecurity was prevalent; 14.9% reported low food security and 8.6% very low food security (VLFS). Logistic regression revealed that higher DAP was associated with lower odds of food insecurity (odds ratio [OR], .96; 95% confidence interval [CI], .95-.97); family assets drove this association (OR, .93; 95% CI, .91-.95). In multinomial regression modeling, these associations persisted, and paradoxically, higher community assets were also associated with VLFS (ORVLFS, 1.08; 95% CI, 1.04-1.13). Qualitative analyses suggested that greater need among VLFS youth led to increased connections to community resources despite barriers to access such as stigma, home instability, and cultural differences. Food insecurity is a pervasive problem among adolescents from low-income communities and is associated with lower developmental assets, particularly family assets. The fact that community assets were higher among VLFS youth underscores the importance of community-level resources in struggling areas. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  10. MulVAL Extensions for Dynamic Asset Protection

    DTIC Science & Technology

    2006-04-01

    called Skybox Security and an AI-based project called CycSecure were identified as interesting and relatively mature projects, which deserve closer...dynamic asset protection solution. A critique of the Skybox Security and CycSecure solutions, with respect to the requirements of dynamic asset...particulièrement, un produit du commerce appelé Skybox Security et un projet d’IA appelé CycSecure ont été désignés comme étant des projets

  11. 7 CFR 4290.880 - Assets acquired in liquidation of Portfolio securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INVESTMENT COMPANY (âRBICâ) PROGRAM Financing of Enterprises by RBICs Structuring Rbic Financing of Eligible Enterprises-Types of Financings § 4290.880 Assets acquired in liquidation of Portfolio securities. (a) General...

  12. Marine asset security and tracking (MAST) system

    DOEpatents

    Hanson, Gregory Richard [Clinton, TN; Smith, Stephen Fulton [Loudon, TN; Moore, Michael Roy [Corryton, TN; Dobson, Eric Lesley [Charleston, SC; Blair, Jeffrey Scott [Charleston, SC; Duncan, Christopher Allen [Marietta, GA; Lenarduzzi, Roberto [Knoxville, TN

    2008-07-01

    Methods and apparatus are described for marine asset security and tracking (MAST). A method includes transmitting identification data, location data and environmental state sensor data from a radio frequency tag. An apparatus includes a radio frequency tag that transmits identification data, location data and environmental state sensor data. Another method includes transmitting identification data and location data from a radio frequency tag using hybrid spread-spectrum modulation. Another apparatus includes a radio frequency tag that transmits both identification data and location data using hybrid spread-spectrum modulation.

  13. 16 CFR 801.21 - Securities and cash not considered assets when acquired.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Securities and cash not considered assets when acquired. 801.21 Section 801.21 Commercial Practices FEDERAL TRADE COMMISSION RULES, REGULATIONS... regularly prepared balance sheet of “A” referred to in § 801.11—the voting securities of X must be reflected...

  14. Income and assets of Social Security beneficiaries by type of benefit.

    PubMed

    Grad, S

    1989-01-01

    The SIPP data have provided a first look at the relative economic status of various types of Social Security beneficiaries. They have shown that the different types of Social Security beneficiaries face very different economic circumstances. Retired workers and wife beneficiaries have the highest family incomes adjusted for family size. Aged widows and minor children have the lowest family incomes, with high proportions of poor or near poor. And disabled workers are in between, but also have high proportions of poor or near poor. Retired-worker and wife beneficiary households also have considerably more asset holdings than disabled-worker or widow beneficiary households. Beneficiaries with high family incomes are very likely to live with relatives and to rely heavily on the relatives' income. The high-income families tend to have non-means-tested sources of family income other than Social Security amounting to substantial proportions of their total income and to have high asset holdings. Conversely, beneficiaries with low family incomes are very likely to live alone or with nonrelatives, to rely heavily on Social Security and means-tested benefits, and to have low asset holdings. A majority of ever-poor beneficiaries (with the exception of widow beneficiaries) are poor in only some months of a year. This situation is not consistent with the stereotype of beneficiaries living on fixed incomes. But the change in poverty status is often due to a change in the income of other family members rather than of the beneficiary. And in some cases, a change in poverty status occurs with little or no change in income as the cost of living rises.

  15. 17 CFR 270.17f-4 - Custody of investment company assets with a securities depository.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Custody of investment company... SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.17f-4 Custody of investment company assets with a securities depository. (a) Custody arrangement with...

  16. Financial Optimization of Electricity Security Assets at Military Installations: Including Case Studies of Dover Air Force Base, Fort Benning, and MCAGCC Twentynine Palms

    DTIC Science & Technology

    2014-01-01

    kW) and Energy (kWh) Charges, Including Time-of-Use Energy Charges X X X X X Power Factor Improvement X X Emergency Demand Response... Capacity Market) X X X X X Other Capacity Sales X X X Frequency Regulation X X X X Spinning/Synchronous Reserve X X Blackstart Capacity X X X...Policy, Organizational, and Other Factors that can Accelerate Prudent Electricity Security Asset Investments and Uses 0% 2% 4% 6% 8% 10% 12% 14% 16

  17. Disability pension from back pain among social security beneficiaries, Brazil.

    PubMed

    Meziat Filho, Ney; Silva, Gulnar Azevedo E

    2011-06-01

    To describe disability pension from back pain. Descriptive study based on data from the Brazilian Social Security Beneficiary Database and the Social Security Statistics Annual Report in 2007. The incidence rate of disability pension from back pain was estimated according to gender and age by Brazilian states. There were also estimated working days lost due to back pain disability by occupation. Idiopathic back pain was the most common cause of disability among social security pension and accidental retirement. Most pensioners were living in urban areas and were commercial workers. The rate of disability pension from back pain in Brazil was 29.96 per 100,000 beneficiaries. A higher rate was seen among males and older individuals. Rondônia showed the highest rate, four times as high as expected (RR= 4.05) followed by Bahia with a rate about twice as high as expected (RR=2.07). Commercial workers accounted for 96.9% of working days lost due to disability. Back pain was a major cause of disability in 2007 mostly among commercial workers showing great differences between the Brazilian states.

  18. 17 CFR 270.17f-7 - Custody of investment company assets with a foreign securities depository.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Custody of investment company... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.17f-7 Custody of investment company assets with a foreign securities depository. (a) Custody...

  19. Determinant of securitization asset pricing in Malaysia

    NASA Astrophysics Data System (ADS)

    Bakri, M. H.; Ali, R.; Ismail, S.; Sufian, F.; Baharom, A. H.

    2014-12-01

    Malaysian firms have been reported involve in Asset Back Securities since 1986s where Cagamas is a pioneer. This research aims to examine the factor influencing primary market spread. Least square method and regression analysis are applied for the study period 2004-2012. The result shows one determinants in internal regression model and three determinants in external regression influence or contribute to the primary market spread and are statistically significant in developing the securitization in Malaysia. It can be concluded that transaction size significantly contribute to the determinant primary market spread in internal regression model while liquidity, transaction size and crisis is significant in both regression model. From five hypotheses, three hypotheses support that the determinants have a relationship with primary market spread.

  20. Securing the High Seas: America’s Global Maritime Constabulatory Power

    DTIC Science & Technology

    2008-03-12

    at www.heritage.org/ Research/HomelandSecurity/bg1950.cfm. 29. Construcciones Aeronáuticas, SA. 16 Securing the High Seas: America’s Global Maritime...Coast Guard ships (National Security Cutter, Off-Shore Patrol Cutter, and Fast Response Cutter) and many Navy ships currently in design or construction ...forge complementary maritime strategies. Only by developing common doctrine, creating greater synergy in the construction of core assets, and forging a

  1. 29 CFR 2520.103-11 - Assets held for investment purposes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Securities Exchange Act of 1934 or quoted on NASDAQ; (3) Assets held for investment purposes shall not... assets held for investment purposes the 1,000 shares of stock S under paragraph (b)(1) of this section... 29 Labor 9 2010-07-01 2010-07-01 false Assets held for investment purposes. 2520.103-11 Section...

  2. 16 CFR 801.15 - Aggregation of voting securities, non-corporate interests and assets the acquisition of which was...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... of determining the aggregate total amount of voting securities, non-corporate interests and assets of...-corporate interests or voting securities the acquisition of which was exempt at the time of acquisition (or... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Aggregation of voting securities, non...

  3. 16 CFR 801.15 - Aggregation of voting securities, non-corporate interests and assets the acquisition of which was...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... of determining the aggregate total amount of voting securities, non-corporate interests and assets of...-corporate interests or voting securities the acquisition of which was exempt at the time of acquisition (or... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Aggregation of voting securities, non...

  4. 16 CFR 801.15 - Aggregation of voting securities, non-corporate interests and assets the acquisition of which was...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... of determining the aggregate total amount of voting securities, non-corporate interests and assets of...-corporate interests or voting securities the acquisition of which was exempt at the time of acquisition (or... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Aggregation of voting securities, non...

  5. The fundamental theorem of asset pricing under default and collateral in finite discrete time

    NASA Astrophysics Data System (ADS)

    Alvarez-Samaniego, Borys; Orrillo, Jaime

    2006-08-01

    We consider a financial market where time and uncertainty are modeled by a finite event-tree. The event-tree has a length of N, a unique initial node at the initial date, and a continuum of branches at each node of the tree. Prices and returns of J assets are modeled, respectively, by a R2JxR2J-valued stochastic process . In this framework we prove a version of the Fundamental Theorem of Asset Pricing which applies to defaultable securities backed by exogenous collateral suffering a contingent linear depreciation.

  6. 17 CFR 230.426 - Filing of certain prospectuses under § 230.167 in connection with certain offerings of asset...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... section, ABS informational and computational material made in reliance on § 230.167 that meet the...) ABS informational and computational material that relate to abandoned structures or that are furnished... intention to purchase the asset-backed securities. (2) Any ABS informational and computational material if a...

  7. 17 CFR 230.426 - Filing of certain prospectuses under § 230.167 in connection with certain offerings of asset...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... section, ABS informational and computational material made in reliance on § 230.167 that meet the...) ABS informational and computational material that relate to abandoned structures or that are furnished... intention to purchase the asset-backed securities. (2) Any ABS informational and computational material if a...

  8. 17 CFR 230.426 - Filing of certain prospectuses under § 230.167 in connection with certain offerings of asset...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... section, ABS informational and computational material made in reliance on § 230.167 that meet the...) ABS informational and computational material that relate to abandoned structures or that are furnished... intention to purchase the asset-backed securities. (2) Any ABS informational and computational material if a...

  9. 17 CFR 230.426 - Filing of certain prospectuses under § 230.167 in connection with certain offerings of asset...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... section, ABS informational and computational material made in reliance on § 230.167 that meet the...) ABS informational and computational material that relate to abandoned structures or that are furnished... intention to purchase the asset-backed securities. (2) Any ABS informational and computational material if a...

  10. 17 CFR 230.426 - Filing of certain prospectuses under § 230.167 in connection with certain offerings of asset...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... section, ABS informational and computational material made in reliance on § 230.167 that meet the...) ABS informational and computational material that relate to abandoned structures or that are furnished... intention to purchase the asset-backed securities. (2) Any ABS informational and computational material if a...

  11. K-Basins S/RIDS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Watson, D.J.

    1995-09-22

    The Standards/Requirements Identification Document(S/RID) is a list of the Environmental, Safety, and Health (ES&H) and Safeguards and Security (SAS) standards/requirements applicable to the K Basins facility

  12. K-Basins S/RIDS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Watson, D.J.

    The Standards/Requirements Identification Document (S/RID) is a list of the Environmental, Safety, and Health (ES{ampersand}H) and Safeguards and Security (SAS) standards/requirements applicable to the K Basins facility.

  13. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    DTIC Science & Technology

    2010-02-04

    Terrorism in Pakistan: Sabotage of a Spent Fuel Cask or a Commercial Irradiation Source in Transport ,” in Pakistan’s Nuclear Future, 2008; Martellini, 2008...measures to prevent unauthorized or accidental use of nuclear weapons, as well as contribute to physical security of storage facilities and personnel...strategic nuclear assets could be obtained by terrorists, or used by elements in the Pakistani government. Chair of the Joint Chiefs of Staff Admiral

  14. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    DTIC Science & Technology

    2010-10-07

    Pakistan: Sabotage of a Spent Fuel Cask or a Commercial Irradiation Source in Transport ,” in Pakistan’s Nuclear Future, 2008; Martellini, 2008. 99...prevent unauthorized or accidental use of nuclear weapons, as well as contribute to physical security of storage facilities and personnel reliability... nuclear assets could be obtained by terrorists, or used by elements in the Pakistani government. Chair of the Joint Chiefs of Staff Admiral Michael

  15. Coast guard : better logistics planning needed to aid operational decisions related to the deployment of the national security cutter and its support assets.

    DOT National Transportation Integrated Search

    2009-07-01

    As part of its more than $$24 billion Deepwater program to replace aging vessels and aircraft with new or upgraded assets, the Coast Guard is preparing the National Security Cutter (NSC) for service. GAO previously reported on Deepwater assets' deplo...

  16. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...

  17. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...

  18. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...

  19. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...

  20. Some Unexpected Ways Universities Can Prime the Community Economic Engine: Asset Building for the Working Poor and the University Back Office

    ERIC Educational Resources Information Center

    Powell, Lawrence N.

    2005-01-01

    This article demonstrates how the university back office can enable ambitious implementation partnerships between institutions of higher education and community-based organizations. It examines the Individual Development Account Collaborative of Louisiana, a $4 million asset-building program operated by the National Center for the Urban Community…

  1. Entropy-based financial asset pricing.

    PubMed

    Ormos, Mihály; Zibriczky, Dávid

    2014-01-01

    We investigate entropy as a financial risk measure. Entropy explains the equity premium of securities and portfolios in a simpler way and, at the same time, with higher explanatory power than the beta parameter of the capital asset pricing model. For asset pricing we define the continuous entropy as an alternative measure of risk. Our results show that entropy decreases in the function of the number of securities involved in a portfolio in a similar way to the standard deviation, and that efficient portfolios are situated on a hyperbola in the expected return-entropy system. For empirical investigation we use daily returns of 150 randomly selected securities for a period of 27 years. Our regression results show that entropy has a higher explanatory power for the expected return than the capital asset pricing model beta. Furthermore we show the time varying behavior of the beta along with entropy.

  2. Entropy-Based Financial Asset Pricing

    PubMed Central

    Ormos, Mihály; Zibriczky, Dávid

    2014-01-01

    We investigate entropy as a financial risk measure. Entropy explains the equity premium of securities and portfolios in a simpler way and, at the same time, with higher explanatory power than the beta parameter of the capital asset pricing model. For asset pricing we define the continuous entropy as an alternative measure of risk. Our results show that entropy decreases in the function of the number of securities involved in a portfolio in a similar way to the standard deviation, and that efficient portfolios are situated on a hyperbola in the expected return – entropy system. For empirical investigation we use daily returns of 150 randomly selected securities for a period of 27 years. Our regression results show that entropy has a higher explanatory power for the expected return than the capital asset pricing model beta. Furthermore we show the time varying behavior of the beta along with entropy. PMID:25545668

  3. 77 FR 74022 - Notice of Proposed Information Collection: Comment Request; Ginnie Mae Mortgage-Backed Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-12

    ... multiple Issuer MBS is structured so that small issuers, who do not meet the minimum number of loans and... program, securities are backed by single-family or multifamily loans. Under the Ginnie Mae II program, securities are only backed by single family loans. Both the Ginnie Mae I and II MBS are modified pass-through...

  4. Measurements of the branching fractions for D + → K S 0 K S 0 K + , K S 0 K S 0 π + and D 0 → K S 0 K S 0 , K S 0 K S 0 K S 0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ablikim, M.; Achasov, M. N.; Ahmed, S.

    By analyzing 2.93 fb-1 of data taken at the ψ (3770) resonance peak with the BESIII detector, we measure the branching fractions for the hadronic decays D +→Kmore » $$0\\atop{S}$$K$$0\\atop{S}$$K +, D +→K$$0\\atop{S}$$K$$0\\atop{S}$$π +. D 0→K$$0\\atop{S}$$K$$0\\atop{S}$$ and D 0→K$$0\\atop{S}$$K$$0\\atop{S}$$K$$0\\atop{S}$$.« less

  5. Measurements of the branching fractions for D + → K S 0 K S 0 K + , K S 0 K S 0 π + and D 0 → K S 0 K S 0 , K S 0 K S 0 K S 0

    DOE PAGES

    Ablikim, M.; Achasov, M. N.; Ahmed, S.; ...

    2016-12-13

    By analyzing 2.93 fb-1 of data taken at the ψ (3770) resonance peak with the BESIII detector, we measure the branching fractions for the hadronic decays D +→Kmore » $$0\\atop{S}$$K$$0\\atop{S}$$K +, D +→K$$0\\atop{S}$$K$$0\\atop{S}$$π +. D 0→K$$0\\atop{S}$$K$$0\\atop{S}$$ and D 0→K$$0\\atop{S}$$K$$0\\atop{S}$$K$$0\\atop{S}$$.« less

  6. 17 CFR 5.8 - Aggregate retail forex assets.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Aggregate retail forex assets. 5.8 Section 5.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.8 Aggregate retail forex assets. (a) Each retail foreign exchange dealer...

  7. 12 CFR 151.40 - What definitions apply to this part?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 151.40 What definitions apply to this part? Asset-backed security means a security that is primarily serviced by the cash flows of a discrete pool of... a finite time period. Asset-backed security includes any rights or other assets designed to ensure...

  8. 77 FR 37697 - Notice of Proposed Information Collection: Comment Request; Ginnie Mae Mortgage-Backed Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-22

    ...- Backed Securities Issuer. 11702 I-2 Resolution of Board 210 1 210 0.08 16.8 of Directors and Certificate of Authorized Signatures. 11704 II-2 Commitment to 210 4 840 0.033 27.7 Guaranty Mortgage- Backed Securities. 11707 III-1 Master Servicing 210 1 210 0.016 3.4 Agreement. 11709 III-2 Master Agreement 210 1...

  9. 12 CFR 551.40 - What definitions apply to this part?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 551.40 What definitions apply to this part? Asset-backed security means a security that is primarily serviced by the cash flows of a discrete pool... cash within a finite time period. Asset-backed security includes any rights or other assets designed to...

  10. 12 CFR 551.40 - What definitions apply to this part?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 551.40 What definitions apply to this part? Asset-backed security means a security that is primarily serviced by the cash flows of a discrete pool... cash within a finite time period. Asset-backed security includes any rights or other assets designed to...

  11. 12 CFR 551.40 - What definitions apply to this part?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 551.40 What definitions apply to this part? Asset-backed security means a security that is primarily serviced by the cash flows of a discrete pool... cash within a finite time period. Asset-backed security includes any rights or other assets designed to...

  12. 16 CFR 801.15 - Aggregation of voting securities and assets the acquisition of which was exempt.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... balance sheet, for purposes of § 801.11). 2. In the previous example, the rule was applied to voting... securities the previous acquisition of which was exempt also fall within the rule. Thus, the size-of... assets. Because “X” acquired control of M in the earlier transaction, M is now within the person of “X...

  13. 31 CFR 515.521 - U.S. assets of certain Cuban corporations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... designated nationals, in U.S.-located assets of corporations formed under the laws of Cuba, after deducting... in Cuba under the management or control of the applicant(s) after the effective date; (3) In cases where the blocked assets purportedly have been nationalized by Cuba, compensation has not been paid to...

  14. 31 CFR 500.567 - U.S. assets of certain designated country corporations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false U.S. assets of certain designated country corporations. 500.567 Section 500.567 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FOREIGN ASSETS...

  15. 17 CFR 229.1114 - (Item 1114) Credit enhancement and other support, except for certain derivatives instruments.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., describe the following, including a clear discussion of the manner in which each potential item is designed... enhancement designed to ensure that the asset-backed securities or pool assets will pay in accordance with... purpose is to provide credit enhancement related to pool assets or the asset-backed securities. (4) Any...

  16. 17 CFR 229.1114 - (Item 1114) Credit enhancement and other support, except for certain derivatives instruments.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., describe the following, including a clear discussion of the manner in which each potential item is designed... enhancement designed to ensure that the asset-backed securities or pool assets will pay in accordance with... purpose is to provide credit enhancement related to pool assets or the asset-backed securities. (4) Any...

  17. 17 CFR 229.1114 - (Item 1114) Credit enhancement and other support, except for certain derivatives instruments.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., describe the following, including a clear discussion of the manner in which each potential item is designed... enhancement designed to ensure that the asset-backed securities or pool assets will pay in accordance with... purpose is to provide credit enhancement related to pool assets or the asset-backed securities. (4) Any...

  18. 76 FR 15352 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-21

    ... the defined terms, ``TRACE-Eligible Security,'' ``Reportable TRACE Transaction,'' ``Agency Debt...'') for reporting Asset-Backed Securities transactions; (C) to consolidate reporting requirements for Asset-Backed Securities transactions that are executed other than during TRACE System Hours; (D) to...

  19. 77 FR 64848 - Proposed Collection; Comment Request for Form 1120S, Schedule D, Schedule K-1, and Schedule M-3

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... 1120S, Schedule D, Schedule K-1, and Schedule M-3 AGENCY: Internal Revenue Service (IRS), Treasury... (Loss) Reconciliation for S Corporations With Total Assets of $10 Million or More, and Schedule K-1... Corporation, Schedule D (Form 1120S), Capital Gains and Losses and Built-in Gains, Schedule K-1 (Form 1120S...

  20. Women’s Individual Asset Ownership and Experience of Intimate Partner Violence: Evidence From 28 International Surveys

    PubMed Central

    Pereira, Audrey; Bleck, Jennifer; Palermo, Tia M.; Yount, Kathryn M.

    2017-01-01

    Objectives. To assess the oft-perceived protective relationship between women’s asset ownership and experience of intimate partner violence (IPV) in the previous 12 months. Methods. We used international survey data from women aged 15 to 49 years from 28 Demographic and Health Surveys (2010–2014) to examine the association between owning assets and experience of recent IPV, matching on household wealth by using multivariate probit models. Matching methods helped to account for the higher probability that women in wealthier households also have a higher likelihood of owning assets. Results. Asset ownership of any type was negatively associated with IPV in 3 countries, positively associated in 5 countries, and had no significant relationship in 20 countries (P < .10). Disaggregation by asset type, sole or joint ownership, women’s age, and community level of women’s asset ownership similarly showed no conclusive patterns. Conclusions. Results suggest that the relationship between women’s asset ownership and IPV is highly context specific. Additional methodologies and data are needed to identify causality, and to understand how asset ownership differs from other types of women’s economic empowerment. PMID:28398779

  1. Applying Statement 34's Capital Asset Requirements.

    ERIC Educational Resources Information Center

    Finden, Randal

    2001-01-01

    Discusses common issues and offers recommendations related to revisions in Governmental Accounting Standards Board Statement 34 wherein the financial reporting of the general fixed-assets account group is eliminated and instead a school district's general capital assets are reported and depreciated on the new statement of net assets and statement…

  2. 78 FR 20705 - Fixed Income Roundtable

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-05

    ... of fixed income markets. The roundtable will focus on the municipal securities, corporate bonds, and... corporate bonds and asset-backed securities. The participants in the third panel will discuss potential... discuss potential improvements to the market structure for corporate bonds and asset-backed securities...

  3. 32 CFR 147.13 - Guideline K-Security violations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...

  4. 32 CFR 147.13 - Guideline K-Security violations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...

  5. 32 CFR 147.13 - Guideline K-Security violations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...

  6. 32 CFR 147.13 - Guideline K-Security violations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...

  7. 32 CFR 147.13 - Guideline K-Security violations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...

  8. Integer programming applications: Bond trading, mortgage backed security financing, and FASB 115 accounting

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nauss, R.

    1994-12-31

    In this review we describe three integer programming applications involving fixed income securities. A bond trading model is presented that features a number of possible different objectives and collections of constraints including future interest rate scenarios. A mortgage backed security (MBS) financing model that accounts for potential defaults in the MBS is also presented. Finally we describe an approach to allocate collections of bank securities into three categories: hold to maturity, available for sale, or trading. Placement of securities in these categories affects the capital, net income, and liquidity of a bank according to new accounting rules promulgated by themore » Financial Accounting Standards Board.« less

  9. Imported Oil and U.S. National Security

    DTIC Science & Technology

    2009-01-01

    reducing some subsidies and devaluing the currency so as to restore fiscal balance. Chavez has provided campaign financing for presidential candidates in...arbitrage, the markets’ influence on Figure 2.6 Price Per Barrel of West Texas Intermediate in Current and Year 2000 Dollars SOURCES: IMF (undated...security whose price is dependent on or derived from one or more underlying assets, such as stocks, bonds, commodities, or currencies . Its value is

  10. 17 CFR 5.8 - Aggregate retail forex assets.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Aggregate retail forex assets... FOREIGN CURRENCY TRANSACTIONS § 5.8 Aggregate retail forex assets. (a) Each retail foreign exchange dealer and futures commission merchant offering or engaging in retail forex transactions shall calculate its...

  11. 17 CFR 5.8 - Aggregate retail forex assets.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Aggregate retail forex assets... FOREIGN CURRENCY TRANSACTIONS § 5.8 Aggregate retail forex assets. (a) Each retail foreign exchange dealer and futures commission merchant offering or engaging in retail forex transactions shall calculate its...

  12. 17 CFR 5.8 - Aggregate retail forex assets.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Aggregate retail forex assets... FOREIGN CURRENCY TRANSACTIONS § 5.8 Aggregate retail forex assets. (a) Each retail foreign exchange dealer and futures commission merchant offering or engaging in retail forex transactions shall calculate its...

  13. Mutually catalyzed birth of population and assets in exchange-driven growth

    NASA Astrophysics Data System (ADS)

    Lin, Zhenquan; Ke, Jianhong; Ye, Gaoxiang

    2006-10-01

    We propose an exchange-driven aggregation growth model of population and assets with mutually catalyzed birth to study the interaction between the population and assets in their exchange-driven processes. In this model, monomer (or equivalently, individual) exchange occurs between any pair of aggregates of the same species (population or assets). The rate kernels of the exchanges of population and assets are K(k,l)=Kkl and L(k,l)=Lkl , respectively, at which one monomer migrates from an aggregate of size k to another of size l . Meanwhile, an aggregate of one species can yield a new monomer by the catalysis of an arbitrary aggregate of the other species. The rate kernel of asset-catalyzed population birth is I(k,l)=Iklμ [and that of population-catalyzed asset birth is J(k,l)=Jklν ], at which an aggregate of size k gains a monomer birth when it meets a catalyst aggregate of size l . The kinetic behaviors of the population and asset aggregates are solved based on the rate equations. The evolution of the aggregate size distributions of population and assets is found to fall into one of three categories for different parameters μ and ν : (i) population (asset) aggregates evolve according to the conventional scaling form in the case of μ⩽0 (ν⩽0) , (ii) population (asset) aggregates evolve according to a modified scaling form in the case of ν=0 and μ>0 ( μ=0 and ν>0 ), and (iii) both population and asset aggregates undergo gelation transitions at a finite time in the case of μ=ν>0 .

  14. An analysis of Indonesia’s information security index: a case study in a public university

    NASA Astrophysics Data System (ADS)

    Yustanti, W.; Qoiriah, A.; Bisma, R.; Prihanto, A.

    2018-01-01

    Ministry of Communication and Informatics of the Republic of Indonesia has issued the regulation number 4-2016 about Information Security Management System (ISMS) for all kind organizations. Public university as a government institution must apply this standard to assure its level of information security has complied ISO 27001:2013. This research is a preliminary study to evaluate the readiness of university IT services (case study in a public university) meets the requirement of ISO 27001:2013 using the Indonesia’s Information Security Index (IISI). There are six parameters used to measure the level of information security, these are the ICT role, governance, risk management, framework, asset management and technology. Each parameter consists of serial questions which must be answered and convert to a numeric value. The result shows the level of readiness and maturity to apply ISO 27001 standard.

  15. Examining the Impact of Non-Technical Security Management Factors on Information Security Management in Health Informatics

    ERIC Educational Resources Information Center

    Imam, Abbas H.

    2013-01-01

    Complexity of information security has become a major issue for organizations due to incessant threats to information assets. Healthcare organizations are particularly concerned with security owing to the inherent vulnerability of sensitive information assets in health informatics. While the non-technical security management elements have been at…

  16. U.S. national response assets for radiological incidents.

    PubMed

    Remick, Alan L; Crapo, John L; Woodruff, Charles R

    2005-11-01

    The federal government has had the ability to respond to incidents of national significance for decades. Since 11 September 2001, there have been enhancements to existing federal assets and the creation of new federal assets. This presentation will provide an overview of the more significant federal assets. Pivotal to a response of national significance is the U.S. Department of Energy (DOE) Federal Radiological Monitoring and Assessment Center, which organizes and coordinates federal agency monitoring activities during an emergency. DOE manages the Federal Radiological Monitoring and Assessment Center during the emergency phase, and the Environmental Protection Agency (EPA) manages the response during the recovery phase once the emergency is terminated. EPA monitoring teams provide support during both the emergency and recovery phases of an emergency. Other DOE teams are available to respond to major nuclear power plant events, transportation accidents, or terrorism events involving the use of radiological materials, including the Radiological Assistance Program, the Aerial Measuring System, the National Atmospheric Release Advisory Center, and the Radiation Emergency Assistance Center/Training Site. For incidents involving a nuclear weapon, an improvised nuclear device, or a radiological dispersal device, DOE assets such as the Nuclear Emergency Support Team and the Accident Response Group could provide capabilities for weapon or device search, recovery, and removal. The Radiological Triage System harnesses the weapons scientists and engineers at the DOE national laboratories to provide gamma spectroscopy interpretation for agencies responding to an incident. In recent years, National Guard Weapons of Mass Destruction-Civil Support Teams have been created to support state and local response to terrorism events. The Civil Support Teams normally come under direct control of the state and can respond without requiring authorization from the U.S. Department of

  17. Strategies to Build Assets among Low Income Families: Mapping the Field

    ERIC Educational Resources Information Center

    Lind, Christianne

    2006-01-01

    To be economically secure, families need both income and assets. Regular income helps families pay for their daily living expenses. In contrast, families need assets to weather financial hardships and get ahead. Assets provide a safety net for coping with unanticipated expenses and emergencies that could otherwise cause significant financial…

  18. Initial cash/asset ratio and asset prices: an experimental study.

    PubMed

    Caginalp, G; Porter, D; Smith, V

    1998-01-20

    A series of experiments, in which nine participants trade an asset over 15 periods, test the hypothesis that an initial imbalance of asset/cash will influence the trading price over an extended time. Participants know at the outset that the asset or "stock" pays a single dividend with fixed expectation value at the end of the 15th period. In experiments with a greater total value of cash at the start, the mean prices during the trading periods are higher, compared with those with greater amount of asset, with a high degree of statistical significance. The difference is most significant at the outset and gradually tapers near the end of the experiment. The results are very surprising from a rational expectations and classical game theory perspective, because the possession of a large amount of cash does not lead to a simple motivation for a trader to bid excessively on a financial instrument. The gradual erosion of the difference toward the end of trading, however, suggests that fundamental value is approached belatedly, offering some consolation to the rational expectations theory. It also suggests that there is a time scale on which an evolution toward fundamental value occurs. The experimental results are qualitatively compatible with the price dynamics predicted by a system of differential equations based on asset flow. The results have broad implications for the marketing of securities, particularly initial and secondary public offerings, government bonds, etc., where excess supply has been conjectured to suppress prices.

  19. Secure and Efficient k-NN Queries⋆

    PubMed Central

    Asif, Hafiz; Vaidya, Jaideep; Shafiq, Basit; Adam, Nabil

    2017-01-01

    Given the morass of available data, ranking and best match queries are often used to find records of interest. As such, k-NN queries, which give the k closest matches to a query point, are of particular interest, and have many applications. We study this problem in the context of the financial sector, wherein an investment portfolio database is queried for matching portfolios. Given the sensitivity of the information involved, our key contribution is to develop a secure k-NN computation protocol that can enable the computation k-NN queries in a distributed multi-party environment while taking domain semantics into account. The experimental results show that the proposed protocols are extremely efficient. PMID:29218333

  20. 77 FR 56686 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    ... Change Relating to Post-Trade Transparency for Agency Pass-Through Mortgage-Backed Securities Traded in... and dissemination of transactions in TRACE- Eligible Securities that are: (1) Agency Pass-Through... Security, Agency Pass-Through Mortgage-Backed Security, Specified Pool Transaction, Asset-Backed Security...

  1. The United Kingdom's School Asset Management Plans.

    ERIC Educational Resources Information Center

    Jones, Alan

    1999-01-01

    Examines the U.K.'s Asset Management Plans (AMPs) designed to help Local Education Authorities (LEAs) identify and address the most important priorities in their school capital programs, and to help in their longer term planning and management of the school estate. Discusses AMP objectives, the stages of developing an AMP, and how the Department…

  2. Protecting New York’s Infrastructure: Improving Overall Safety and Security Through New Partnerships and Concentration on Planning, Engineering and Design

    DTIC Science & Technology

    2013-12-01

    Program HSGP Homeland Security Grant Program IAEA International Atomic Energy Agency IAV Initial Asset Visit IPD Integrated Project Delivery...Light of Program’s Failures, Energy & Commerce Committee, 2013. 85 Adam Estes, “The Exploding Fertilizer Plant in Texas Hadn’t Had a Full Inspection in...63 INITIAL DISTRIBUTION LIST

  3. 76 FR 31624 - Notice of Proposed Information Collection: Comment Request; Ginnie Mae Mortgage-Backed Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-01

    ... Securities Issuer. 11702 I-2 Resolution of Board 210 1 210 0.08 16.8 of Directors and Certificate of Authorized Signatures. 11704 II-2 Commitment to 210 4 840 0.033 27.7 Guaranty Mortgage- Backed Securities. 11707 III-1 Master Servicing 210 1 210 0.016 3.4 Agreement. 11709 III-2 Master Agreement for 210 1 210 0...

  4. 76 FR 2049 - Suspension of the Duty To File Reports for Classes of Asset-Backed Securities Under Section 15(d...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-12

    ... securities of the class sold in a registered transaction held by non-affiliates of the depositor. We are also... that for issuers without a class of securities registered under the Exchange Act the duty to file... the registration statement for the securities became effective, if the securities of each class to...

  5. 78 FR 21981 - Sunshine Act Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... transparency, liquidity, efficiency, or other aspects of the structure of the corporate bond and asset-backed... provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange... focus on the characteristics of the corporate bond and asset-backed securities markets today, how those...

  6. GOP Candidates Eye Scaling Back Federal K-12 Role

    ERIC Educational Resources Information Center

    Klein, Alyson

    2012-01-01

    Though education has played second fiddle so far to other domestic issues in the race for the Republican presidential nomination, the narrowing field includes GOP candidates with compatible views on scaling back the federal role in K-12, but big contrasts in policy specifics and experience. President Barack Obama, meanwhile, is expected to put a…

  7. Securing your financial future.

    PubMed

    Kachalia, Parag R

    2009-04-01

    Securing one's financial future requires dedication and planning. A clear plan must be implemented and continually re-examined to assure an individual remains on track to achieve this security. True success of the plan will be dependent upon taking the appropriate steps to protecting one's assets against unfortunate events along with building assets with a clear end goal in mind. This article will cover the fundamental steps an individual can take to secure their financial future.

  8. Initial cash/asset ratio and asset prices: An experimental study

    PubMed Central

    Caginalp, Gunduz; Porter, David; Smith, Vernon

    1998-01-01

    A series of experiments, in which nine participants trade an asset over 15 periods, test the hypothesis that an initial imbalance of asset/cash will influence the trading price over an extended time. Participants know at the outset that the asset or “stock” pays a single dividend with fixed expectation value at the end of the 15th period. In experiments with a greater total value of cash at the start, the mean prices during the trading periods are higher, compared with those with greater amount of asset, with a high degree of statistical significance. The difference is most significant at the outset and gradually tapers near the end of the experiment. The results are very surprising from a rational expectations and classical game theory perspective, because the possession of a large amount of cash does not lead to a simple motivation for a trader to bid excessively on a financial instrument. The gradual erosion of the difference toward the end of trading, however, suggests that fundamental value is approached belatedly, offering some consolation to the rational expectations theory. It also suggests that there is a time scale on which an evolution toward fundamental value occurs. The experimental results are qualitatively compatible with the price dynamics predicted by a system of differential equations based on asset flow. The results have broad implications for the marketing of securities, particularly initial and secondary public offerings, government bonds, etc., where excess supply has been conjectured to suppress prices. PMID:11038619

  9. 77 FR 23524 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-19

    ... Change Relating to Post-Trade Transparency for Agency Pass-Through Mortgage-Backed Securities Traded in Specified Pool Transactions and SBA-Backed Asset- Backed Securities Transactions April 13, 2012. Pursuant to... dissemination of transactions in TRACE- Eligible Securities that are: (1) Agency Pass-Through Mortgage-Backed...

  10. 76 FR 18255 - Amendment to Prohibited Transaction Exemption (PTE) 96-23 for Plan Asset Transactions Determined...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-01

    ... Determined by In-House Asset Managers Agency: Employee Benefits Security Administration, Labor. Action... various transactions involving employee benefit plans whose assets are managed by in-house asset managers... Asset Transactions Determined by In-House Asset Managers to OMB for review and clearance at the time the...

  11. Social Security: a financial appraisal for the median voter.

    PubMed

    Galasso, V

    Several explanations have been proposed for why voters continue to support unfunded social security systems. Browning (1975) suggests that the extremely large unfunded pension systems of most democracies depend on the existence of a voting majority composed of middle-aged and older people who fail to fully internalize the cost of financing the system. In fact, when voting, economically rational workers consider only their current and future contributions to the system and their expected pension benefits--not their past contributions, which they regard as sunk costs. If, for a majority of voters, the expected continuation return from social security exceeds the return from alternative assets, an unfunded social security system is politically sustainable. This article explores the validity of Browning's proposition by quantifying the returns that U.S. voters in presidential elections from 1964 to 1996 have obtained, or expect to obtain, from Social Security. Did "investments" in Social Security outperform alternative forms of investment, such as mutual funds or pension funds, for a majority of the voters? What can be expected for the future? The U.S. Social Security system redistributes income within age cohorts on the basis of sex, income, and marital status. To account for some of these features, the median voter is represented by a family unit whose members--a husband who accounts for 70 percent of household earnings and a wife who accounts for 30 percent--make joint economic and voting decisions. Thus, retirement and survival benefits paid out to the spouse of an insured worker can be included in the calculation of Social Security returns. Interval estimates of voters' family incomes from the U.S. Census Bureau were used to obtain the median voter's household earnings. The median voter's age is derived from the ages of those who voted in presidential elections, not from the ages of the entire electorate. The median voter's contributions to Social Security are the

  12. A Cyber Security Self-Assessment Method for Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.

    2004-11-01

    A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is amore » digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process.« less

  13. 7 CFR 3550.54 - Calculation of income and assets.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... (including gifts); (6) Lump sum additions to family assets such as inheritances; capital gains; insurance... losses; and deferred periodic payments of supplemental security income and Social Security benefits... other forms of capital investments including life insurance policies and retirement plans that are...

  14. 7 CFR 3550.54 - Calculation of income and assets.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... (including gifts); (6) Lump sum additions to family assets such as inheritances; capital gains; insurance... losses; and deferred periodic payments of supplemental security income and Social Security benefits... other forms of capital investments including life insurance policies and retirement plans that are...

  15. MaROS: Web Visualization of Mars Orbiting and Landed Assets

    NASA Technical Reports Server (NTRS)

    Wallick, Michael N.; Allard, Daniel A.; Gladden, Roy E.; Hy, Franklin H.

    2011-01-01

    Mars Relay operations currently involve several e-mails and phone calls between lander and orbiter teams in order to settle on an agreed time for performing a communication pass between the landed asset (i.e. rover or lander) and orbiter, then back to Earth. This new application aims to reduce this complexity by presenting a visualization of the overpass time ranges and elevation angle, as well as other information. The user is able to select a specific overflight opportunity to receive further information about that particular pass. This software presents a unified view of the potential communication passes available between orbiting and landed assets on Mars. Each asset is presented to the user in a graphical view showing overpass opportunities, elevation angle, requested and acknowledged communication windows, forward and back latencies, warnings, conflicts, relative planetary times, ACE Schedules, and DSN information. This software is unique in that it is the first of its kind to visually display the information regarding communication opportunities between landed and orbiting Mars assets. The software is written using ActionScript/FLEX, a Web language, meaning that this information may be accessed over the Internet from anywhere in the world.

  16. A Study on Corporate Security Awareness and Compliance Behavior Intent

    ERIC Educational Resources Information Center

    Clark, Christine Y.

    2013-01-01

    Understanding the drivers to encourage employees' security compliance behavior is increasingly important in today's highly networked environment to protect computer and information assets of the company. The traditional approach for corporations to implement technology-based controls, to prevent security breaches is no longer sufficient.…

  17. 49 CFR 15.5 - Sensitive security information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... sources and methods used to gather or develop threat information, including threats against cyber infrastructure. (8) Security measures. Specific details of aviation or maritime transportation security measures... infrastructure asset information. Any list identifying systems or assets, whether physical or virtual, so vital...

  18. 49 CFR 15.5 - Sensitive security information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... sources and methods used to gather or develop threat information, including threats against cyber infrastructure. (8) Security measures. Specific details of aviation or maritime transportation security measures... infrastructure asset information. Any list identifying systems or assets, whether physical or virtual, so vital...

  19. 49 CFR 15.5 - Sensitive security information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... sources and methods used to gather or develop threat information, including threats against cyber infrastructure. (8) Security measures. Specific details of aviation or maritime transportation security measures... infrastructure asset information. Any list identifying systems or assets, whether physical or virtual, so vital...

  20. 49 CFR 15.5 - Sensitive security information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... sources and methods used to gather or develop threat information, including threats against cyber infrastructure. (8) Security measures. Specific details of aviation or maritime transportation security measures... infrastructure asset information. Any list identifying systems or assets, whether physical or virtual, so vital...

  1. 75 FR 66295 - Fixed Assets, Member Business Loans, and Regulatory Flexibility Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-28

    ... assets, member business loans (MBL), stress testing of investments, and discretionary control of...) discretionary control of investments; (6) stress testing of investments; (7) zero-coupon securities; (8... fixed assets, MBL, stress testing of investments, and discretionary control of investments provisions of...

  2. Return of the Viking: Restoring a Proven Asset to Combat an Advanced Threat

    DTIC Science & Technology

    2017-05-12

    those assets. Additionally, as Sea Control returns to the forefront of national policy, the S- 3B would enhance the range associated with the Anti...Carrier Air Wing, A2/AD, S-3B, Sea Control, Long-range Strike 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES...Additionally, as Sea Control returns to the forefront of national policy, the S-3B would enhance the range associated with the Anti-Surface and Anti

  3. Marketing Plan for Demonstration and Validation Assets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    The National Security Preparedness Project (NSPP), is to be sustained by various programs, including technology demonstration and evaluation (DEMVAL). This project assists companies in developing technologies under the National Security Technology Incubator program (NSTI) through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. This report documents the DEMVAL marketing and visibility plan, which will focus on collecting information about, and expanding the visibility of, DEMVAL assets serving businesses with national security technology applications in southern New Mexico.

  4. 17 CFR 229.1009 - (Item 1009) Persons/assets, retained, employed, compensated or used.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 1009) Persons/assets, retained, employed, compensated or used. 229.1009 Section 229.1009 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933...

  5. 17 CFR 229.1009 - (Item 1009) Persons/assets, retained, employed, compensated or used.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1009) Persons/assets, retained, employed, compensated or used. 229.1009 Section 229.1009 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933...

  6. 17 CFR 229.1009 - (Item 1009) Persons/assets, retained, employed, compensated or used.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false (Item 1009) Persons/assets, retained, employed, compensated or used. 229.1009 Section 229.1009 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933...

  7. 17 CFR 229.1009 - (Item 1009) Persons/assets, retained, employed, compensated or used.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false (Item 1009) Persons/assets, retained, employed, compensated or used. 229.1009 Section 229.1009 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933...

  8. 17 CFR 229.1009 - (Item 1009) Persons/assets, retained, employed, compensated or used.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 1009) Persons/assets, retained, employed, compensated or used. 229.1009 Section 229.1009 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933...

  9. 30. BUILDING NO.S 271K AND 271L, VIEW LOOKING SOUTH AT ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    30. BUILDING NO.S 271-K AND 271-L, VIEW LOOKING SOUTH AT BACK OF BUILDING NO. 271-L (LEFT), 271-K (MIDDLE) AND ROOF OF BUILDING NO. 271-I (VISIBLE OVER WALKWAY ON RIGHT). - Picatinny Arsenal, 200 Area, Shell Component Loading, State Route 15 near I-80, Dover, Morris County, NJ

  10. 12 CFR 550.360 - May I make a loan to a fiduciary account that is secured by an interest in the assets of the...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false May I make a loan to a fiduciary account that is secured by an interest in the assets of the account? 550.360 Section 550.360 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FIDUCIARY POWERS OF SAVINGS ASSOCIATIONS...

  11. 12 CFR 550.360 - May I make a loan to a fiduciary account that is secured by an interest in the assets of the...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false May I make a loan to a fiduciary account that is secured by an interest in the assets of the account? 550.360 Section 550.360 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FIDUCIARY POWERS OF SAVINGS ASSOCIATIONS...

  12. Racial and ethnic differences in wealth and asset choices.

    PubMed

    Choudhury, S

    White households in the United States are far wealthier than black or Hispanic households, a disparity that remains unexplained even after taking into account income and demographic factors. This article uses data from the Health and Retirement Study to examine various components of aggregate wealth, including housing equity, nonhousing equity, financial assets in general, and risky assets in particular. It inspects asset choices by race and ethnicity and assesses whether differences in saving behavior--and, consequently, in rates of return on assets--are possible sources of the wealth gap. It also demonstrates the equalizing effect of pension wealth and Social Security wealth on total wealth. Racial and ethnic differences in housing equity narrow among households in the higher income quartiles, whereas differences in nonhousing equity generally widen as income increases. The widening gap in nonhousing equity stems from differences in financial asset holdings, particularly risky assets. At every income quartile and educational level, the percentage of black and Hispanic households that own risky, higher-yielding assets in considerably smaller than the percentage of white households. Thus, some of the wealth gap appears to be attributable to differences in saving behavior. Understanding how people save--in particular, knowing whether certain people will be more vulnerable financially because of their saving choices--helps policymakers assess older Americans' financial preparedness for retirement and anticipate their economic well-being thereafter. Lower rates of investment in the financial market will probably result in slower wealth creation in minority households. Recognizing this, some organizations are trying to open opportunities for minority households to invest in the financial market. This is a positive step toward narrowing the wealth divide. Such efforts will become even more critical if Social Security reform places increased responsibility on individuals

  13. 12 CFR 201.3 - Extensions of credit generally.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... institution must be secured to the satisfaction of the Federal Reserve Bank that makes the advance... securities, and business, consumer, and other customer notes. (3) If a Federal Reserve Bank concludes that a... specific to asset-backed securities in the particular TALF asset sector (as defined in the TALF haircut...

  14. Search for CP violation in the decays D+--> K(S)pi+ and D+-->K(S)K+.

    PubMed

    Link, J M; Reyes, M; Yager, P M; Anjos, J C; Bediaga, I; Göbel, C; Magnin, J; Massafferri, A; de Miranda, J M; Pepe, I M; dos Reis, A C; Carrillo, S; Casimiro, E; Sánchez-Hernández, A; Uribe, C; Vázquez, F; Cinquini, L; Cumalat, J P; O'Reilly, B; Ramirez, J E; Vaandering, E W; Butler, J N; Cheung, H W K; Gaines, I; Garbincius, P H; Garren, L A; Gottschalk, E; Kasper, P H; Kreymer, A E; Kutschke, R; Bianco, S; Fabbri, F L; Zallo, A; Cawlfield, C; Kim, D Y; Rahimi, A; Wiss, J; Gardner, R; Kryemadhi, A; Chung, Y S; Kang, J S; Ko, B R; Kwak, J W; Lee, K B; Park, H; Alimonti, G; Boschini, M; D'Angelo, P; DiCorato, M; Dini, P; Giammarchi, M; Inzani, P; Leveraro, F; Malvezzi, S; Menasce, D; Mezzadri, M; Milazzo, L; Moroni, L; Pedrini, D; Pontoglio, C; Prelz, F; Rovere, M; Sala, S; Davenport, T F; Agostino, L; Arena, V; Boca, G; Bonomi, G; Gianini, G; Liguori, G; Merlo, M M; Pantea, D; Ratti, S P; Riccardi, C; Segoni, I; Vitulo, P; Hernandez, H; Lopez, A M; Mendez, H; Mendez, L; Mirles, A; Montiel, E; Olaya, D; Paris, A; Quinones, J; Rivera, C; Xiong, W; Zhang, Y; Wilson, J R; Cho, K; Handler, T; Mitchell, R; Engh, D; Hosack, M; Johns, W E; Nehring, M; Sheldon, P D; Stenson, K; Webster, M; Sheaff, M

    2002-01-28

    A high-statistics sample of photoproduced charm from the FOCUS experiment has been used to search for direct CP violation in the decay rates for D+-->K(S)pi+ and D+-->K(S)K+. We have measured the following asymmetry parameters relative to D+-->K-pi+pi+: A(CP)(K(S)pi+) = (-1.6+/-1.5+/-0.9)%, A(CP)(K(S)K+) = (+6.9+/-6.0+/-1.5)%, and A(CP)(K(S)K+) = (+7.1+/-6.1+/-1.2)% relative to D+-->K(S)pi+. We have also measured the relative branching ratios and found Gamma(D+-->K(0)pi+)/Gamma(D+-->K-pi+pi+) = (30.60+/-0.46+/-0.32)%, Gamma(D+-->K(0)K+)/Gamma(D+-->K-pi+pi+) = (6.04+/-0.35+/-0.30)%, and Gamma(D+-->K(0)K+)/Gamma(D+-->K(0)pi+) = (19.96+/-1.19+/-0.96)%.

  15. 31 CFR 515.521 - U.S. assets of certain Cuban corporations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... corporations. 515.521 Section 515.521 Money and Finance: Treasury Regulations Relating to Money and Finance... corporations. (a) Specific licenses may be issued unblocking the net pro rata shares of individuals who are... designated nationals, in U.S.-located assets of corporations formed under the laws of Cuba, after deducting...

  16. 75 FR 77922 - Nuveen Asset Management, et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-14

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29522; File No. 812-13839] Nuveen Asset Management, et al.; Notice of Application December 8, 2010. AGENCY: Securities and Exchange... company's voting stock to be owned by investment companies and companies controlled by them. 2. Section 12...

  17. Homeland security and public health: role of the Department of Veterans Affairs, the US Department of Homeland Security, and implications for the public health community.

    PubMed

    Koenig, Kristi L

    2003-01-01

    The terrorist attacks of 11 September 2001 led to the largest US Government transformation since the formation of the Department of Defense following World War II. More than 22 different agencies, in whole or in part, and >170,000 employees were reorganized to form a new Cabinet-level Department of Homeland Security (DHS), with the primary mission to protect the American homeland. Legislation enacted in November 2002 transferred the entire Federal Emergency Management Agency and several Department of Health and Human Services (HHS) assets to DHS, including the Office of Emergency Response, and oversight for the National Disaster Medical System, Strategic National Stockpile, and Metropolitan Medical Response System. This created a potential separation of "health" and "medical" assets between the DHS and HHS. A subsequent presidential directive mandated the development of a National Incident Management System and an all-hazard National Response Plan. While no Department of Veterans Affairs (VA) assets were targeted for transfer, the VA remains the largest integrated healthcare system in the nation with important support roles in homeland security that complement its primary mission to provide care to veterans. The Emergency Management Strategic Healthcare Group (EMSHG) within the VA's medical component, the Veteran Health Administration (VHA), is the executive agent for the VA's Fourth Mission, emergency management. In addition to providing comprehensive emergency management services to the VA, the EMSHG coordinates medical back-up to the Department of Defense, and assists the public via the National Disaster Medical System and the National Response Plan. This article describes the VA's role in homeland security and disasters, and provides an overview of the ongoing organizational and operational changes introduced by the formation of the new DHS. Challenges and opportunities for public health are highlighted.

  18. Security system

    DOEpatents

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  19. Early retirement and the financial assets of individuals with back problems.

    PubMed

    Schofield, Deborah J; Shrestha, Rupendra N; Percival, Richard; Callander, Emily J; Kelly, Simon J; Passey, Megan E

    2011-05-01

    This paper quantifies the relationship between early retirement due to back problems and wealth, and contributes to a more complete picture of the full costs associated with back problems. The output data set of the microsimulation model Health&WealthMOD was analysed. Health&WealthMOD was specifically designed to measure the economic impacts of ill health on Australian workers aged 45-64 years. People aged 45-64 years who are out of the labour force due to back problems have significantly less chance of having any accumulated wealth. While almost all individuals who are in full-time employment with no chronic health condition have some wealth accumulated, a significantly smaller proportion (89%) of those who have retired early due to back problems do. Of those who have retired early due to back problems who do have some wealth, on average the total value of this wealth is 87% less (95% CI: -90 to -84%) than the total value of wealth accumulated by those who have remained in full-time employment with no health condition controlling for age, sex and education. The financial burden placed on those retiring early due to back problems is likely to cause financial stress in the future, as not only have retired individuals lost an income stream from paid employment, but they also have little or no wealth to draw upon. Preventing early retirement due to back problems will increase the time individuals will have to amass savings to finance their retirement and to protect against financial shocks.

  20. Test and Demonstration Assets of New Mexico

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This document was developed by the Arrowhead Center of New Mexico State University as part of the National Security Preparedness Project (NSPP), funded by a DOE/NNSA grant. The NSPP has three primary components: business incubation, workforce development, and technology demonstration and validation. The document contains a survey of test and demonstration assets in New Mexico available for external users such as small businesses with security technologies under development. Demonstration and validation of national security technologies created by incubator sources, as well as other sources, are critical phases of technology development. The NSPP will support the utilization of an integrated demonstrationmore » and validation environment.« less

  1. 75 FR 55376 - Transamerica Asset Management, Inc. et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ... more investment companies for short-term cash management purposes, or (ii) engage in interfund... Fund to: (i) acquire securities of one or more investment companies for short-term cash management...] Transamerica Asset Management, Inc. et al.; Notice of Application September 3, 2010 AGENCY: Securities and...

  2. Kuwait: Governance, Security, and U.S. Policy

    DTIC Science & Technology

    2016-05-04

    19 Performance on Countering Terrorism Financing / Islamic State...U.S. Policy Congressional Research Service 20 Performance on Countering Terrorism Financing / Islamic State Donations32 Some U.S.-Kuwait...terrorism financing . 39 Earlier, in June 2008, the Department of theTreasury froze the assets of a Kuwait-based charity—the Islamic Heritage Restoration

  3. U.S. Maritime Security: Sustainability Challenges

    DTIC Science & Technology

    2011-09-01

    Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011

  4. Cyber-Physical Security Assessment (CyPSA) Toolset

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Garcia, Luis; Patapanchala, Panini; Zonouz, Saman

    CyPSA seeks to organize and gain insight into the diverse sets of data that a critical infrastructure provider must manage. Specifically CyPSA inventories, manages, and analyzes assets and relations among those assets. A variety of interfaces are provided. CyPSA inventories assets (both cyber and physical). This may include the cataloging of assets through a common interface. Data sources used to generate a catalogue of assets include PowerWorld, NPView, NMap Scans, and device configurations. Depending upon the role of the person using the tool the types of assets accessed as well as the data sources through which asset information is accessedmore » may vary. CyPSA allows practitioners to catalogue relations among assets and these may either be manually or programmatically generated. For example, some common relations among assets include the following: Topological Network Data: Which devices and assets are connected and how? Data sources for this kind of information include NMap scans, NPView topologies (via Firewall rule analysis). Security Metrics Outputs: The output of various security metrics such as overall exposure. Configure Assets:CyPSA may eventually include the ability to configure assets including relays and switches. For example, a system administrator would be able to configure and alter the state of a relay via the CyPSA interface. Annotate Assets: CyPSA also allows practitioners to manually and programmatically annotate assets. Sources of information with which to annotate assets include provenance metadata regarding the data source from which the asset was loaded, vulnerability information from vulnerability databases, configuration information, and the output of an analysis in general.« less

  5. 12 CFR 208.34 - Recordkeeping and confirmation of certain securities transactions effected by State member banks.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... primarily by the cash flows of a discrete pool of receivables or other financial assets, either fixed or... security that represents an interest in or is secured by a pool of receivables or other financial assets... interest in or is secured by a pool of receivables or other financial assets that are subject to continuous...

  6. 12 CFR 208.34 - Recordkeeping and confirmation of certain securities transactions effected by State member banks.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... primarily by the cash flows of a discrete pool of receivables or other financial assets, either fixed or... security that represents an interest in or is secured by a pool of receivables or other financial assets... interest in or is secured by a pool of receivables or other financial assets that are subject to continuous...

  7. 12 CFR 208.34 - Recordkeeping and confirmation of certain securities transactions effected by State member banks.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... primarily by the cash flows of a discrete pool of receivables or other financial assets, either fixed or... security that represents an interest in or is secured by a pool of receivables or other financial assets... interest in or is secured by a pool of receivables or other financial assets that are subject to continuous...

  8. Health, Education, and the Post-Retirement Evolution of Household Assets

    PubMed Central

    Poterba, James; Venti, Steven; Wise, David A.

    2013-01-01

    We explore the relationship between education and the evolution of wealth after retirement. Asset growth following retirement depends in part on health capital and financial capital accumulated prior to retirement, which in turn are strongly related to educational attainment. These “initial conditions” at retirement can have a lingering effect on subsequent asset evolution. We aim to disentangle the effects of education that operate through health and financial pathways (such as Social Security benefits and the general level of health) prior to retirement from the effects of education that impinge directly on asset evolution after retirement. We also consider the additional effects of education that are not captured through these pathways. We find a substantial effect of education on asset growth through each of the pathways as well as a substantial additional effect not captured by the identified pathways. PMID:24904710

  9. Branching fraction measurement of J / ψ → K S K L and search for J / ψ → K S K S

    DOE PAGES

    Ablikim, M.; Achasov, M. N.; Ahmed, S.; ...

    2017-12-04

    Using a sample of 1.31×10 9J/ψ events collected with the BESIII detector at the BEPCII collider, we study the decays of J/ψ→ K SK L and K SK S. The branching fraction of J/ψ→ K SK L is determined to be B(J/ψ→ K SK L) = (1:93 0:01 (stat:) 0:05 (syst:))×10 -4, which signi cantly improves on previous measurements. No clear signal is observed for the J/ψ→ K SK S process, and the upper limit at the 95% con dence level for its branching fraction is determined to be B(J= ! K SK S) < 1:4×10 -8, which improves onmore » the previous searches by 2 orders in magnitude and reaches the order of the Einstein-Podolsky-Rosen expectation.« less

  10. Branching fraction measurement of J / ψ → K S K L and search for J / ψ → K S K S

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ablikim, M.; Achasov, M. N.; Ahmed, S.

    Using a sample of 1.31×10 9J/ψ events collected with the BESIII detector at the BEPCII collider, we study the decays of J/ψ→ K SK L and K SK S. The branching fraction of J/ψ→ K SK L is determined to be B(J/ψ→ K SK L) = (1:93 0:01 (stat:) 0:05 (syst:))×10 -4, which signi cantly improves on previous measurements. No clear signal is observed for the J/ψ→ K SK S process, and the upper limit at the 95% con dence level for its branching fraction is determined to be B(J= ! K SK S) < 1:4×10 -8, which improves onmore » the previous searches by 2 orders in magnitude and reaches the order of the Einstein-Podolsky-Rosen expectation.« less

  11. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less

  12. PeerShield: determining control and resilience criticality of collaborative cyber assets in networks

    NASA Astrophysics Data System (ADS)

    Cam, Hasan

    2012-06-01

    As attackers get more coordinated and advanced in cyber attacks, cyber assets are required to have much more resilience, control effectiveness, and collaboration in networks. Such a requirement makes it essential to take a comprehensive and objective approach for measuring the individual and relative performances of cyber security assets in network nodes. To this end, this paper presents four techniques as to how the relative importance of cyber assets can be measured more comprehensively and objectively by considering together the main variables of risk assessment (e.g., threats, vulnerabilities), multiple attributes (e.g., resilience, control, and influence), network connectivity and controllability among collaborative cyber assets in networks. In the first technique, a Bayesian network is used to include the random variables for control, recovery, and resilience attributes of nodes, in addition to the random variables of threats, vulnerabilities, and risk. The second technique shows how graph matching and coloring can be utilized to form collaborative pairs of nodes to shield together against threats and vulnerabilities. The third technique ranks the security assets of nodes by incorporating multiple weights and thresholds of attributes into a decision-making algorithm. In the fourth technique, the hierarchically well-separated tree is enhanced to first identify critical nodes of a network with respect to their attributes and network connectivity, and then selecting some nodes as driver nodes for network controllability.

  13. Developing a Security Profile.

    ERIC Educational Resources Information Center

    Woodcock, Chris

    1999-01-01

    Examines the questions schools should address when re-evaluating how to protect people, property, and assets. Questions addressed include where and how to begin to improve security in a school, getting the most protection economically, establishing where electronic security should be used, using surveillance cameras and systems, and what the role…

  14. [Experience feed back committee in radiotherapy (CREx): a compulsory tool for security management evaluation at two years].

    PubMed

    Lartigau, E; Coche-Dequeant, B; Dumortier, V; Giscard, S; Lacornerie, T; Lasue, A; Cheval, V; Martel, V; Malfait, B; Fuchs, A; Pestel, M; Damman, M; Forrest, M

    2008-11-01

    After working on treatment organisation in radiotherapy (bonne pratiques organisationnelles en radiothérapie - action pilote MEAH 2003), the development of a security policy has become crucial. With the help of Air France Consulting and the MEAH, three cancer centers in Angers, Lille and Villejuif worked together on the implantation of experience feed back committees (CREx) dedicated to the registration, analysis and correction of precursor events. After two years, we report the centre Oscar-Lambret experience in Lille and try to get the recommendations for generalisation of the process. This seems now to be compulsory for security management in oncology.

  15. Critical Infrastructure: The National Asset Database

    DTIC Science & Technology

    2007-07-16

    Infrastructure: The National Asset Database 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e...upon which federal resources, including infrastructure protection grants , are allocated. According to DHS, both of those assumptions are wrong. DHS...assets that it has determined are critical to the nation. Also, while the National Asset Database has been used to support federal grant -making

  16. 76 FR 29147 - Federal Home Loan Bank Investments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-20

    ...-AA32 Federal Home Loan Bank Investments AGENCY: Federal Housing Finance Agency; Federal Housing Finance...-adopting existing investment regulations that apply to the Federal Home Loan Banks (Banks) and that were...' investment in mortgage-backed securities (MBS) and certain asset-backed securities (ABS) that were previously...

  17. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  18. School Security Assessment Programme in Australia

    ERIC Educational Resources Information Center

    Marrapodi, John

    2007-01-01

    This article describes a successful security risk management programme in Australia. The state-wide programme follows a structured risk management approach focusing on the safety and security of people, information, provision, and assets in the school environment. To assist school principals, a Security Risk Assessment Programme was developed on a…

  19. 25 CFR 243.12 - Are Alaska reindeer trust assets maintained by the U.S. Government for the benefit of Alaska...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Are Alaska reindeer trust assets maintained by the U.S. Government for the benefit of Alaska Natives? 243.12 Section 243.12 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FISH AND WILDLIFE REINDEER IN ALASKA § 243.12 Are Alaska reindeer trust assets maintained by the U.S. Government for the...

  20. Trends in asset structure between not-for-profit and investor-owned hospitals.

    PubMed

    Song, Paula H; Reiter, Kristin L

    2010-12-01

    The delivery of health care is a capital-intensive industry, and thus, hospital investment strategy continues to be an important area of interest for both health policy and research. Much attention has been given to hospitals' capital investment policies with relatively little attention to investments in financial assets, which serve an important role in not-for-profit (NFP) hospitals. This study describes and analyzes trends in aggregate asset structure between NFP and investor-owned (IO) hospitals during the post-capital-based prospective payment system implementation period, providing the first documentation of long-term trends in hospital investment. The authors find hospitals' aggregate asset structure differs significantly based on ownership, size, and profitability. For both NFP and IO hospitals, financial securities have remained consistent over time, while fixed asset representation has declined in IO hospitals.

  1. Trends in Asset Structure between Not-for-Profit and Investor Owned Hospitals

    PubMed Central

    Song, Paula H.; Reiter, Kristin L.

    2010-01-01

    The delivery of health care is a capital intensive industry and thus hospital investment strategy continues to be an important area of interest for both health policy and research. Much attention has been given to hospitals’ capital investment policies with relatively little attention to investments in financial assets, which serve an important role in NFP hospitals. This study describes and analyzes trends in aggregate asset structure between NFP and IO hospitals during the post-capital based PPS implementation period, providing the first documentation of long-term trends in hospital investment. We find hospitals’ aggregate asset structure differs significantly based on ownership, size, and profitability. For both NFP and IO hospitals, financial securities have remained consistent over time, while fixed asset representation has declined in IO hospitals. PMID:20519429

  2. 20 CFR 404.1084 - Gain or loss from disposition of property; capital assets; timber, coal, and iron ore...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...; capital assets; timber, coal, and iron ore; involuntary conversion. 404.1084 Section 404.1084 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950... from disposition of property; capital assets; timber, coal, and iron ore; involuntary conversion. (a...

  3. Development of Security Measures: Implementation Instructions for MIL-STD on Physical Security for DCS Facilities.

    DTIC Science & Technology

    1981-07-01

    security measures to in- crease the survivability of these assets. However, sabotage, terrorism and vandalism continue to be serious threats to DCS and its...Closed circuit television. e. Comunication cables. f. Fuel storage. g. Fuel lines. h. Air conditioning. The primary benefits of security measures

  4. Security Science as an Applied Science?

    ERIC Educational Resources Information Center

    Smith, Clifton

    2001-01-01

    Describes the development of a security science degree as the emerging applied science of the protection of individuals and assets. Proposes the themes of physical, electronic, information security and facility management as scientific applications for the course. (Author/MM)

  5. Occupational back disability in U.S. Army personnel.

    PubMed

    Berkowitz, S M; Feuerstein, M; Lopez, M S; Peck, C A

    1999-06-01

    Musculoskeletal disorders represent a prevalent source of outpatient visits, lost work time, hospitalization, and disability in the military. Recent research has identified patterns among military occupations, gender, and musculoskeletal disability. Although back disorders accounted for a high percentage of all cases, little is known about the relationship between job type and disability in soldiers. The present study analyzed 41,750 disability cases to determine (1) prevalence of work-related back disability diagnoses, (2) specific jobs associated with greater risk of back disability, and (3) association among gender, job type, and disability. The results indicate that (1) lumbosacral strain and intervertebral disc syndrome represent the most prevalent diagnoses for back disability, (2) certain occupations were associated with higher back disability risk, and (3) specific jobs were identified in which females experienced higher rates of back disability than males. The nature of these high-risk jobs, and recent research on work disability factors in U.S. Army soldiers, suggest that a combination of ergonomic and individual/organizational psychosocial factors may play a role in the development, exacerbation, and maintenance of work disability. Future research that identifies specific job factors contributing to increased back disability risk should assist in the development of empirically based work site prevention programs to improve musculoskeletal health and readiness.

  6. Security systems engineering overview

    NASA Astrophysics Data System (ADS)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  7. 17 CFR 229.1119 - (Item 1119) Affiliations and certain relationships and related transactions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... certain relationships and related transactions. 229.1119 Section 229.1119 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF... Asset-Backed Securities (Regulation AB) § 229.1119 (Item 1119) Affiliations and certain relationships...

  8. 17 CFR 229.1119 - (Item 1119) Affiliations and certain relationships and related transactions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... certain relationships and related transactions. 229.1119 Section 229.1119 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF... Asset-Backed Securities (Regulation AB) § 229.1119 (Item 1119) Affiliations and certain relationships...

  9. 17 CFR 229.1119 - (Item 1119) Affiliations and certain relationships and related transactions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... certain relationships and related transactions. 229.1119 Section 229.1119 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF... Asset-Backed Securities (Regulation AB) § 229.1119 (Item 1119) Affiliations and certain relationships...

  10. 17 CFR 229.1119 - (Item 1119) Affiliations and certain relationships and related transactions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... certain relationships and related transactions. 229.1119 Section 229.1119 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF... Asset-Backed Securities (Regulation AB) § 229.1119 (Item 1119) Affiliations and certain relationships...

  11. 17 CFR 229.1119 - (Item 1119) Affiliations and certain relationships and related transactions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... certain relationships and related transactions. 229.1119 Section 229.1119 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF... Asset-Backed Securities (Regulation AB) § 229.1119 (Item 1119) Affiliations and certain relationships...

  12. 26 CFR 1.165-5 - Worthless securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 26 Internal Revenue 2 2014-04-01 2014-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...

  13. 26 CFR 1.165-5 - Worthless securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...

  14. 26 CFR 1.165-5 - Worthless securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 26 Internal Revenue 2 2011-04-01 2011-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...

  15. 26 CFR 1.165-5 - Worthless securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 26 Internal Revenue 2 2013-04-01 2013-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...

  16. The myth of secure computing.

    PubMed

    Austin, Robert D; Darby, Christopher A

    2003-06-01

    Few senior executives pay a whole lot of attention to computer security. They either hand off responsibility to their technical people or bring in consultants. But given the stakes involved, an arm's-length approach is extremely unwise. According to industry estimates, security breaches affect 90% of all businesses every year and cost some $17 billion. Fortunately, the authors say, senior executives don't need to learn about the more arcane aspects of their company's IT systems in order to take a hands-on approach. Instead, they should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that those assets will be compromised, and then tailor a set of risk abatement processes to their company's particular vulnerabilities. This approach, which views computer security as an operational rather than a technical challenge, is akin to a classic quality assurance program in that it attempts to avoid problems rather than fix them and involves all employees, not just IT staffers. The goal is not to make computer systems completely secure--that's impossible--but to reduce the business risk to an acceptable level. This article looks at the types of threats a company is apt to face. It also examines the processes a general manager should spearhead to lessen the likelihood of a successful attack. The authors recommend eight processes in all, ranging from deciding how much protection each digital asset deserves to insisting on secure software to rehearsing a response to a security breach. The important thing to realize, they emphasize, is that decisions about digital security are not much different from other cost-benefit decisions. The tools general managers bring to bear on other areas of the business are good models for what they need to do in this technical space.

  17. What the 2008 stock market crash means for retirement security.

    PubMed

    Butrica, Barbara A; Smith, Karen E; Toder, Eric J

    2010-10-01

    The 2008 stock market crash raises concerns about retirement security, especially since the increased prevalence of 401(k) and similar retirement saving plans means that more Americans are now stakeholders in the equity market than in the past. Using a dynamic microsimulation model, this paper explores the ability of alternate future stock market scenarios to restore retirement assets. The authors find that those near retirement could fare the worst because they have no time to recoup their losses. Mid-career workers could fare better because they have more time to rebuild their wealth. They may even gain income if they buy stocks at low prices and get above-average rates of return. High-income groups will be the most affected because they are most likely to have financial assets and to be invested in the stock market.

  18. 78 FR 58376 - American Asset Development, Inc., aVinci Media Corp., Ceragenix Pharmaceuticals, Inc., Marshall...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-23

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Asset Development, Inc., aVinci Media..., and Millenium Holding Group, Inc., Order of Suspension of Trading September 19, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information...

  19. Portable appliance security apparatus

    NASA Technical Reports Server (NTRS)

    Kerley, J. J. (Inventor)

    1981-01-01

    An apparatus for securing a small computer, or other portable appliance, against theft is described. It is comprised of a case having an open back through which the computer is installed or removed. Guide members in the form of slots are formed in a rear portion of opposite walls of the case for receiving a back plate to cover the opening and thereby secure the computer within the case. An opening formed in the top wall of the case exposes the keyboard and display of the computer. The back plate is locked in the closed position by a key-operated plug type lock. The lock is attached to one end of a hold down cable, the opposite end thereof being secured to a desk top or other stationary object. Thus, the lock simultaneously secures the back plate to the case and retains the case to the stationary object.

  20. DOE Asset Revitalization: Sustainability and Waste Management Aspects - 12120

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robinson, Sharon M.

    2012-07-01

    In February 2011 Secretary of Energy Steven Chu established a Task Force on Asset Revitalization to facilitate a discussion among the Department of Energy (DOE), communities around DOE sites, non-profits, tribal governments, the private sector, and other stakeholders to identify reuse approaches as environmental cleanup efforts at DOE sites reach completion. The Task Force was charged with exploring opportunities to reuse DOE site assets for beneficial purposes and making recommendations to the Under Secretaries of Energy, Science, and Nuclear Security on the formation of an Asset Revitalization Initiative (ARI). The ARI is a Department-wide effort to advance the beneficial reusemore » of the DOE's unique and diverse mix of assets including land, facilities, infrastructure, equipment, technologies, natural resources, and a highly skilled workforce. The ARI will encourage collaboration between the public and private sectors in order to achieve energy and environmental goals as well as to stimulate and diversify regional economies. The recommendations of the ARI Task Force are summarized below, focusing on the sustainability and waste management aspects. DOE's ongoing completion of cleanup efforts and modernization efforts is creating opportunities to transition under-used or excess assets to future beneficial use. The FY 2011 DOE ARI Task Force determined that DOE's assets could be reused for beneficial purposes such as clean energy production, industrial manufacturing, recreational and conversation use, and other economic development initiatives. Asset revitalization has the potential to both help achieve DOE's energy and environmental goals and diversify regional economies where the sites are located, including providing the support needed to implement large-scale projects that achieve green sustainability goals. Asset revitalization efforts could be accelerated by effectively incorporating future use plans into environmental management and remediation efforts

  1. 26 CFR 1.168(i)-0 - Table of contents for the general asset account rules.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...) Assets generating foreign source income. (1) In general. (2) Source of ordinary income, gain, or loss. (i... foreign source income, gain, or loss. (3) Section 904(d) separate categories. (g) Assets subject to... of disposed or converted asset. (j) Effect of adjustments on prior dispositions. (k) Election. (1...

  2. 26 CFR 1.168(i)-0 - Table of contents for the general asset account rules.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...) Assets generating foreign source income. (1) In general. (2) Source of ordinary income, gain, or loss. (i... foreign source income, gain, or loss. (3) Section 904(d) separate categories. (g) Assets subject to... of disposed or converted asset. (j) Effect of adjustments on prior dispositions. (k) Election. (1...

  3. The shift from defined benefit pensions to 401(k) plans and the pension assets of the baby boom cohort

    PubMed Central

    Poterba, James; Venti, Steven; Wise, David A.

    2007-01-01

    The rise of 401(k) plans and the decline of defined benefit plans will have an important effect on the wealth of future retirees. Changing demographic structure also will affect the aggregate stock of retirement wealth. We project the stock of assets held in retirement plans and the average retirement saving of retirees through 2040. Our projections show large increases in wealth at retirement, especially if the returns on corporate equities are comparable with historical returns. Retirement wealth will grow, however, even if equity returns fall substantially below their historical level. PMID:17686989

  4. 75 FR 76079 - Purchase of Branch Office(s) and/or Transfer of Assets/Liabilities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-07

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Purchase of Branch Office(s) and/or Transfer of Assets/ Liabilities AGENCY: Office of Thrift Supervision (OTS), Treasury. ACTION: Notice and... Supervision, 1700 G Street, NW., Washington, DC 20552, by fax to (202) 906-6518, or by e-mail to...

  5. Solar Asset Management Software

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Iverson, Aaron; Zviagin, George

    Ra Power Management (RPM) has developed a cloud based software platform that manages the financial and operational functions of third party financed solar projects throughout their lifecycle. RPM’s software streamlines and automates the sales, financing, and management of a portfolio of solar assets. The software helps solar developers automate the most difficult aspects of asset management, leading to increased transparency, efficiency, and reduction in human error. More importantly, our platform will help developers save money by improving their operating margins.

  6. America Promises to Come Back: Our New National Security Strategy

    DTIC Science & Technology

    1991-10-23

    Captain Larry Seaquist, U.S. Navy, Office of the Principal Deputy Under Secretary of Defense (Strategy and Resources); Vice Admiral James Service...to be primarily based on U.S. forces in being. Under the new national security strategy, deterrence of the Soviet threat will largely be based upon a...Cheney’s IISS remarks were followed by I. Lewis "Scooter" Libby, Principal Deputy Under Secretary of Defense (Strategy and Resources), who provided

  7. Toward an Integrated Executable Architecture and M&S Based Analysis for Counter Terrorism and Homeland Security

    DTIC Science & Technology

    2006-09-01

    Lavoie, D. Kurts, SYNTHETIC ENVIRONMENTS AT THE ENTREPRISE LEVEL: OVERVIEW OF A GOVERNMENT OF CANADA (GOC), ACADEMIA and INDUSTRY DISTRIBUTED...vehicle (UAV) focused to locate the radiological source, and by comparing the performance of these assets in terms of various capability based...framework to analyze homeland security capabilities • Illustrate how a rapidly configured distributed simulation involving academia, industry and

  8. Security Personnel Practices and Policies in U.S. Hospitals: Findings From a National Survey.

    PubMed

    Schoenfisch, Ashley L; Pompeii, Lisa A

    2016-06-27

    Concerns of violence in hospitals warrant examination of current hospital security practices. Cross-sectional survey data were collected from members of a health care security and safety association to examine the type of personnel serving as security in hospitals, their policies and practices related to training and weapon/restraint tool carrying/use, and the broader context in which security personnel work to maintain staff and patient safety, with an emphasis on workplace violence prevention and mitigation. Data pertaining to 340 hospitals suggest security personnel were typically non-sworn officers directly employed (72%) by hospitals. Available tools included handcuffs (96%), batons (56%), oleoresin capsicum products (e.g., pepper spray; 52%), hand guns (52%), conducted electrical weapons (e.g., TASERs®; 47%), and K9 units (12%). Current workplace violence prevention policy components, as well as recommendations to improve hospital security practices, aligned with Occupational Safety and Health Administration guidelines. Comprehensive efforts to address the safety and effectiveness of hospital security personnel should consider security personnel's relationships with other hospital work groups and hospitals' focus on patients' safety and satisfaction. © 2016 The Author(s).

  9. A Pilot Study Using an Online, Experimental, Two-Asset Market.

    ERIC Educational Resources Information Center

    Lypny, Gregory

    2003-01-01

    Describes an online, securities market, research tool, called Borsa, to engage students in the exploration of asset pricing in microeconomics courses. Defines Borsa as related database files served on the Internet using a dedicated IP address. Discusses practical considerations in running the market. Offers questions that arise from using the…

  10. 12 CFR 615.5131 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... AND OPERATIONS, AND FUNDING OPERATIONS Investment Management § 615.5131 Definitions. For purposes of this subpart, the following definitions apply: (a) Asset-backed securities (ABS) mean investment... possessing general powers of taxation, including property taxation. (e) Liquid investments are assets that...

  11. 26 CFR 1.168(i)-1 - General asset accounts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... under paragraph (k) of this section. (b) Definitions. For purposes of this section, the following.... If a taxpayer makes the election under paragraph (k) of this section, assets that are subject to the... the Code that treat gain on a disposition as subject to section 1245 or 1250). (iii) Effect of...

  12. 26 CFR 1.168(i)-1 - General asset accounts.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... under paragraph (k) of this section. (b) Definitions. For purposes of this section, the following.... If a taxpayer makes the election under paragraph (k) of this section, assets that are subject to the... the Code that treat gain on a disposition as subject to section 1245 or 1250). (iii) Effect of...

  13. Computer Security Models

    DTIC Science & Technology

    1984-09-01

    Verification Technique for a Class of Security Kernels," International Symposium on Programming , Lecture Notes in Computer Science 137, Springer-Verlag, New York...September 1984 MTR9S31 " J. K. Millen Computer Security C. M. Cerniglia Models * 0 Ne c - ¢- C. S• ~CONTRACT SPONSOR OUSDRE/C31 & ESO/ALEE...ABSTRACT The purpose of this report is to provide a basis for evaluating security models in the context of secure computer system development

  14. Secure, Autonomous, Intelligent Controller for Integrating Distributed Sensor Webs

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2007-01-01

    This paper describes the infrastructure and protocols necessary to enable near-real-time commanding, access to space-based assets, and the secure interoperation between sensor webs owned and controlled by various entities. Select terrestrial and aeronautics-base sensor webs will be used to demonstrate time-critical interoperability between integrated, intelligent sensor webs both terrestrial and between terrestrial and space-based assets. For this work, a Secure, Autonomous, Intelligent Controller and knowledge generation unit is implemented using Virtual Mission Operation Center technology.

  15. Space assets, technology and services in support of energy policy

    NASA Astrophysics Data System (ADS)

    Vasko, C. A.; Adriaensen, M.; Bretel, A.; Duvaux-Bechon, I.; Giannopapa, C. G.

    2017-09-01

    Space can be used as a tool by decision and policy makers in developing, implementing and monitoring various policy areas including resource management, environment, transport, security and energy. This paper focuses on the role of space for the energy policy. Firstly, the paper summarizes the European Union's (EU) main objectives in energy policy enclosed in the Energy Strategy 2020-2030-2050 and demonstrates how space assets can contribute to achieving those objectives. Secondly, the paper addresses how the European Space Agency (ESA) has established multiple initiatives and programs that directly finance the development of space assets, technology and applications that deliver services in support of the EU energy policy and sector. These efforts should be continued and strengthened in order to overcome identified technological challenges. The use of space assets, technology and applications, can help achieve the energy policy objectives for the next decades.

  16. Critical asset and portfolio risk analysis: an all-hazards framework.

    PubMed

    Ayyub, Bilal M; McGill, William L; Kaminskiy, Mark

    2007-08-01

    This article develops a quantitative all-hazards framework for critical asset and portfolio risk analysis (CAPRA) that considers both natural and human-caused hazards. Following a discussion on the nature of security threats, the need for actionable risk assessments, and the distinction between asset and portfolio-level analysis, a general formula for all-hazards risk analysis is obtained that resembles the traditional model based on the notional product of consequence, vulnerability, and threat, though with clear meanings assigned to each parameter. Furthermore, a simple portfolio consequence model is presented that yields first-order estimates of interdependency effects following a successful attack on an asset. Moreover, depending on the needs of the decisions being made and available analytical resources, values for the parameters in this model can be obtained at a high level or through detailed systems analysis. Several illustrative examples of the CAPRA methodology are provided.

  17. Cross sections for the reactions e + e - → K S 0 K L 0 π 0 , K S 0 K L 0 η , and K S 0 K L 0 π 0 π 0 from events with initial-state radiation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lees, J. P.; Poireau, V.; Tisserand, V.

    Here, we study the processes e + e - → Kmore » $$0\\atop{S}$$ K$$0\\atop{L}$$ π 0 γ , K $$0\\atop{S}$$ K$$0\\atop{L}$$ η γ , and K$$0\\atop{S}$$ K$$0\\atop{L}$$ π 0 π 0 γ , where the photon is radiated from the initial state, providing cross section measurements for the hadronic final states over a continuum of center-of-mass energies. The results are based on 469 fb -1 of data collected at or near the Υ ( 4 S ) resonance with the BABAR detector at SLAC. We present the first measurements of the e + e - → K$$0\\atop{S}$$ K$$0\\atop{L}$$ π 0 , K$$0\\atop{S}$$ K$$0\\atop{L}$$ η , and K$$0\\atop{S}$$ K$$0\\atop{L}$$ π 0π 0 cross sections up to a center-of-mass energy of 4 GeV and study their intermediate resonance structures. We observe J / ψ decays to all of these final states for the first time, present measurements of their J / ψ branching fractions, and search for ψ (2S) decays.« less

  18. Cross sections for the reactions e + e - → K S 0 K L 0 π 0 , K S 0 K L 0 η , and K S 0 K L 0 π 0 π 0 from events with initial-state radiation

    DOE PAGES

    Lees, J. P.; Poireau, V.; Tisserand, V.; ...

    2017-03-06

    Here, we study the processes e + e - → Kmore » $$0\\atop{S}$$ K$$0\\atop{L}$$ π 0 γ , K $$0\\atop{S}$$ K$$0\\atop{L}$$ η γ , and K$$0\\atop{S}$$ K$$0\\atop{L}$$ π 0 π 0 γ , where the photon is radiated from the initial state, providing cross section measurements for the hadronic final states over a continuum of center-of-mass energies. The results are based on 469 fb -1 of data collected at or near the Υ ( 4 S ) resonance with the BABAR detector at SLAC. We present the first measurements of the e + e - → K$$0\\atop{S}$$ K$$0\\atop{L}$$ π 0 , K$$0\\atop{S}$$ K$$0\\atop{L}$$ η , and K$$0\\atop{S}$$ K$$0\\atop{L}$$ π 0π 0 cross sections up to a center-of-mass energy of 4 GeV and study their intermediate resonance structures. We observe J / ψ decays to all of these final states for the first time, present measurements of their J / ψ branching fractions, and search for ψ (2S) decays.« less

  19. Study of Bc→ψ (2 S )K , ηc(2 S )K , ψ (3770 )K decays with perturbative QCD approach

    NASA Astrophysics Data System (ADS)

    Duan, Feng-Bo; Yu, Xian-Qiao

    2018-05-01

    We study the Bc→ψ (2 S ) K , ηc(2 S ) K , ψ (3770 ) K decays with perturbative QCD approach based on kT factorization. The new orbitally excited charmonium distribution amplitudes ψ (1 3D1) based on the Schrödinger wave function of the n =1 , l =2 state for the harmonic-oscillator potential are employed. By using the corresponding distribution amplitudes, we calculate the branching ratio of Bc→ψ (2 S ) K , ηc(2 S ) K , ψ (3770 ) K decays and the form factors A0 ,1 ,2 and V for the transition Bc→ψ (1 3D1) . We obtain the branching ratio of both Bc→ψ (2 S ) K and Bc→ηc(2 S ) K are at the order of 10-5. The effects of two sets of the S-D mixing angle θ =-1 2 ° and θ =2 7 ° for the decay Bc→ψ (3770 ) K are studied first in this paper. Our calculations show that the branching ratio of the decay Bc→ψ (3770 ) K can be raised from the order of 10-6 to the order of 10-5 at the mixing angle θ =-1 2 ° , which can be tested by the running LHC-b experiments.

  20. The national strategy for the physical protection of critical infrastructures and key assets

    DOT National Transportation Integrated Search

    2003-02-01

    This document defines the road ahead for a core mission area identified in the President's National Strategy for Homeland Security-reducing the Nation's vulnerability to acts of terrorism by protecting our critical infrastructures and key assets from...

  1. Immunohistochemical analysis of S6K1 and S6K2 localization in human breast tumors.

    PubMed

    Filonenko, Valeriy V; Tytarenko, Ruslana; Azatjan, Sergey K; Savinska, Lilya O; Gaydar, Yuriy A; Gout, Ivan T; Usenko, Vasiliy S; Lyzogubov, Valeriy V

    2004-12-01

    To perform an immunohistochemical analysis of human breast adenomas and adenocarcinomas as well as normal breast tissues in respect of S6 ribosomal protein kinase (S6K) expression and localization in normal and transformed cells. The expression level and localization of S6K have been detected in formalin fixed, paraffin embedded sections of normal human breast tissues, adenomas and adenocarcinomas with different grade of differentiation. Immunohistochemical detection of S6K1 and S6K2 in normal human breast tissues and breast tumors were performed using specific monoclonal and polyclonal antibodies against S6K1 and S6K2 with following semiquantitative analysis. The increase of S6K content in the cytoplasm of epithelial cells in benign and malignant tumors has been detected. Nuclear accumulation of S6K1 and to a greater extend S6K2 have been found in breast adenocarcinomas. About 80% of breast adenocarcinomas cases revealed S6K2 nuclear staining comparing to normal tissues. In 31% of cases more then 50% of cancer cells had strong nuclear staining. Accumulation of S6K1 in the nucleus of neoplastic cells has been demonstrated in 25% of cases. Nuclear localization of S6K in the epithelial cells in normal breast tissues has not been detected. Immunohistochemical analysis of S6K1 and S6K2 expression in normal human breast tissues, benign and malignant breast tumors clearly indicates that both kinases are overexpressed in breast tumors. Semiquantitative analysis of peculiarities of S6K localization in normal tissues and tumors revealed that nucleoplasmic accumulation of S6K (especially S6K2) is a distinguishing feature of cancer cells.

  2. 12 CFR 704.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    .... Adjusted trading means any method or transaction whereby a corporate credit union sells a security to a... securities, asset-backed securities, or corporate obligations in the form of loans or debt. Senior tranches... repurchase transaction means an integrated transaction in which a corporate credit union purchases a security...

  3. Study of Damped Set-Back Pins for S and A Mechanisms.

    DTIC Science & Technology

    1976-11-01

    arm device for artillery munitions. This damped set-back pin assembly is one of two safety features on a S and A device used in the M739 PD/XM587 ET...The damped set-back pin study program was for the design, testing, fabrication, and delivery and damped set-back pin assemblies for use in a safe and...fuzes for a rotating projectile. A pin, porous disc, return spring, floating O-ring, and sleeve comprise the selected damped set-back pin assembly

  4. Security systems engineering overview

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Steele, B.J.

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, andmore » counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).« less

  5. 12 CFR 704.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    .... Adjusted trading means any method or transaction whereby a corporate credit union sells a security to a... securities, asset-backed securities, or corporate obligations in the form of loans or debt. Senior tranches... repurchase the same security at a specified time in the future. The corporate credit union then sells that...

  6. New long-zoom lens for 4K super 35mm digital cameras

    NASA Astrophysics Data System (ADS)

    Thorpe, Laurence J.; Usui, Fumiaki; Kamata, Ryuhei

    2015-05-01

    The world of television production is beginning to adopt 4K Super 35 mm (S35) image capture for a widening range of program genres that seek both the unique imaging properties of that large image format and the protection of their program assets in a world anticipating future 4K services. Documentary and natural history production in particular are transitioning to this form of production. The nature of their shooting demands long zoom lenses. In their traditional world of 2/3-inch digital HDTV cameras they have a broad choice in portable lenses - with zoom ranges as high as 40:1. In the world of Super 35mm the longest zoom lens is limited to 12:1 offering a telephoto of 400mm. Canon was requested to consider a significantly longer focal range lens while severely curtailing its size and weight. Extensive computer simulation explored countless combinations of optical and optomechanical systems in a quest to ensure that all operational requests and full 4K performance could be met. The final lens design is anticipated to have applications beyond entertainment production, including a variety of security systems.

  7. Teaching Communication: Back to the 60s

    ERIC Educational Resources Information Center

    Palmer, Adrian

    2012-01-01

    This piece, a preface to a reprinted 1971 article on communication practice, focuses on the need for real communication in the language classroom. In this article, the author drifts back to inspiring times in the 1960s and reflects on some events that prompted him to write the article in the first place.

  8. 17 CFR 229.701 - (Item 701) Recent sales of unregistered securities; use of proceeds from registered securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 701) Recent sales of unregistered securities; use of proceeds from registered securities. 229.701 Section 229.701 Commodity and...-REGULATION S-K Miscellaneous § 229.701 (Item 701) Recent sales of unregistered securities; use of proceeds...

  9. 17 CFR 229.701 - (Item 701) Recent sales of unregistered securities; use of proceeds from registered securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false (Item 701) Recent sales of unregistered securities; use of proceeds from registered securities. 229.701 Section 229.701 Commodity and...-REGULATION S-K Miscellaneous § 229.701 (Item 701) Recent sales of unregistered securities; use of proceeds...

  10. 17 CFR 229.701 - (Item 701) Recent sales of unregistered securities; use of proceeds from registered securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 701) Recent sales of unregistered securities; use of proceeds from registered securities. 229.701 Section 229.701 Commodity and...-REGULATION S-K Miscellaneous § 229.701 (Item 701) Recent sales of unregistered securities; use of proceeds...

  11. 17 CFR 229.701 - (Item 701) Recent sales of unregistered securities; use of proceeds from registered securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 701) Recent sales of unregistered securities; use of proceeds from registered securities. 229.701 Section 229.701 Commodity and...-REGULATION S-K Miscellaneous § 229.701 (Item 701) Recent sales of unregistered securities; use of proceeds...

  12. 17 CFR 229.701 - (Item 701) Recent sales of unregistered securities; use of proceeds from registered securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false (Item 701) Recent sales of unregistered securities; use of proceeds from registered securities. 229.701 Section 229.701 Commodity and...-REGULATION S-K Miscellaneous § 229.701 (Item 701) Recent sales of unregistered securities; use of proceeds...

  13. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    DTIC Science & Technology

    2009-07-30

    Pakistan: Sabotage of a Spent Fuel Cask or a Commercial Irradiation Source in Transport ,” in Pakistan’s Nuclear Future, 2008; Martellini, 2008. 79...that Pakistan’s strategic nuclear assets could be obtained by terrorists, or used by elements in the Pakistani government. Chair of the Joint Chiefs...that gave additional urgency to the program. Pakistan produced fissile material for its nuclear weapons using gas-centrifuge-based uranium

  14. Examining the Relationship between Organization Systems and Information Security Awareness

    ERIC Educational Resources Information Center

    Tintamusik, Yanarong

    2010-01-01

    The focus of this dissertation was to examine the crucial relationship between organization systems within the framework of the organizational behavior theory and information security awareness (ISA) of users within the framework of the information security theory. Despite advanced security technologies designed to protect information assets,…

  15. 49 CFR 1520.5 - Sensitive security information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...

  16. 49 CFR 1520.5 - Sensitive security information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...

  17. 49 CFR 1520.5 - Sensitive security information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...

  18. 49 CFR 1520.5 - Sensitive security information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...

  19. Measuring the Level of Security in the K-12 IT Environment in Southern California

    ERIC Educational Resources Information Center

    Brown, Brandon R.

    2016-01-01

    Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…

  20. Bahrain: Reform, Security, and U.S. Policy

    DTIC Science & Technology

    2017-09-29

    responsibility for bombings and other attacks primarily against security officials. The Bahrain government’s use of repression against the dissent...activity of violent, underground groups that, among their tactics, detonate bombs and improvised explosive devices (IEDs) against security forces. These...issued its first public statement in April 2013 and has since claimed responsibility for about 20 bombings against security personnel, including one

  1. Relative Pricing of Publicly Traded U.S. Electric Utility Companies

    NASA Astrophysics Data System (ADS)

    Jewczyn, Nicholas Stephen

    In the financial turmoil of 2008, U.S. firms reported debt-ratios that differed from the debt-ratios calculated from balance sheets. The problem is that investors bought common stock expecting initial investment return and lost money when companies delisted. The purpose of this quantitative study was to determine sample securities pricing with the application of synthetic assets and debt accrued. Addressed in the research questions was whether those securities were (a) underpriced compared with return-on-assets (ROA), (b) overpriced compared with ROA, (c) a debt-ratio higher than 60% and also overpriced, (d) underpriced with a synthetic asset added, or (e) related by relative pricing to variant pricing and market capitalization. The study's base theory was Pan's efficient market hypothesis (EMH) of security price prediction of market prices versus model prices. The data from the financial statements of 16 publicly traded U.S. electric utility companies were analyzed via correlations and multiple regression analyses to determine securities pricing and suitability. The findings from the analyses of the sample's variables of market price, book value, market-to-book, and study constructed variables from those variable data were statistically significant. The alternate hypotheses were accepted for all 5 research questions since the analytical operationalization of the hypothetical constructs led to significant relationships. Results suggest that the use of more pricing determinants in securities evaluation may lead to investors losing less money and earning the expected returns for a more efficient capital market, leading to a stronger economy and macroeconomic stability.

  2. A Security Audit Framework to Manage Information System Security

    NASA Astrophysics Data System (ADS)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  3. 17 CFR 229.1108 - (Item 1108) Servicers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... charged for such advances and terms of recovery by the servicer of such advances. To the extent material...) State how long the servicer has been servicing assets. Provide, to the extent material, a general... material terms of the servicing agreement and the servicer's duties regarding the asset-backed securities...

  4. 17 CFR 229.1108 - (Item 1108) Servicers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... charged for such advances and terms of recovery by the servicer of such advances. To the extent material...) State how long the servicer has been servicing assets. Provide, to the extent material, a general... material terms of the servicing agreement and the servicer's duties regarding the asset-backed securities...

  5. 17 CFR 229.1108 - (Item 1108) Servicers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... charged for such advances and terms of recovery by the servicer of such advances. To the extent material...) State how long the servicer has been servicing assets. Provide, to the extent material, a general... material terms of the servicing agreement and the servicer's duties regarding the asset-backed securities...

  6. 17 CFR 229.1108 - (Item 1108) Servicers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... charged for such advances and terms of recovery by the servicer of such advances. To the extent material...) State how long the servicer has been servicing assets. Provide, to the extent material, a general... material terms of the servicing agreement and the servicer's duties regarding the asset-backed securities...

  7. 17 CFR 229.1101 - (Item 1101) Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... information regarding the asset-backed securities being offered and the structure and basic parameters of the..., anticipated ratings, and other similar information relating to the proposed structure of the offering); (2... flows of a discrete pool of receivables or other financial assets, either fixed or revolving, that by...

  8. 17 CFR 229.1101 - (Item 1101) Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... information regarding the asset-backed securities being offered and the structure and basic parameters of the..., anticipated ratings, and other similar information relating to the proposed structure of the offering); (2... flows of a discrete pool of receivables or other financial assets, either fixed or revolving, that by...

  9. 17 CFR 229.1101 - (Item 1101) Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... information regarding the asset-backed securities being offered and the structure and basic parameters of the..., anticipated ratings, and other similar information relating to the proposed structure of the offering); (2... flows of a discrete pool of receivables or other financial assets, either fixed or revolving, that by...

  10. 17 CFR 229.1101 - (Item 1101) Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... information regarding the asset-backed securities being offered and the structure and basic parameters of the..., anticipated ratings, and other similar information relating to the proposed structure of the offering); (2... flows of a discrete pool of receivables or other financial assets, either fixed or revolving, that by...

  11. Using RFID to Enhance Security in Off-Site Data Storage

    PubMed Central

    Lopez-Carmona, Miguel A.; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R.

    2010-01-01

    Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention. PMID:22163638

  12. Current management of pregnancy-related low back pain: a national cross-sectional survey of U.K. physiotherapists.

    PubMed

    Bishop, A; Holden, M A; Ogollah, R O; Foster, N E

    2016-03-01

    Pregnancy-related low back pain (LBP) is very common. Evidence from a systematic review supports the use of exercise and acupuncture, although little is known about the care received by women with pregnancy-related back pain in the U.K. To describe current acupuncture and standard care management of pregnancy-related LBP by U.K. physiotherapists. Cross-sectional survey of physiotherapists with experience of treating women with pregnancy-related LBP from three professional networks of the Chartered Society of Physiotherapy. In total, 1093 physiotherapists were mailed a questionnaire. The questionnaire captured respondents' demographic and practice setting information, and experience of managing women with pregnancy-related back pain, and investigated the reported management of pregnancy-related LBP using a patient case vignette of a specific, 'typical' case. The overall response rate was 58% (629/1093). Four hundred and ninety-nine physiotherapists had experience of treating women with pregnancy-related LBP and were included in the analysis. Most respondents worked wholly or partly in the U.K. National Health Service (78%). Most respondents reported that they treat patients with pregnancy-related LBP in three to four one-to-one treatment sessions over 3 to 6 weeks. The results show that a range of management strategies are employed for pregnancy-related LBP, and multimodal management is common. The most common reported treatment was home exercises (94%), and 24% of physiotherapists reported that they would use acupuncture with the patient described in the vignette. This study provides the first robust data on the management of pregnancy-related LBP by U.K. physiotherapists. Multimodal management is common, although exercise is the most frequently used treatment for pregnancy-related LBP. Acupuncture is used less often for this patient group. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  13. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less

  14. 76 FR 13438 - AccessTel, Inc., American Asset Management Corp., DME Interactive Holdings, Inc., DocuPort, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-11

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AccessTel, Inc., American Asset Management Corp., DME Interactive Holdings, Inc., DocuPort, Inc., and iCarbon Corp., Order of Suspension of Trading March 8, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the...

  15. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...

  16. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...

  17. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...

  18. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...

  19. Relationship between stakeholders' information value perception and information security behaviour

    NASA Astrophysics Data System (ADS)

    Tajuddin, Sharul; Olphert, Wendy; Doherty, Neil

    2015-02-01

    The study, reported in this paper, aims to explore the relationship between the stakeholders' perceptions about the value of information and their resultant information security behaviours. Moreover, this study seeks to explore the role of national and organisational culture in facilitating information value assignment. Information Security is a concept that formed from the recognition that information is valuable and that there is a need to protect it. The ISO 27002 defines information as an asset, which, like other important business assets, is essential to an organisation's business and consequently needs to be appropriately protected. By definition, an asset has a value to the organisation hence it requires protection. Information protection is typically accomplished through the implementation of countermeasures against the threats and vulnerabilities of information security, for example, implementation of technological processes and mechanisms such as firewall and authorization and authentication systems, set-up of deterrence procedures such as password control and enforcement of organisational policy on information handling procedures. However, evidence routinely shows that despite such measures, information security breaches and incidents are on the rise. These breaches lead to loss of information, personal records, or other data, with consequent implications for the value of the information asset. A number of studies have suggested that such problems are not related primarily to technology problems or procedural deficiencies, but rather to stakeholders' poor compliance with the security measures that are in place. Research indicates that compliance behaviour is affected by many variables including perceived costs and benefits, national and organisational culture and norms. However, there has been little research to understand the concept of information value from the perspective of those who interact with the data, and the consequences for information

  20. Information Protection Engineering: Using Technology and Experience to Protect Assets

    DTIC Science & Technology

    2001-07-01

    SAIC’s highly experienced team has developed technology, techniques and expertise in protecting these information assets from electronic attack by...criminals, terrorists, hackers or nation states. INFORMATION PROTECTION ENGINEERING : Using Technology and Experience to Protect Assets William J. Marlow... Engineering : Using Technology and Experience to Protect Assets Contract or Grant Number Program Element Number Authors Marlow, William J. Project

  1. 75 FR 9262 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-01

    ... at the present time, and urged FINRA to study data collected on Asset-Backed Securities before making... to a recent rule change to the Rule 6700 Series,\\7\\ Agency Debt Securities and certain primary market... corporate debt securities;\\12\\ and \\12\\ See id. (14) In Rule 6700 Series, incorporate certain technical...

  2. 76 FR 20843 - Security Zone; Increase of Security Zones Under 33 CFR 165.1183 From 100 to 500 Yards; San...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-14

    .... SUMMARY: The Coast Guard will enforce a permanent increase in security zone size from 100 yards (91 meters) to 500 yards (457 meters) for tankers, cruise ships, and High Value Assets (HVAs) while underway on... Ports, Monterey Bay, and Humboldt Bay, CA, the security zone will decrease from 500 yards (457 meters...

  3. Evaluation of the Effect of Non-Current Fixed Assets on Profitability and Asset Management Efficiency

    ERIC Educational Resources Information Center

    Lubyanaya, Alexandra V.; Izmailov, Airat M.; Nikulina, Ekaterina Y.; Shaposhnikov, Vladislav A.

    2016-01-01

    The purpose of this article is to investigate the problem, which stems from non-current fixed assets affecting profitability and asset management efficiency. Tangible assets, intangible assets and financial assets are all included in non-current fixed assets. The aim of the research is to identify the impact of estimates and valuation in…

  4. Secure, Network-Centric Operations of a Space-Based Asset: Cisco Router in Low Earth Orbit (CLEO) and Virtual Mission Operations Center (VMOC)

    NASA Technical Reports Server (NTRS)

    Ivancic, William; Stewart, Dave; Shell, Dan; Wood, Lloyd; Paulsen, Phil; Jackson, Chris; Hodgson, Dave; Notham, James; Bean, Neville; Miller, Eric

    2005-01-01

    This report documents the design of network infrastructure to support operations demonstrating the concept of network-centric operations and command and control of space-based assets. These demonstrations showcase major elements of the Transformal Communication Architecture (TCA), using Internet Protocol (IP) technology. These demonstrations also rely on IP technology to perform the functions outlined in the Consultative Committee for Space Data Systems (CCSDS) Space Link Extension (SLE) document. A key element of these demonstrations was the ability to securely use networks and infrastructure owned and/or controlled by various parties. This is a sanitized technical report for public release. There is a companion report available to a limited audience. The companion report contains detailed networking addresses and other sensitive material and is available directly from William Ivancic at Glenn Research Center.

  5. China’s Energy Security: The Grand Hedging Strategy

    DTIC Science & Technology

    2010-05-01

    spotlight. The key to sustaining this dynamic economic growth is access to petroleum resources. The central question of this monograph is as follows...Is China’s energy security strategy liberal-institutionalist or realist-mercantilist? Using a qualitative case study methodology that explores the...dependent variable -- energy security -- using three independent variables (cost of supply, reliability of supply, and security of supply), China’s

  6. 12 CFR 167.12 - Purchased credit card relationships, servicing assets, intangible assets (other than purchased...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card...

  7. 12 CFR 167.12 - Purchased credit card relationships, servicing assets, intangible assets (other than purchased...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card...

  8. 12 CFR 567.12 - Purchased credit card relationships, servicing assets, intangible assets (other than purchased...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... credit card relationships, servicing assets, intangible assets (other than purchased credit card...

  9. 12 CFR 167.12 - Purchased credit card relationships, servicing assets, intangible assets (other than purchased...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card...

  10. 12 CFR 567.12 - Purchased credit card relationships, servicing assets, intangible assets (other than purchased...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... credit card relationships, servicing assets, intangible assets (other than purchased credit card...

  11. 12 CFR 567.12 - Purchased credit card relationships, servicing assets, intangible assets (other than purchased...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... credit card relationships, servicing assets, intangible assets (other than purchased credit card...

  12. Decision Model for U.S.- Mexico Border Security Measures

    DTIC Science & Technology

    2017-09-01

    and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION...FAA Federal Aviation Administration FAMS Federal Air Marshals Service FAST Free and Secure Trade GSA General Services Administration HIR Human

  13. 17 CFR 230.145 - Reclassification of securities, mergers, consolidations and acquisitions of assets.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Reclassification of securities... Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General... security in exchange for their existing security. Rule 145 embodies the Commission's determination that...

  14. 17 CFR 230.145 - Reclassification of securities, mergers, consolidations and acquisitions of assets.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Reclassification of securities... Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General... security in exchange for their existing security. Rule 145 embodies the Commission's determination that...

  15. 17 CFR 230.145 - Reclassification of securities, mergers, consolidations and acquisitions of assets.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Reclassification of securities... Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General... security in exchange for their existing security. Rule 145 embodies the Commission's determination that...

  16. 17 CFR 230.145 - Reclassification of securities, mergers, consolidations and acquisitions of assets.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Reclassification of securities... Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General... security in exchange for their existing security. Rule 145 embodies the Commission's determination that...

  17. 49 CFR 802.20 - Security records.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 7 2013-10-01 2013-10-01 false Security records. 802.20 Section 802.20... RULES IMPLEMENTING THE PRIVACY ACT OF 1974 Specific Exemptions § 802.20 Security records. Pursuant to, and limited by, 5 U.S.C. 552a(k)(5), the NTSB's system of records, which contains the Security Records...

  18. 49 CFR 802.20 - Security records.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 7 2012-10-01 2012-10-01 false Security records. 802.20 Section 802.20... RULES IMPLEMENTING THE PRIVACY ACT OF 1974 Specific Exemptions § 802.20 Security records. Pursuant to, and limited by, 5 U.S.C. 552a(k)(5), the NTSB's system of records, which contains the Security Records...

  19. 49 CFR 802.20 - Security records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Security records. 802.20 Section 802.20... RULES IMPLEMENTING THE PRIVACY ACT OF 1974 Specific Exemptions § 802.20 Security records. Pursuant to, and limited by, 5 U.S.C. 552a(k)(5), the NTSB's system of records, which contains the Security Records...

  20. 49 CFR 802.20 - Security records.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 7 2014-10-01 2014-10-01 false Security records. 802.20 Section 802.20... RULES IMPLEMENTING THE PRIVACY ACT OF 1974 Specific Exemptions § 802.20 Security records. Pursuant to, and limited by, 5 U.S.C. 552a(k)(5), the NTSB's system of records, which contains the Security Records...

  1. U.S. Pacific Command Theater Security Cooperation: A Building Block to Cooperative Security in the Asia Pacific Region

    DTIC Science & Technology

    2010-03-17

    the sole "superpower" and once again changed the international security paradigm. Finally, on September 11, 2001, a terrorist attack on the U.S. by...be employed in the near term in order to improve operations in today’s security environment. Cooperative security is intended to change how militruy...default. However, the changing world security environment has dictated that the U.S. avoids any actions that could be perceived as heavy-handed

  2. Preliminary Impacts of SECURe PreK on Child- and Classroom-Level Outcomes

    ERIC Educational Resources Information Center

    Jones, Stephanie M.; Kargman, Marie; Kargman, Max; Bailey, Rebecca

    2014-01-01

    This paper presents initial results from a pilot evaluation of the pre-K component of a new school-based intervention strategy (Social, Emotional, and Cognitive Understanding and Regulation in education, SECURe) for pre-kindergarten through 3rd grade that is designed to build skills in social-emotional learning (focusing on executive function and…

  3. 75 FR 28825 - Order Granting Temporary Conditional Exemption for Nationally Recognized Statistical Rating...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-24

    .... These conditions are designed to confine the exemption's application to credit ratings of structured... designed to suit the nature of the structured finance issuers. Many structured finance product issuers are... pool or as part of any asset-backed or mortgage-backed securities transaction (a ``structured finance...

  4. 12 CFR 223.56 - What transactions are exempt from the market-terms requirement of section 23B?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...-terms requirement of section 23B? 223.56 Section 223.56 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM (CONTINUED) TRANSACTIONS BETWEEN MEMBER BANKS...-backed commercial paper to a Federal Reserve Bank to secure financing from the asset-backed commercial...

  5. 12 CFR 950.8 - Banks as secured creditors.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Banks as secured creditors. 950.8 Section 950.8 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOME LOAN BANK ASSETS AND OFF-BALANCE SHEET ITEMS ADVANCES Advances to Out-of-District Members and Housing Associates § 950.8 Banks as secured...

  6. 12 CFR 950.8 - Banks as secured creditors.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Banks as secured creditors. 950.8 Section 950.8 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOME LOAN BANK ASSETS AND OFF-BALANCE SHEET ITEMS ADVANCES Advances to Members § 950.8 Banks as secured creditors. (a) Except as provided in...

  7. 26 CFR 1.1236-1 - Dealers in securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... exchange of a security (as defined in paragraph (c) of this section) shall not be considered as gain from the sale or exchange of a capital asset unless: (1) The security is, before the expiration of the... held for investment or, if acquired before October 20, 1951, was so identified before November 20, 1951...

  8. Theft of Virtual Property — Towards Security Requirements for Virtual Worlds

    NASA Astrophysics Data System (ADS)

    Beyer, Anja

    The article is focused to introduce the topic of information technology security for Virtual Worlds to a security experts’ audience. Virtual Worlds are Web 2.0 applications where the users cruise through the world with their individually shaped avatars to find either amusement, challenges or the next best business deal. People do invest a lot of time but beyond they invest in buying virtual assets like fantasy witcheries, wepaons, armour, houses, clothes,...etc with the power of real world money. Although it is called “virtual” (which is often put on the same level as “not existent”) there is a real value behind it. In November 2007 dutch police arrested a seventeen years old teenager who was suspicted to have stolen virtual items in a Virtual World called Habbo Hotel [Reuters07]. In order to successfully provide security mechanisms into Virtual Worlds it is necessarry to fully understand the domain for which the security mechansims are defined. As Virtual Worlds must be clasified into the domain of Social Software the article starts with an overview of how to understand Web 2.0 and gives a short introduction to Virtual Worlds. The article then provides a consideration of assets of Virtual Worlds participants, describes how these assets can be threatened and gives an overview of appopriate security requirements and completes with an outlook of possible countermeasures.

  9. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  10. ID201202961, DOE S-124,539, Information Security Analysis Using Game Theory and Simulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Schlicher, Bob G

    Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions aremore » always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.« less

  11. China’s Holdings of U.S. Securities: Implications for the U.S. Economy

    DTIC Science & Technology

    2008-05-19

    billion as of June 2007) and Macao ($2.0 billion). These entities , though part of China, are reported separately by Treasury. 11 In comparison, Japan’s...term U.S. Treasury securities (excluding nonmarketable Treasury bonds), as reported by banks, securities brokers and dealers, and other entities in the...Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

  12. 2008 Homeland Security S and T Stakeholders Conference West

    DTIC Science & Technology

    2008-01-16

    Untitled Document 2008hls.html[5/26/ 2016 8:25:16 AM] 2008 Homeland Security S&T Stakeholders Conference West “Putting First Responders First” Los...Sector Commander/Captain of the Port, U.S. Coast Guard Sector Los Angeles - Long Beach Mr. Mark Denari, Director, Aviation Security & Public Safety...Document 2008hls.html[5/26/ 2016 8:25:16 AM] Pre Conference Training Workshop Monday, 14 January 2008 Training Session 3:Better Security via Randomization

  13. The Interplay Between Parental Beliefs about Children’s Emotions and Parental Stress Impacts Children’s Attachment Security

    PubMed Central

    Stelter, Rebecca L.; Halberstadt, Amy G.

    2010-01-01

    This study investigated how parental beliefs about children’s emotions and parental stress relate to children’s feelings of security in the parent-child relationship. Models predicting direct effects of parental beliefs and parental stress, and moderating effects of parental stress on the relationship between parental beliefs and children’s feelings of security were tested. Participants were 85 African American, European American, and Lumbee American Indian 4th and 5th grade children and one of their parents. Children reported their feelings of security in the parent-child relationship; parents independently reported on their beliefs and their stress. Parental stress moderated relationships between three of the four parental beliefs about the value of children’s emotions and children’s attachment security. When parent stress was low, parental beliefs accepting and valuing children’s emotions were not related to children’s feelings of security; when parent stress was high, however, parental beliefs accepting and valuing children’s emotions were related to children’s feelings of security. These findings highlight the importance of examining parental beliefs and stress together for children’s attachment security. PMID:21731472

  14. Financial capability, asset ownership, and later-age immigration: evidence from a sample of low-income older Asian immigrants.

    PubMed

    Nam, Yunju; Lee, Eun Jeong; Huang, Jin; Kim, Junpyo

    2015-01-01

    We examined financial capability and asset ownership among low-income older Asian immigrants with special attention given to later-age immigrants who came to the United States when they were 55 years old or older. Survey data collected from supported employment program participants (N = 150) were used. The analyses demonstrated a low level of financial knowledge and asset ownership in the sample. The findings also indicated that later-age immigrants' financial-management skills, knowledge of social programs, and asset ownership were significantly lower than those of young-age immigrants. These findings call for active interventions to enhance economic security among low-income older Asian immigrants.

  15. 77 FR 74249 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-13

    ... System (``FINRA ADDS'') is a secure Web site that provides a firm, by market participant identifier... generates a separate report for each data archive (Asset-Backed Securities or Corporate/Agency Debt..., 2013. For the Commission, by the Division of Trading and Markets, pursuant to delegated authority.\\11...

  16. 76 FR 68084 - Procedures for the Handling of Retaliation Complaints Under Section 806 of the Sarbanes-Oxley Act...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-03

    ... dealers; (ii) insurance companies; (iii) corporate issuers; (iv) issuers of asset-backed securities (as... ``whistleblower'') claims under section 806 of the Corporate and Criminal Fraud Accountability Act of 2002, Title... Systems Security Act and the Federal Railroad Safety Act, 29 CFR part 1982; the Consumer Product Safety...

  17. Chemical Vapor Sensing with Monolayer MoS2

    DTIC Science & Technology

    2013-01-04

    show great potential for future nanoscale electronic devices. The high surface-to-volume ratio is a natural asset for applications such as chemical...For the devices in this study, 3 bulk sources of MoS2 were used. One piece was obtained from a colleague’s tribology research project (called the...devices were ~20 cm2/Vs. Although the conductance of our monolayer MoS2 devices can be increased significantly by application of a back gate

  18. A path integral approach to asset-liability management

    NASA Astrophysics Data System (ADS)

    Decamps, Marc; De Schepper, Ann; Goovaerts, Marc

    2006-05-01

    Functional integrals constitute a powerful tool in the investigation of financial models. In the recent econophysics literature, this technique was successfully used for the pricing of a number of derivative securities. In the present contribution, we introduce this approach to the field of asset-liability management. We work with a representation of cash flows by means of a two-dimensional delta-function perturbation, in the case of a Brownian model and a geometric Brownian model. We derive closed-form solutions for a finite horizon ALM policy. The results are numerically and graphically illustrated.

  19. Information Security Issues in Higher Education and Institutional Research

    ERIC Educational Resources Information Center

    Custer, William L.

    2010-01-01

    Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…

  20. First observation of B(s)(0) --> D(s)(+/-)K(-/+) and measurement of the ratio of branching fractions B(B(s)(0) --> D(s)(+/-)K(-/+)/B(B(s)(0) --> D(s)(+)pi(-)).

    PubMed

    Aaltonen, T; Adelman, J; Akimoto, T; Albrow, M G; Alvarez González, B; Amerio, S; Amidei, D; Anastassov, A; Annovi, A; Antos, J; Apollinari, G; Apresyan, A; Arisawa, T; Artikov, A; Ashmanskas, W; Attal, A; Aurisano, A; Azfar, F; Azzurri, P; Badgett, W; Barbaro-Galtieri, A; Barnes, V E; Barnett, B A; Bartsch, V; Bauer, G; Beauchemin, P-H; Bedeschi, F; Bednar, P; Beecher, D; Behari, S; Bellettini, G; Bellinger, J; Benjamin, D; Beretvas, A; Beringer, J; Bhatti, A; Binkley, M; Bisello, D; Bizjak, I; Blair, R E; Blocker, C; Blumenfeld, B; Bocci, A; Bodek, A; Boisvert, V; Bolla, G; Bortoletto, D; Boudreau, J; Boveia, A; Brau, B; Bridgeman, A; Brigliadori, L; Bromberg, C; Brubaker, E; Budagov, J; Budd, H S; Budd, S; Burkett, K; Busetto, G; Bussey, P; Buzatu, A; Byrum, K L; Cabrera, S; Calancha, C; Campanelli, M; Campbell, M; Canelli, F; Canepa, A; Carlsmith, D; Carosi, R; Carrillo, S; Carron, S; Casal, B; Casarsa, M; Castro, A; Catastini, P; Cauz, D; Cavaliere, V; Cavalli-Sforza, M; Cerri, A; Cerrito, L; Chang, S H; Chen, Y C; Chertok, M; Chiarelli, G; Chlachidze, G; Chlebana, F; Cho, K; Chokheli, D; Chou, J P; Choudalakis, G; Chuang, S H; Chung, K; Chung, W H; Chung, Y S; Ciobanu, C I; Ciocci, M A; Clark, A; Clark, D; Compostella, G; Convery, M E; Conway, J; Copic, K; Cordelli, M; Cortiana, G; Cox, D J; Crescioli, F; Cuenca Almenar, C; Cuevas, J; Culbertson, R; Cully, J C; Dagenhart, D; Datta, M; Davies, T; de Barbaro, P; De Cecco, S; Deisher, A; De Lorenzo, G; Dell'Orso, M; Deluca, C; Demortier, L; Deng, J; Deninno, M; Derwent, P F; di Giovanni, G P; Dionisi, C; Di Ruzza, B; Dittmann, J R; D'Onofrio, M; Donati, S; Dong, P; Donini, J; Dorigo, T; Dube, S; Efron, J; Elagin, A; Erbacher, R; Errede, D; Errede, S; Eusebi, R; Fang, H C; Farrington, S; Fedorko, W T; Feild, R G; Feindt, M; Fernandez, J P; Ferrazza, C; Field, R; Flanagan, G; Forrest, R; Franklin, M; Freeman, J C; Furic, I; Gallinaro, M; Galyardt, J; Garberson, F; Garcia, J E; Garfinkel, A F; Genser, K; Gerberich, H; Gerdes, D; Gessler, A; Giagu, S; Giakoumopoulou, V; Giannetti, P; Gibson, K; Gimmell, J L; Ginsburg, C M; Giokaris, N; Giordani, M; Giromini, P; Giunta, M; Giurgiu, G; Glagolev, V; Glenzinski, D; Gold, M; Goldschmidt, N; Golossanov, A; Gomez, G; Gomez-Ceballos, G; Goncharov, M; González, O; Gorelov, I; Goshaw, A T; Goulianos, K; Gresele, A; Grinstein, S; Grosso-Pilcher, C; Group, R C; Grundler, U; Guimaraes da Costa, J; Gunay-Unalan, Z; Haber, C; Hahn, K; Hahn, S R; Halkiadakis, E; Han, B-Y; Han, J Y; Handler, R; Happacher, F; Hara, K; Hare, D; Hare, M; Harper, S; Harr, R F; Harris, R M; Hartz, M; Hatakeyama, K; Hauser, J; Hays, C; Heck, M; Heijboer, A; Heinemann, B; Heinrich, J; Henderson, C; Herndon, M; Heuser, J; Hewamanage, S; Hidas, D; Hill, C S; Hirschbuehl, D; Hocker, A; Hou, S; Houlden, M; Hsu, S-C; Huffman, B T; Hughes, R E; Husemann, U; Huston, J; Incandela, J; Introzzi, G; Iori, M; Ivanov, A; James, E; Jayatilaka, B; Jeon, E J; Jha, M K; Jindariani, S; Johnson, W; Jones, M; Joo, K K; Jun, S Y; Jung, J E; Junk, T R; Kamon, T; Kar, D; Karchin, P E; Kato, Y; Kephart, R; Keung, J; Khotilovich, V; Kilminster, B; Kim, D H; Kim, H S; Kim, J E; Kim, M J; Kim, S B; Kim, S H; Kim, Y K; Kimura, N; Kirsch, L; Klimenko, S; Knuteson, B; Ko, B R; Koay, S A; Kondo, K; Kong, D J; Konigsberg, J; Korytov, A; Kotwal, A V; Kreps, M; Kroll, J; Krop, D; Krumnack, N; Kruse, M; Krutelyov, V; Kubo, T; Kuhr, T; Kulkarni, N P; Kurata, M; Kusakabe, Y; Kwang, S; Laasanen, A T; Lami, S; Lammel, S; Lancaster, M; Lander, R L; Lannon, K; Lath, A; Latino, G; Lazzizzera, I; LeCompte, T; Lee, E; Lee, H S; Lee, S W; Leone, S; Lewis, J D; Lin, C S; Linacre, J; Lindgren, M; Lipeles, E; Lister, A; Litvintsev, D O; Liu, C; Liu, T; Lockyer, N S; Loginov, A; Loreti, M; Lovas, L; Lu, R-S; Lucchesi, D; Lueck, J; Luci, C; Lujan, P; Lukens, P; Lungu, G; Lyons, L; Lys, J; Lysak, R; Lytken, E; Mack, P; MacQueen, D; Madrak, R; Maeshima, K; Makhoul, K; Maki, T; Maksimovic, P; Malde, S; Malik, S; Manca, G; Manousakis-Katsikakis, A; Margaroli, F; Marino, C; Marino, C P; Martin, A; Martin, V; Martínez, M; Martínez-Ballarín, R; Maruyama, T; Mastrandrea, P; Masubuchi, T; Mattson, M E; Mazzanti, P; McFarland, K S; McIntyre, P; McNulty, R; Mehta, A; Mehtala, P; Menzione, A; Merkel, P; Mesropian, C; Miao, T; Miladinovic, N; Miller, R; Mills, C; Milnik, M; Mitra, A; Mitselmakher, G; Miyake, H; Moggi, N; Moon, C S; Moore, R; Morello, M J; Morlok, J; Movilla Fernandez, P; Mülmenstädt, J; Mukherjee, A; Muller, Th; Mumford, R; Murat, P; Mussini, M; Nachtman, J; Nagai, Y; Nagano, A; Naganoma, J; Nakamura, K; Nakano, I; Napier, A; Necula, V; Neu, C; Neubauer, M S; Nielsen, J; Nodulman, L; Norman, M; Norniella, O; Nurse, E; Oakes, L; Oh, S H; Oh, Y D; Oksuzian, I; Okusawa, T; Orava, R; Osterberg, K; Pagan Griso, S; Pagliarone, C; Palencia, E; Papadimitriou, V; Papaikonomou, A; Paramonov, A A; Parks, B; Pashapour, S; Patrick, J; Pauletta, G; Paulini, M; Paus, C; Pellett, D E; Penzo, A; Phillips, T J; Piacentino, G; Pianori, E; Pinera, L; Pitts, K; Plager, C; Pondrom, L; Poukhov, O; Pounder, N; Prakoshyn, F; Pronko, A; Proudfoot, J; Ptohos, F; Pueschel, E; Punzi, G; Pursley, J; Rademacker, J; Rahaman, A; Ramakrishnan, V; Ranjan, N; Redondo, I; Reisert, B; Rekovic, V; Renton, P; Rescigno, M; Richter, S; Rimondi, F; Ristori, L; Robson, A; Rodrigo, T; Rodriguez, T; Rogers, E; Rolli, S; Roser, R; Rossi, M; Rossin, R; Roy, P; Ruiz, A; Russ, J; Rusu, V; Saarikko, H; Safonov, A; Sakumoto, W K; Saltó, O; Santi, L; Sarkar, S; Sartori, L; Sato, K; Savoy-Navarro, A; Scheidle, T; Schlabach, P; Schmidt, A; Schmidt, E E; Schmidt, M A; Schmidt, M P; Schmitt, M; Schwarz, T; Scodellaro, L; Scott, A L; Scribano, A; Scuri, F; Sedov, A; Seidel, S; Seiya, Y; Semenov, A; Sexton-Kennedy, L; Sfyrla, A; Shalhout, S Z; Shapiro, M D; Shears, T; Shepard, P F; Sherman, D; Shimojima, M; Shiraishi, S; Shochet, M; Shon, Y; Shreyber, I; Sidoti, A; Sinervo, P; Sisakyan, A; Slaughter, A J; Slaunwhite, J; Sliwa, K; Smith, J R; Snider, F D; Snihur, R; Soha, A; Somalwar, S; Sorin, V; Spalding, J; Spreitzer, T; Squillacioti, P; Stanitzki, M; St Denis, R; Stelzer, B; Stelzer-Chilton, O; Stentz, D; Strologas, J; Stuart, D; Suh, J S; Sukhanov, A; Suslov, I; Suzuki, T; Taffard, A; Takashima, R; Takeuchi, Y; Tanaka, R; Tecchio, M; Teng, P K; Terashi, K; Thom, J; Thompson, A S; Thompson, G A; Thomson, E; Tipton, P; Tiwari, V; Tkaczyk, S; Toback, D; Tokar, S; Tollefson, K; Tomura, T; Tonelli, D; Torre, S; Torretta, D; Totaro, P; Tourneur, S; Tu, Y; Turini, N; Ukegawa, F; Vallecorsa, S; van Remortel, N; Varganov, A; Vataga, E; Vázquez, F; Velev, G; Vellidis, C; Veszpremi, V; Vidal, M; Vidal, R; Vila, I; Vilar, R; Vine, T; Vogel, M; Volobouev, I; Volpi, G; Würthwein, F; Wagner, P; Wagner, R G; Wagner, R L; Wagner-Kuhr, J; Wagner, W; Wakisaka, T; Wallny, R; Wang, S M; Warburton, A; Waters, D; Weinberger, M; Wester, W C; Whitehouse, B; Whiteson, D; Wicklund, A B; Wicklund, E; Williams, G; Williams, H H; Wilson, P; Winer, B L; Wittich, P; Wolbers, S; Wolfe, C; Wright, T; Wu, X; Wynne, S M; Xie, S; Yagil, A; Yamamoto, K; Yamaoka, J; Yang, U K; Yang, Y C; Yao, W M; Yeh, G P; Yoh, J; Yorita, K; Yoshida, T; Yu, G B; Yu, I; Yu, S S; Yun, J C; Zanello, L; Zanetti, A; Zaw, I; Zhang, X; Zheng, Y; Zucchelli, S

    2009-11-06

    A combined mass and particle identification fit is used to make the first observation of the decay B(s)(0) --> D(s)(+/-)K(-/+) and measure the branching fraction of B(s)(0) --> D(s)(+/-)K(-/+) relative to B(s)(0) --> D(s)(+)pi(-). This analysis uses 1.2 fb(-1) integrated luminosity of pp collisions at square root(s) = 1.96 TeV collected with the CDF II detector at the Fermilab Tevatron collider. We observe a B(s)(0) --> D(s)(+/-)K(-/+) signal with a statistical significance of 8.1 sigma and measure B(B(s)(0) --> D(s)(+/-)K(-/+) /B(B(s)(0) --> D(s)(+)pi(-) 0.097+/-0.018(stat) +/- 0.009(syst).

  1. Outsourcing of generating assets as a competitive strategy for large electric customers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Giacalone, F.T.; Hocker, C.

    The US electric power industry is at a transitional stage on the way to full competition at the retail level. A fundamental difference between wholesale and retail competition is that, with the latter, the end user will have a choice of suppliers. Large electric customers, such as industrial manufacturers, have traditionally had only two choices: to purchase from the local franchise utility or to self-generate. With retail competition, however, these same customers will have not only have many choices of suppliers to compare against the self-generation option, but also will have a new alternative to consider - that of outsourcingmore » their generating assets as a means of retaining effective control, but not necessarily ownership, of their electric supply. Outsourcing of generation assets means turning over complete or partial ownership of these assets to a third party, who then sells the electricity back to the customer at retail. This approach can be advantageous to a customer who wants to achieve one or more of the following benefits that are generally not available in the traditional ``make or buy'' paradigm: monetize (receive cash for) assets to pay down debt or redeploy into its core business; reduce operating and overhead costs; meet increasing power demand without making a significant capital expenditure; retain a significant degree of control over the operation of the assets, rather than turning its source of supply to a utility, independent generator, or power marketer; and move the assets off-balance sheet and off-credit as a means of improving its corporate financial position. Outsourcing of industrial generation, including most or all of the above benefits has already occurred successfully in a handful of cases, such as the James River and Stone Container mills discussed in this paper.« less

  2. 77 FR 9877 - Reporting of Specified Foreign Financial Assets; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-21

    ... Reporting of Specified Foreign Financial Assets; Correction AGENCY: Internal Revenue Service (IRS). ACTION... the reporting of specified foreign financial assets. FOR FURTHER INFORMATION CONTACT: Joseph S.... List of Subjects in 26 CFR Part 1 Income taxes, Reporting and recordkeeping requirements. PART 1...

  3. Carbon Back Sputter Modeling for Hall Thruster Testing

    NASA Technical Reports Server (NTRS)

    Gilland, James H.; Williams, George J.; Burt, Jonathan M.; Yim, John T.

    2016-01-01

    In support of wear testing for the Hall Effect Rocket with Magnetic Shielding (HERMeS) program, the back sputter from a Hall effect thruster plume has been modeled for the NASA Glenn Research Centers Vacuum Facility 5. The predicted wear at a near-worst case condition of 600 V, 12.5 kW was found to be on the order of 3 4 mkhour in a fully carbon-lined chamber. A more detailed numerical monte carlo code was also modified to estimate back sputter for a detailed facility and pumping configuration. This code demonstrated similar back sputter rate distributions, but is not yet accurately modeling the magnitudes. The modeling has been benchmarked to recent HERMeS wear testing, using multiple microbalance measurements. These recent measurements have yielded values, on the order of 1.5- 2 microns/khour.

  4. Commercial Building Energy Asset Rating Program -- Market Research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCabe, Molly J.; Wang, Na

    2012-04-19

    Under contract to Pacific Northwest National Laboratory, HaydenTanner, LLC conducted an in-depth analysis of the potential market value of a commercial building energy asset rating program for the U.S. Department of Energy (DOE) Office of Energy Efficiency and Renewable Energy. The market research objectives were to: (1) Evaluate market interest and need for a program and tool to offer asset rating and rapidly identify potential energy efficiency measures for the commercial building sector. (2) Identify key input variables and asset rating outputs that would facilitate increased investment in energy efficiency. (3) Assess best practices and lessons learned from existing nationalmore » and international energy rating programs. (4) Identify core messaging to motivate owners, investors, financiers, and others in the real estate sector to adopt a voluntary asset rating program and, as a consequence, deploy high-performance strategies and technologies across new and existing buildings. (5) Identify leverage factors and incentives that facilitate increased investment in these buildings. To meet these objectives, work consisted of a review of the relevant literature, examination of existing and emergent asset and operational rating systems, interviews with industry stakeholders, and an evaluation of the value implication of an asset label on asset valuation. This report documents the analysis methodology and findings, conclusion, and recommendations. Its intent is to support and inform the DOE Office of Energy Efficiency and Renewable Energy on the market need and potential value impacts of an asset labeling and diagnostic tool to encourage high-performance new buildings and building efficiency retrofit projects.« less

  5. Attribute based encryption for secure sharing of E-health data

    NASA Astrophysics Data System (ADS)

    Charanya, R.; Nithya, S.; Manikandan, N.

    2017-11-01

    Distributed computing is one of the developing innovations in IT part and information security assumes a real part. It includes sending gathering of remote server and programming that permit the unified information and online access to PC administrations. Distributed computing depends on offering of asset among different clients are additionally progressively reallocated on interest. Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. The reasons for security and protection issues, which rise on the grounds that the health information possessed by distinctive clients are put away in some cloud servers rather than under their own particular control”z. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed. In this paper, in order to make ehealth data’s more secure we use multi party in cloud computing system. Where the health data is encrypted using attributes and key policy. And the user with a particular attribute and key policy alone will be able to decrypt the health data after it is verified by “key distribution centre” and the “secure data distributor”. This technique can be used in medical field for secure storage of patient details and limiting to particular doctor access. To make data’s scalable secure we need to encrypt the health data before outsourcing.

  6. Comprehensive transportation asset management : making a business case and prioritizing assets for inclusion in formal asset management programs.

    DOT National Transportation Integrated Search

    2011-12-01

    Several agencies are applying asset management principles as a business tool and paradigm to help them define goals and prioritize agency resources in decision making. Previously, transportation asset management (TAM) has focused more on big ticke...

  7. Two RFID standard-based security protocols for healthcare environments.

    PubMed

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.

  8. Mongolia’s Economic Security: How can Economic Development Further Support Mongolian National Security through Developing its Mining Sector

    DTIC Science & Technology

    2017-06-09

    MONGOLIA’S ECONOMIC SECURITY: HOW CAN ECONOMIC DEVELOPMENT FURTHER SUPPORT MONGOLIAN NATIONAL SECURITY THROUGH DEVELOPING ITS MINING SECTOR... Economic Security: How can Economic Development Further Support Mongolian National Security through Developing its Mining Sector? 5a. CONTRACT NUMBER...geographic position between two political and economic powers (China and Russia) provides both opportunities and disadvantages for Mongolia’s economy

  9. The adoption of IT security standards in a healthcare environment.

    PubMed

    Gomes, Rui; Lapão, Luís Velez

    2008-01-01

    Security is a vital part of daily life to Hospitals that need to ensure that the information is adequately secured. In Portugal, more CIOs are seeking that their hospital IS departments are properly protecting information assets from security threats. It is imperative to take necessary measures to ensure risk management and business continuity. Security management certification provides just such a guarantee, increasing patient and partner confidence. This paper introduces one best practice for implementing four security controls in a hospital datacenter infrastructure (ISO27002), and describes the security assessment for implementing such controls.

  10. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Securities Act industry guides... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry... claims and claim adjustment expenses of property-casualty insurance underwriters. (g) Guide 7...

  11. 78 FR 35032 - Determination of Insufficient Assets To Satisfy Claims Against Financial Institution in Receivership

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-11

    ...: Notice. SUMMARY: The FDIC has determined that insufficient assets exist in the receivership of K Bank...) 761-8677. Written correspondence may also be mailed to FDIC as Receiver of K Bank, Attention: Claims Agent, 1601 Bryan Street, Dallas, Texas 75201. SUPPLEMENTARY INFORMATION: On November 5, 2010, K Bank...

  12. 76 FR 51048 - Notice of Submission of Proposed Information Collection to OMB Ginnie Mae Mortgage-Backed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-17

    ...-Backed Securities programs and to monitor performance and compliance with established rules and... issuers/customers in its Mortgage-Backed Securities programs and to monitor performance and compliance...

  13. Population age structure and asset returns: an empirical investigation.

    PubMed

    Poterba, J M

    1998-10-01

    "This paper investigates the association between population age structure, particularly the share of the population in the 'prime saving years' 45-60, and the returns on stocks and bonds. The paper is motivated by the claim that the aging of the 'Baby Boom' cohort in the United States is a key factor in explaining the recent rise in asset values. It also addresses the associated claim that asset prices will decline when this large cohort reaches retirement age and begins to reduce its asset holdings. This paper begins by considering household age-asset accumulation profiles. Data from the Survey of Consumer Finances suggest that while cross-sectional age-wealth profiles peak for households in their early 60s, cohort data on the asset ownership of the same households show a much less pronounced peak.... The paper then considers the historical relationship between demographic structure and real returns on Treasury bills, long-term government bonds, and corporate stock. The results do not suggest any robust relationship between demographic structure and asset returns.... The paper concludes by discussing factors such as international capital flows and forward-looking behavior on the part of market participants that could weaken the relationship between age structure and asset returns in a single nation." excerpt

  14. Arm yourself for the coming battle over Social Security.

    PubMed

    Pozen, Robert C

    2002-11-01

    The U.S. Social Security system is in deep trouble--and that's not just bad news for your friends and family. It's also bad news for your company. Unless the Social Security system is changed, by 2017 the cash flowing out of it will exceed the cash coming in, and by 2041 the system will be utterly insolvent. But the trouble will start sooner than that: In the next decade, the very prospect of the rising deficit will mean serious pressure on recent tax cuts, higher long-term interest rates, increased pension-funding costs, and other punishing conditions for U.S. businesses. Clearly, there's a lot at stake for companies, which is why executives need to participate in the growing debate about Social Security reform, says Robert Pozen, a visiting professor at Harvard Law School who served on the President's Commission to Strengthen Social Security. In this article, he urges business leaders to take a stance on how the system should be reformed, suggesting they work with interest groups to make their voices heard. After taking a comprehensive look at the debates surrounding Social Security reform, Pozen outlines the three main alternatives executives might choose to support: increasing contributions to Social Security, decreasing the growth of benefits for more-affluent workers, and increasing investment returns on Social Security assets. What's needed to fix the current system, he contends, is a careful balance of all three.

  15. 76 FR 39447 - J.P. Morgan Securities LLC, et al.; Notice of Application and Temporary Order

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... Capital Management, LLC (``Highbridge''); JF International Management Inc. (``JFIMI''); JPMorgan Asset... order. Applicants: J.P. Morgan Securities; Bear Stearns Asset Management Inc. (``BSAM''); Bear Stearns Health Innoventures Management, L.L.C. (``BSHIM''); BSCGP Inc. (``BSCGP''); Constellation Growth Capital...

  16. 12 CFR 550.250 - Must I keep fiduciary assets separate from other assets?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Must I keep fiduciary assets separate from other assets? 550.250 Section 550.250 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FIDUCIARY POWERS OF SAVINGS ASSOCIATIONS Exercising Fiduciary Powers Custody and Control of Assets...

  17. 12 CFR 550.250 - Must I keep fiduciary assets separate from other assets?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Must I keep fiduciary assets separate from other assets? 550.250 Section 550.250 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FIDUCIARY POWERS OF SAVINGS ASSOCIATIONS Exercising Fiduciary Powers Custody and Control of Assets...

  18. 12 CFR 211.44 - Reporting and disclosure of international assets.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Reporting and disclosure of international... RESERVE SYSTEM INTERNATIONAL BANKING OPERATIONS (REGULATION K) International Lending Supervision § 211.44 Reporting and disclosure of international assets. (a) Requirements. (1) Pursuant to section 907(a) of the...

  19. Disappearance of back-to-back high-pT hadron correlations in central Au+Au collisions at sqrt[s NN ] =200 GeV.

    PubMed

    Adler, C; Ahammed, Z; Allgower, C; Amonett, J; Anderson, B D; Anderson, M; Averichev, G S; Balewski, J; Barannikova, O; Barnby, L S; Baudot, J; Bekele, S; Belaga, V V; Bellwied, R; Berger, J; Bichsel, H; Billmeier, A; Bland, L C; Blyth, C O; Bonner, B E; Boucham, A; Brandin, A; Bravar, A; Cadman, R V; Caines, H; Calderón de la Barca Sánchez, M; Cardenas, A; Carroll, J; Castillo, J; Castro, M; Cebra, D; Chaloupka, P; Chattopadhyay, S; Chen, Y; Chernenko, S P; Cherney, M; Chikanian, A; Choi, B; Christie, W; Coffin, J P; Cormier, T M; Corral, M M; Cramer, J G; Crawford, H J; Derevschikov, A A; Didenko, L; Dietel, T; Draper, J E; Dunin, V B; Dunlop, J C; Eckardt, V; Efimov, L G; Emelianov, V; Engelage, J; Eppley, G; Erazmus, B; Fachini, P; Faine, V; Faivre, J; Fatemi, R; Filimonov, K; Finch, E; Fisyak, Y; Flierl, D; Foley, K J; Fu, J; Gagliardi, C A; Gagunashvili, N; Gans, J; Gaudichet, L; Germain, M; Geurts, F; Ghazikhanian, V; Grachov, O; Grigoriev, V; Guedon, M; Gushin, E; Hallman, T J; Hardtke, D; Harris, J W; Henry, T W; Heppelmann, S; Herston, T; Hippolyte, B; Hirsch, A; Hjort, E; Hoffmann, G W; Horsley, M; Huang, H Z; Humanic, T J; Igo, G; Ishihara, A; Ivanshin, Yu I; Jacobs, P; Jacobs, W W; Janik, M; Johnson, I; Jones, P G; Judd, E G; Kaneta, M; Kaplan, M; Keane, D; Kiryluk, J; Kisiel, A; Klay, J; Klein, S R; Klyachko, A; Kollegger, T; Konstantinov, A S; Kopytine, M; Kotchenda, L; Kovalenko, A D; Kramer, M; Kravtsov, P; Krueger, K; Kuhn, C; Kulikov, A I; Kunde, G J; Kunz, C L; Kutuev, R Kh; Kuznetsov, A A; Lakehal-Ayat, L; Lamont, M A C; Landgraf, J M; Lange, S; Lansdell, C P; Lasiuk, B; Laue, F; Lauret, J; Lebedev, A; Lednický, R; Leontiev, V M; LeVine, M J; Li, Q; Lindenbaum, S J; Lisa, M A; Liu, F; Liu, L; Liu, Z; Liu, Q J; Ljubicic, T; Llope, W J; LoCurto, G; Long, H; Longacre, R S; Lopez-Noriega, M; Love, W A; Ludlam, T; Lynn, D; Ma, J; Magestro, D; Majka, R; Margetis, S; Markert, C; Martin, L; Marx, J; Matis, H S; Matulenko, Yu A; McShane, T S; Meissner, F; Melnick, Yu; Meschanin, A; Messer, M; Miller, M L; Milosevich, Z; Minaev, N G; Mitchell, J; Moore, C F; Morozov, V; de Moura, M M; Munhoz, M G; Nelson, J M; Nevski, P; Nikitin, V A; Nogach, L V; Norman, B; Nurushev, S B; Odyniec, G; Ogawa, A; Okorokov, V; Oldenburg, M; Olson, D; Paic, G; Pandey, S U; Panebratsev, Y; Panitkin, S Y; Pavlinov, A I; Pawlak, T; Perevoztchikov, V; Peryt, W; Petrov, V A; Planinic, M; Pluta, J; Porile, N; Porter, J; Poskanzer, A M; Potrebenikova, E; Prindle, D; Pruneau, C; Putschke, J; Rai, G; Rakness, G; Ravel, O; Ray, R L; Razin, S V; Reichhold, D; Reid, J G; Renault, G; Retiere, F; Ridiger, A; Ritter, H G; Roberts, J B; Rogachevski, O V; Romero, J L; Rose, A; Roy, C; Rykov, V; Sakrejda, I; Salur, S; Sandweiss, J; Savin, I; Schambach, J; Scharenberg, R P; Schmitz, N; Schroeder, L S; Schüttauf, A; Schweda, K; Seger, J; Seliverstov, D; Seyboth, P; Shahaliev, E; Shestermanov, K E; Shimanskii, S S; Simon, F; Skoro, G; Smirnov, N; Snellings, R; Sorensen, P; Sowinski, J; Spinka, H M; Srivastava, B; Stephenson, E J; Stock, R; Stolpovsky, A; Strikhanov, M; Stringfellow, B; Struck, C; Suaide, A A P; Sugarbaker, E; Suire, C; Sumbera, M; Surrow, B; Symons, T J M; Szanto de Toledo, A; Szarwas, P; Tai, A; Takahashi, J; Tang, A H; Thein, D; Thomas, J H; Thompson, M; Tikhomirov, V; Tokarev, M; Tonjes, M B; Trainor, T A; Trentalange, S; Tribble, R E; Trofimov, V; Tsai, O; Ullrich, T; Underwood, D G; Van Buren, G; VanderMolen, A M; Vasilevski, I M; Vasiliev, A N; Vigdor, S E; Voloshin, S A; Wang, F; Ward, H; Watson, J W; Wells, R; Westfall, G D; Whitten, C; Wieman, H; Willson, R; Wissink, S W; Witt, R; Wood, J; Xu, N; Xu, Z; Yakutin, A E; Yamamoto, E; Yang, J; Yepes, P; Yurevich, V I; Zanevski, Y V; Zborovský, I; Zhang, H; Zhang, W M; Zoulkarneev, R; Zubarev, A N

    2003-02-28

    Azimuthal correlations for large transverse momentum charged hadrons have been measured over a wide pseudorapidity range and full azimuth in Au+Au and p+p collisions at sqrt[s(NN)]=200 GeV. The small-angle correlations observed in p+p collisions and at all centralities of Au+Au collisions are characteristic of hard-scattering processes previously observed in high-energy collisions. A strong back-to-back correlation exists for p+p and peripheral Au+Au. In contrast, the back-to-back correlations are reduced considerably in the most central Au+Au collisions, indicating substantial interaction as the hard-scattered partons or their fragmentation products traverse the medium.

  20. Overview of Accelerator Applications for Security and Defense

    DOE PAGES

    Antolak, Arlyn J.

    2015-01-01

    Particle accelerators play a key role in a broad set of defense and security applications including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat for developing a radiological dispersal device and be used to produce isotopes for medical, industrial, and re-search purposes. Lastly, we present an overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security.

  1. Economic Evaluation of the Information Security Levels Achieved by Electric Energy Providers in North Arctic Region

    NASA Astrophysics Data System (ADS)

    Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.

    2017-10-01

    The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.

  2. Assessing Your Assets: Systems for Tracking and Managing IT Assets Can Save Time and Dollars

    ERIC Educational Resources Information Center

    Holub, Patricia A.

    2007-01-01

    The average school district loses more than $80,000 per year because of lost or damaged IT assets, according to a QED survey cosponsored by Follett Software Company. And many districts--59 percent--still use manual systems to track assets. Enter asset management systems. Software for managing assets, when implemented properly, can save time,…

  3. Introducing the CERT (Trademark) Resiliency Engineering Framework: Improving the Security and Sustainability Processes

    DTIC Science & Technology

    2007-05-01

    business processes and services. 4. Security operations management addresses the day-to-day activities that the organization performs to protect the...Management TM – Technology Management Security Operations Management SOM – Security Operations Management 5.7.2 Important Operations Competency...deals with the provision of access rights to informa- tion and technical assets SOM – Security Operations Management , which addresses the fundamental

  4. 12 CFR 615.5131 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... economic value of an individual instrument, a portfolio, or the entire institution. (h) Mortgage securities... because the value of your holdings may decline if interest rates or market prices change. Exposure to... “asset-backed securities (ABS)” and adding in its place the words “this section”; and adding in...

  5. 76 FR 33297 - Consumer Advisory Council; Notice of Meeting of the Consumer Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-08

    ..., in Dining Room E on the Terrace Level of the Martin Building. For security purposes, anyone planning.... Proposed Rules Regarding Ability to Pay for Mortgage Loans Members will discuss the Board's proposed rules... on a proposed rule that would require sponsors of asset-backed securities to retain at least 5...

  6. Forecasting financial asset processes: stochastic dynamics via learning neural networks.

    PubMed

    Giebel, S; Rainer, M

    2010-01-01

    Models for financial asset dynamics usually take into account their inherent unpredictable nature by including a suitable stochastic component into their process. Unknown (forward) values of financial assets (at a given time in the future) are usually estimated as expectations of the stochastic asset under a suitable risk-neutral measure. This estimation requires the stochastic model to be calibrated to some history of sufficient length in the past. Apart from inherent limitations, due to the stochastic nature of the process, the predictive power is also limited by the simplifying assumptions of the common calibration methods, such as maximum likelihood estimation and regression methods, performed often without weights on the historic time series, or with static weights only. Here we propose a novel method of "intelligent" calibration, using learning neural networks in order to dynamically adapt the parameters of the stochastic model. Hence we have a stochastic process with time dependent parameters, the dynamics of the parameters being themselves learned continuously by a neural network. The back propagation in training the previous weights is limited to a certain memory length (in the examples we consider 10 previous business days), which is similar to the maximal time lag of autoregressive processes. We demonstrate the learning efficiency of the new algorithm by tracking the next-day forecasts for the EURTRY and EUR-HUF exchange rates each.

  7. Leveraging Trade Agreements to Meet U.S. Security Aims

    DTIC Science & Technology

    2016-04-08

    TO MEET U.S. SECURITY AIMS 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Sd. PROJECT NUMBER LTC Allysa A. Kropp (USARNG) Se. TASK NUMBER 5f...Sanctions Programs and Country Information,” under “Resource Center, Financial Sanctions, Programs ,” https’.//wwiv.treasurv.gov/resource center/sanctions... Program , and economic integration of former adversaries through U.S. trade policy.7 In the National Security Strategy, President Obama underscored the

  8. A Community-Powered, Asset-Based Approach to Intersectoral Urban Health System Planning in Chicago

    PubMed Central

    Vickery, Katherine Diaz; Choi, HwaJung; Makelarski, Jennifer; Matthews, Amber; Davis, Matthew

    2016-01-01

    Objectives. To describe, and provide a nomenclature and taxonomy for classifying, the economic sectors and functional assets that could be mobilized as partners in an intersectoral health system. Methods. MAPSCorps (Meaningful, Active, Productive Science in Service to Community) employed local youths to conduct a census of all operating assets (businesses and organizations) on the South Side of Chicago, Illinois, in 2012. We classified assets by primary function into sectors and described asset and sector distribution and density per 100 000 population. We compared empirical findings with the Institute of Medicine’s (IOM’s) conceptual representation and description of intersectoral health system partners. Results. Fifty-four youths mapped a 62-square-mile region over 6 weeks; we classified 8376 assets into 23 sectors. Sectors with the most assets were food (n = 1214; 230/100 000 population), trade services (n = 1113; 211/100 000), and religious worship (n = 974;185/100 000). Several large, health-relevant sectors (2499 assets) were identified in the region but not specified in the IOM’s representation. Governmental public health, central to the IOM concept, had no physical presence in the region. Conclusions. Local youths identified several thousand assets across a broad diversity of sectors that could partner in an intersectoral health system. Empirically informed iteration of the IOM concept will facilitate local translation and propagation. PMID:27552280

  9. A model for the dynamic behavior of financial assets affected by news: The case of Tohoku-Kanto earthquake

    NASA Astrophysics Data System (ADS)

    Ochiai, T.; Nacher, J. C.

    2011-09-01

    The prices of financial products in markets are determined by the behavior of investors, who are influenced by positive and negative news. Here, we present a mathematical model to reproduce the price movements in real financial markets affected by news. The model has both positive and negative feed-back mechanisms. Furthermore, the behavior of the model is examined by considering two types of noise. Our results show that the dynamic balance of positive and negative feed-back mechanisms with the noise effect determines the asset price movement.

  10. Vaporization thermodynamics of K2S and K2SO3

    NASA Technical Reports Server (NTRS)

    Bennet, J. E.

    1982-01-01

    The vaporization reactions, vapor pressures, and thermodynamics of potassium sulfide and potassium sulfite were studied for purposes of providing fundamental data for the seed cycle in magnetohydrodynamic electric power generation. Rate of effusion studies, supported by tube furnace experiments, X-ray powder diffraction, mass spectrometry and appropriate chemical analyses and tests, revealed that potassium sulfite disproportionates at high temperatures to form potassium sulfide and potassium sulfate. Potassium sulfide was observed to vaporize incongruently, the initial vapors beng predominantly potassium atoms, with minor species being S2 and various K-S molecules. The ratio of K/S2 in the vapor is very large initially and decreases steadily with prolonged heating. Several materials were evaluated for purposes of containing K2S/K2SO3 at temperatures or = 800 C: Pt, Mo, W, quartz, machinable glass, BN, high density graphite, pyrolytic coated graphite, and alumina. Of these, only alumina was observed to be chemically inert to both K2S but reacted with K2SO3. The other materials were not suitable for either substance. Thermodynamic calculations based on measured vapor pressures and approximate free energy functions are described. Results from isothermal total mass loss experiments and from thermogravimetric experiments are also included.

  11. Measurement of CP violation in B 0 → J/ ψK S 0 and B 0 → ψ(2 S) K S 0 decays

    NASA Astrophysics Data System (ADS)

    Aaij, R.; Adeva, B.; Adinolfi, M.; Ajaltouni, Z.; Akar, S.; Albrecht, J.; Alessio, F.; Alexander, M.; Alfonso Albero, A.; Ali, S.; Alkhazov, G.; Alvarez Cartelle, P.; Alves, A. A.; Amato, S.; Amerio, S.; Amhis, Y.; An, L.; Anderlini, L.; Andreassi, G.; Andreotti, M.; Andrews, J. E.; Appleby, R. B.; Archilli, F.; d'Argent, P.; Arnau Romeu, J.; Artamonov, A.; Artuso, M.; Aslanides, E.; Auriemma, G.; Baalouch, M.; Babuschkin, I.; Bachmann, S.; Back, J. J.; Badalov, A.; Baesso, C.; Baker, S.; Balagura, V.; Baldini, W.; Baranov, A.; Barlow, R. J.; Barschel, C.; Barsuk, S.; Barter, W.; Baryshnikov, F.; Batozskaya, V.; Battista, V.; Bay, A.; Beaucourt, L.; Beddow, J.; Bedeschi, F.; Bediaga, I.; Beiter, A.; Bel, L. J.; Beliy, N.; Bellee, V.; Belloli, N.; Belous, K.; Belyaev, I.; Ben-Haim, E.; Bencivenni, G.; Benson, S.; Beranek, S.; Berezhnoy, A.; Bernet, R.; Berninghoff, D.; Bertholet, E.; Bertolin, A.; Betancourt, C.; Betti, F.; Bettler, M.-O.; van Beuzekom, M.; Bezshyiko, Ia.; Bifani, S.; Billoir, P.; Birnkraut, A.; Bizzeti, A.; Bjørn, M.; Blake, T.; Blanc, F.; Blusk, S.; Bocci, V.; Boettcher, T.; Bondar, A.; Bondar, N.; Bordyuzhin, I.; Borgheresi, A.; Borghi, S.; Borisyak, M.; Borsato, M.; Bossu, F.; Boubdir, M.; Bowcock, T. J. V.; Bowen, E.; Bozzi, C.; Braun, S.; Britton, T.; Brodzicka, J.; Brundu, D.; Buchanan, E.; Burr, C.; Bursche, A.; Buytaert, J.; Byczynski, W.; Cadeddu, S.; Cai, H.; Calabrese, R.; Calladine, R.; Calvi, M.; Calvo Gomez, M.; Camboni, A.; Campana, P.; Campora Perez, D. H.; Capriotti, L.; Carbone, A.; Carboni, G.; Cardinale, R.; Cardini, A.; Carniti, P.; Carson, L.; Carvalho Akiba, K.; Casse, G.; Cassina, L.; Cattaneo, M.; Cavallero, G.; Cenci, R.; Chamont, D.; Chapman, M. G.; Charles, M.; Charpentier, Ph.; Chatzikonstantinidis, G.; Chefdeville, M.; Chen, S.; Cheung, S. F.; Chitic, S.-G.; Chobanova, V.; Chrzaszcz, M.; Chubykin, A.; Ciambrone, P.; Cid Vidal, X.; Ciezarek, G.; Clarke, P. E. L.; Clemencic, M.; Cliff, H. V.; Closier, J.; Cogan, J.; Cogneras, E.; Cogoni, V.; Cojocariu, L.; Collins, P.; Colombo, T.; Comerma-Montells, A.; Contu, A.; Cook, A.; Coombs, G.; Coquereau, S.; Corti, G.; Corvo, M.; Costa Sobral, C. M.; Couturier, B.; Cowan, G. A.; Craik, D. C.; Crocombe, A.; Cruz Torres, M.; Currie, R.; D'Ambrosio, C.; Da Cunha Marinho, F.; Dall'Occo, E.; Dalseno, J.; Davis, A.; De Aguiar Francisco, O.; De Capua, S.; De Cian, M.; De Miranda, J. M.; De Paula, L.; De Serio, M.; De Simone, P.; Dean, C. T.; Decamp, D.; Del Buono, L.; Dembinski, H.-P.; Demmer, M.; Dendek, A.; Derkach, D.; Deschamps, O.; Dettori, F.; Dey, B.; Di Canto, A.; Di Nezza, P.; Dijkstra, H.; Dordei, F.; Dorigo, M.; Dosil Suárez, A.; Douglas, L.; Dovbnya, A.; Dreimanis, K.; Dufour, L.; Dujany, G.; Durante, P.; Dzhelyadin, R.; Dziewiecki, M.; Dziurda, A.; Dzyuba, A.; Easo, S.; Ebert, M.; Egede, U.; Egorychev, V.; Eidelman, S.; Eisenhardt, S.; Eitschberger, U.; Ekelhof, R.; Eklund, L.; Ely, S.; Esen, S.; Evans, H. M.; Evans, T.; Falabella, A.; Farley, N.; Farry, S.; Fazzini, D.; Federici, L.; Ferguson, D.; Fernandez, G.; Fernandez Declara, P.; Fernandez Prieto, A.; Ferrari, F.; Ferreira Rodrigues, F.; Ferro-Luzzi, M.; Filippov, S.; Fini, R. A.; Fiorini, M.; Firlej, M.; Fitzpatrick, C.; Fiutowski, T.; Fleuret, F.; Fohl, K.; Fontana, M.; Fontanelli, F.; Forshaw, D. C.; Forty, R.; Franco Lima, V.; Frank, M.; Frei, C.; Fu, J.; Funk, W.; Furfaro, E.; Färber, C.; Gabriel, E.; Gallas Torreira, A.; Galli, D.; Gallorini, S.; Gambetta, S.; Gandelman, M.; Gandini, P.; Gao, Y.; Garcia Martin, L. M.; García Pardiñas, J.; Garra Tico, J.; Garrido, L.; Garsed, P. J.; Gascon, D.; Gaspar, C.; Gavardi, L.; Gazzoni, G.; Gerick, D.; Gersabeck, E.; Gersabeck, M.; Gershon, T.; Ghez, Ph.; Gianì, S.; Gibson, V.; Girard, O. G.; Giubega, L.; Gizdov, K.; Gligorov, V. V.; Golubkov, D.; Golutvin, A.; Gomes, A.; Gorelov, I. V.; Gotti, C.; Govorkova, E.; Grabowski, J. P.; Graciani Diaz, R.; Granado Cardoso, L. A.; Graugés, E.; Graverini, E.; Graziani, G.; Grecu, A.; Greim, R.; Griffith, P.; Grillo, L.; Gruber, L.; Gruberg Cazon, B. R.; Grünberg, O.; Gushchin, E.; Guz, Yu.; Gys, T.; Göbel, C.; Hadavizadeh, T.; Hadjivasiliou, C.; Haefeli, G.; Haen, C.; Haines, S. C.; Hamilton, B.; Han, X.; Hancock, T. H.; Hansmann-Menzemer, S.; Harnew, N.; Harnew, S. T.; Hasse, C.; Hatch, M.; He, J.; Hecker, M.; Heinicke, K.; Heister, A.; Hennessy, K.; Henrard, P.; Henry, L.; van Herwijnen, E.; Heß, M.; Hicheur, A.; Hill, D.; Hombach, C.; Hopchev, P. H.; Hu, W.; Huard, Z. C.; Hulsbergen, W.; Humair, T.; Hushchyn, M.; Hutchcroft, D.; Ibis, P.; Idzik, M.; Ilten, P.; Jacobsson, R.; Jalocha, J.; Jans, E.; Jawahery, A.; Jiang, F.; John, M.; Johnson, D.; Jones, C. R.; Joram, C.; Jost, B.; Jurik, N.; Kandybei, S.; Karacson, M.; Kariuki, J. M.; Karodia, S.; Kazeev, N.; Kecke, M.; Kelsey, M.; Kenzie, M.; Ketel, T.; Khairullin, E.; Khanji, B.; Khurewathanakul, C.; Kirn, T.; Klaver, S.; Klimaszewski, K.; Klimkovich, T.; Koliiev, S.; Kolpin, M.; Komarov, I.; Kopecna, R.; Koppenburg, P.; Kosmyntseva, A.; Kotriakhova, S.; Kozeiha, M.; Kravchuk, L.; Kreps, M.; Kress, F.; Krokovny, P.; Kruse, F.; Krzemien, W.; Kucewicz, W.; Kucharczyk, M.; Kudryavtsev, V.; Kuonen, A. K.; Kvaratskheliya, T.; Lacarrere, D.; Lafferty, G.; Lai, A.; Lanfranchi, G.; Langenbruch, C.; Latham, T.; Lazzeroni, C.; Le Gac, R.; Leflat, A.; Lefrançois, J.; Lefèvre, R.; Lemaitre, F.; Lemos Cid, E.; Leroy, O.; Lesiak, T.; Leverington, B.; Li, P.-R.; Li, T.; Li, Y.; Li, Z.; Likhomanenko, T.; Lindner, R.; Lionetto, F.; Lisovskyi, V.; Liu, X.; Loh, D.; Loi, A.; Longstaff, I.; Lopes, J. H.; Lucchesi, D.; Lucio Martinez, M.; Luo, H.; Lupato, A.; Luppi, E.; Lupton, O.; Lusiani, A.; Lyu, X.; Machefert, F.; Maciuc, F.; Macko, V.; Mackowiak, P.; Maddrell-Mander, S.; Maev, O.; Maguire, K.; Maisuzenko, D.; Majewski, M. W.; Malde, S.; Malinin, A.; Maltsev, T.; Manca, G.; Mancinelli, G.; Marangotto, D.; Maratas, J.; Marchand, J. F.; Marconi, U.; Marin Benito, C.; Marinangeli, M.; Marino, P.; Marks, J.; Martellotti, G.; Martin, M.; Martinelli, M.; Martinez Santos, D.; Martinez Vidal, F.; Martins Tostes, D.; Massacrier, L. M.; Massafferri, A.; Matev, R.; Mathad, A.; Mathe, Z.; Matteuzzi, C.; Mauri, A.; Maurice, E.; Maurin, B.; Mazurov, A.; McCann, M.; McNab, A.; McNulty, R.; Mead, J. V.; Meadows, B.; Meaux, C.; Meier, F.; Meinert, N.; Melnychuk, D.; Merk, M.; Merli, A.; Michielin, E.; Milanes, D. A.; Millard, E.; Minard, M.-N.; Minzoni, L.; Mitzel, D. S.; Mogini, A.; Molina Rodriguez, J.; Mombächer, T.; Monroy, I. A.; Monteil, S.; Morandin, M.; Morello, M. J.; Morgunova, O.; Moron, J.; Morris, A. B.; Mountain, R.; Muheim, F.; Mulder, M.; Müller, D.; Müller, J.; Müller, K.; Müller, V.; Naik, P.; Nakada, T.; Nandakumar, R.; Nandi, A.; Nasteva, I.; Needham, M.; Neri, N.; Neubert, S.; Neufeld, N.; Neuner, M.; Nguyen, T. D.; Nguyen-Mau, C.; Nieswand, S.; Niet, R.; Nikitin, N.; Nikodem, T.; Nogay, A.; O'Hanlon, D. P.; Oblakowska-Mucha, A.; Obraztsov, V.; Ogilvy, S.; Oldeman, R.; Onderwater, C. J. G.; Ossowska, A.; Otalora Goicochea, J. M.; Owen, P.; Oyanguren, A.; Pais, P. R.; Palano, A.; Palutan, M.; Papanestis, A.; Pappagallo, M.; Pappalardo, L. L.; Parker, W.; Parkes, C.; Passaleva, G.; Pastore, A.; Patel, M.; Patrignani, C.; Pearce, A.; Pellegrino, A.; Penso, G.; Pepe Altarelli, M.; Perazzini, S.; Perret, P.; Pescatore, L.; Petridis, K.; Petrolini, A.; Petrov, A.; Petruzzo, M.; Picatoste Olloqui, E.; Pietrzyk, B.; Pikies, M.; Pinci, D.; Pisani, F.; Pistone, A.; Piucci, A.; Placinta, V.; Playfer, S.; Plo Casasus, M.; Polci, F.; Poli Lener, M.; Poluektov, A.; Polyakov, I.; Polycarpo, E.; Pomery, G. J.; Ponce, S.; Popov, A.; Popov, D.; Poslavskii, S.; Potterat, C.; Price, E.; Prisciandaro, J.; Prouve, C.; Pugatch, V.; Puig Navarro, A.; Pullen, H.; Punzi, G.; Qian, W.; Quagliani, R.; Quintana, B.; Rachwal, B.; Rademacker, J. H.; Rama, M.; Ramos Pernas, M.; Rangel, M. S.; Raniuk, I.; Ratnikov, F.; Raven, G.; Ravonel Salzgeber, M.; Reboud, M.; Redi, F.; Reichert, S.; dos Reis, A. C.; Remon Alepuz, C.; Renaudin, V.; Ricciardi, S.; Richards, S.; Rihl, M.; Rinnert, K.; Rives Molina, V.; Robbe, P.; Robert, A.; Rodrigues, A. B.; Rodrigues, E.; Rodriguez Lopez, J. A.; Rogozhnikov, A.; Roiser, S.; Rollings, A.; Romanovskiy, V.; Romero Vidal, A.; Ronayne, J. W.; Rotondo, M.; Rudolph, M. S.; Ruf, T.; Ruiz Valls, P.; Ruiz Vidal, J.; Saborido Silva, J. J.; Sadykhov, E.; Sagidova, N.; Saitta, B.; Salustino Guimaraes, V.; Sanchez Mayordomo, C.; Sanmartin Sedes, B.; Santacesaria, R.; Santamarina Rios, C.; Santimaria, M.; Santovetti, E.; Sarpis, G.; Sarti, A.; Satriano, C.; Satta, A.; Saunders, D. M.; Savrina, D.; Schael, S.; Schellenberg, M.; Schiller, M.; Schindler, H.; Schmelling, M.; Schmelzer, T.; Schmidt, B.; Schneider, O.; Schopper, A.; Schreiner, H. F.; Schubiger, M.; Schune, M.-H.; Schwemmer, R.; Sciascia, B.; Sciubba, A.; Semennikov, A.; Sepulveda, E. S.; Sergi, A.; Serra, N.; Serrano, J.; Sestini, L.; Seuthe, A.; Seyfert, P.; Shapkin, M.; Shapoval, I.; Shcheglov, Y.; Shears, T.; Shekhtman, L.; Shevchenko, V.; Siddi, B. G.; Silva Coutinho, R.; Silva de Oliveira, L.; Simi, G.; Simone, S.; Sirendi, M.; Skidmore, N.; Skwarnicki, T.; Smith, E.; Smith, I. T.; Smith, J.; Smith, M.; Soares Lavra, l.; Sokoloff, M. D.; Soler, F. J. P.; Souza De Paula, B.; Spaan, B.; Spradlin, P.; Sridharan, S.; Stagni, F.; Stahl, M.; Stahl, S.; Stefko, P.; Stefkova, S.; Steinkamp, O.; Stemmle, S.; Stenyakin, O.; Stepanova, M.; Stevens, H.; Stone, S.; Storaci, B.; Stracka, S.; Stramaglia, M. E.; Straticiuc, M.; Straumann, U.; Sun, J.; Sun, L.; Sutcliffe, W.; Swientek, K.; Syropoulos, V.; Szumlak, T.; Szymanski, M.; T'Jampens, S.; Tayduganov, A.; Tekampe, T.; Tellarini, G.; Teubert, F.; Thomas, E.; van Tilburg, J.; Tilley, M. J.; Tisserand, V.; Tobin, M.; Tolk, S.; Tomassetti, L.; Tonelli, D.; Toriello, F.; Tourinho Jadallah Aoude, R.; Tournefier, E.; Traill, M.; Tran, M. T.; Tresch, M.; Trisovic, A.; Tsaregorodtsev, A.; Tsopelas, P.; Tully, A.; Tuning, N.; Ukleja, A.; Usachov, A.; Ustyuzhanin, A.; Uwer, U.; Vacca, C.; Vagner, A.; Vagnoni, V.; Valassi, A.; Valat, S.; Valenti, G.; Vazquez Gomez, R.; Vazquez Regueiro, P.; Vecchi, S.; van Veghel, M.; Velthuis, J. J.; Veltri, M.; Veneziano, G.; Venkateswaran, A.; Verlage, T. A.; Vernet, M.; Vesterinen, M.; Viana Barbosa, J. V.; Viaud, B.; Vieira, D.; Vieites Diaz, M.; Viemann, H.; Vilasis-Cardona, X.; Vitti, M.; Volkov, V.; Vollhardt, A.; Voneki, B.; Vorobyev, A.; Vorobyev, V.; Voß, C.; de Vries, J. A.; Vázquez Sierra, C.; Waldi, R.; Wallace, C.; Wallace, R.; Walsh, J.; Wang, J.; Ward, D. R.; Wark, H. M.; Watson, N. K.; Websdale, D.; Weiden, A.; Weisser, C.; Whitehead, M.; Wicht, J.; Wilkinson, G.; Wilkinson, M.; Williams, M.; Williams, M. P.; Williams, M.; Williams, T.; Wilson, F. F.; Wimberley, J.; Winn, M.; Wishahi, J.; Wislicki, W.; Witek, M.; Wormser, G.; Wotton, S. A.; Wraight, K.; Wyllie, K.; Xie, Y.; Xu, M.; Xu, Z.; Yang, Z.; Yang, Z.; Yao, Y.; Yin, H.; Yu, J.; Yuan, X.; Yushchenko, O.; Zarebski, K. A.; Zavertyaev, M.; Zhang, L.; Zhang, Y.; Zhelezov, A.; Zheng, Y.; Zhu, X.; Zhukov, V.; Zonneveld, J. B.; Zucchelli, S.

    2017-11-01

    A measurement is presented of decay-time-dependent CP violation in the decays B 0 → J/ ψ K S 0 and B 0 → ψ(2 S) K S 0 , where the J/ ψ is reconstructed from two electrons and the ψ(2 S) from two muons. The analysis uses a sample of pp collision data recorded with the LHCb experiment at centre-of-mass energies of 7 and 8 TeV, corresponding to an integrated luminosity of 3 fb-1. The CP -violation observables are measured to be C({B}^0\\to J/ψ {K}S^0)=0.12± 0.07± 0.02, {}S({B}^0\\to J/ψ {K}S^0)=0.83± 0.08± 0.01, {}C({B}^0\\to ψ (2S){K}S^0)=-0.05± 0.10± 0.01, {}S({B}^0\\to ψ (2S){K}S^0)=0.84± 0.10± 0.01, where C describes CP violation in the direct decay, and S describes CP violation in the interference between the amplitudes for the direct decay and for the decay after {B}^0-{\\overline{B}}^0 oscillation. The first uncertainties are statistical and the second are systematic. The two sets of results are compatible with the previous LHCb measurement using B 0 → J/ ψ K S 0 decays, where the J/ ψ meson was reconstructed from two muons. The averages of all three sets of LHCb results are C({B}^0\\to [c\\overline{c}]{K}S^0)=-0.017± 0.029, {}S({B}^0\\to [c\\overline{c}]{K}S^0)=0.760± 0.034, under the assumption that higher-order contributions to the decay amplitudes are negligible. The uncertainties include statistical and systematic contributions. [Figure not available: see fulltext.

  12. Strategic planning for national security: Lessons from business experience. Interim report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bracken, P.

    1990-02-01

    United States defense planning is at a crossroads and it is therefore useful to review not only discrete issues, but even basic concepts of strategic planning. This Note reviews concepts used in the business world to build insights about how to view current and prospective problems, opportunities, and choices. The author draws upon the business literature for both ideas and metaphors. He observes that U.S. national security planning could profit greatly from an approach that distinguishes among core, environmental, and hedging strategies, and that considers security analogs to such business concepts as defining the business, dealing with new competitors, controllingmore » the intensity of competition, entry and exit barriers, and the need to redeploy assets and restructure the organization. He then relates these concepts to specific problems of national security interest.« less

  13. Augmented Reality for Searching Potential Assets in Medan using GPS based Tracking

    NASA Astrophysics Data System (ADS)

    Muchtar, M. A.; Syahputra, M. F.; Syahputra, N.; Ashrafia, S.; Rahmat, R. F.

    2017-01-01

    Every city is required to introduce its variety of potential assets so that the people know how to utilize or to develop their area. Potential assets include infrastructure, facilities, people, communities, organizations, customs that affects the characteristics and the way of life in Medan. Due to lack of socialization and information, most of people in Medan only know a few parts of the assets. Recently, so many mobile apps provide search and mapping locations used to find the location of potential assets in user’s area. However, the available information, such as text and digital maps, sometimes do not much help the user clearly and dynamically. Therefore, Augmented Reality technology able to display information in real world vision is implemented in this research so that the information can be more interactive and easily understood by user. This technology will be implemented in mobile apps using GPS based tracking and define the coordinate of user’s smartphone as a marker so that it can help people dynamically and easily find the location of potential assets in the nearest area based on the direction of user’s view on camera.

  14. Zwitterion mediator/quenchers. Coulombic minimization of the back-reaction in photocatalysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brugger, P.A.; Graetzel, M.; Guarr, T.

    1982-03-18

    Zwitterionic analogues of methyl viologen, N,N'-bis(carboxyethyl)-4,4'-bipyridyl (CEB), and N,N'-bis(sulfonatopropyl)-4,4'-bipyridyl (SPB) have been studied as electron-transfer quenchers of excited-state photocatalysts. The molecules are formally neutral when oxidized but become negatively charged when reduced. This charge buildup minimizes undesirable back-recombination of the photogenerated redox products. This Coulombic effect is demonstrated both by direct flash photolysis measurements of back-recombination and by catalytic studies of water reduction. Results are compared for the zwitterion quenchers and methyl viologen, reacting with soluble anionic porphyrins and with micelle-associated reactants. For the anionic porphyrin system zinc tetrakis (sulfonatophenyl)porphyrin(4-) the rates of back-recombination are as follows: ZnTSPP/sup 3 -/more » + MV/sup +/...-->.. ZnTSPP/sup 4 -/ + MV/sup 2 +/ (k), k = 2 x 10/sup 9/M/sup -1/s/sup -1/; ZnTSPP/sup 3 -/ + CEB/sup -/. ..-->.. ZnTSPP/sup 4 -/ + CEB +- (k), k = 6 x 10/sup 8/ M/sup -1/ s/sup -1/. In a corresponding catalytic system incorporating ZnTPPS as the photoacceptor, CEB or methyl viologen as the quencher, and N-phenylglycine as the electron donor, a >2-fold enhancement of catalysis is observed by replacing MV/sup 2 +/ with CEB. These events can be greatly accentuated by increasing the charge on the components, via micellar localization. Thus, by using an amphiphilic derivative of Ru(bpy)/sub 3//sup 2 +/ as photoactive donor solubilized in anionic micelles and SPB as electron acceptor, one can achieve 200-fold reduction in the rate of the back-reaction.« less

  15. 12 CFR 9.14 - Deposit of securities with state authorities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... than assets (e.g., a requirement to deposit a fixed amount or an amount equal to a percentage of... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Deposit of securities with state authorities. 9... ACTIVITIES OF NATIONAL BANKS Regulations § 9.14 Deposit of securities with state authorities. (a) In general...

  16. Measuring K S 0 K ± interactions using Pb–Pb collisions at s NN = 2.76 TeV

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Acharya, S.; Adamová, D.; Adolfsson, J.

    We present the first ever measurements of femtoscopic correlations between the K S 0 and K ± particles. The analysis was performed on the data from Pb–Pb collisions at √ sNN =2.76 TeV measured by the ALICE experiment. The observed femtoscopic correlations are consistent with final-state interactions proceeding via the a 0(980) resonance. The extracted kaon source radius and correlation strength parameters for K S 0K - are found to be equal within the experimental uncertainties to those for K S 0K +. Comparing the results of the present study with those from published identical-kaon femtoscopic studies by ALICE, massmore » and coupling parameters for the a 0 resonance are tested. Our results are also compatible with the interpretation of the a 0 having a tetraquark structure instead of that of a diquark.« less

  17. Measuring K S 0 K ± interactions using Pb–Pb collisions at s NN = 2.76 TeV

    DOE PAGES

    Acharya, S.; Adamová, D.; Adolfsson, J.; ...

    2017-09-08

    We present the first ever measurements of femtoscopic correlations between the K S 0 and K ± particles. The analysis was performed on the data from Pb–Pb collisions at √ sNN =2.76 TeV measured by the ALICE experiment. The observed femtoscopic correlations are consistent with final-state interactions proceeding via the a 0(980) resonance. The extracted kaon source radius and correlation strength parameters for K S 0K - are found to be equal within the experimental uncertainties to those for K S 0K +. Comparing the results of the present study with those from published identical-kaon femtoscopic studies by ALICE, massmore » and coupling parameters for the a 0 resonance are tested. Our results are also compatible with the interpretation of the a 0 having a tetraquark structure instead of that of a diquark.« less

  18. Ten rules for asset protection planning.

    PubMed

    Adkisson, Jay D; Keller, Lawrence B

    2013-12-01

    Asset protection planning is a highly technical area of legal planning. Because of the fraudulent transfer laws, asset protection planning must be done in advance of any claim, be technically sound, not rely upon secrecy, and avoid any number of critical mistakes including keeping personal and business assets separate. Physicians who engage in asset protection planning must avoid critical mistakes, and not count on bankruptcy to provide relief from creditors. General rules and cautions for those who are considering the creation of an asset protection plan for their personal assets.

  19. A System Architecture to Support a Verifiably Secure Multilevel Security System.

    DTIC Science & Technology

    1980-06-01

    4] Newmann, P.G., R. Fabry, K. Levitt, L. Robin - provide a tradeoff between cost and system secur- son, J. Wensley , "On the Design of a Provably ity...ICS-80/05 NL 112. 11W1 --1.25 1111 6 Mli,’O~ll Rl OIIION W AII .q3 0 School of Information and Computer Science S =GEORGIA INSTITUTE OF TECHNOLOGY 808...Multilevel Security Systemt (Extended Abstract) George I. Davida Department of Electical Engineering and Computer Science University of Wisconsin

  20. A Model for settlement of health insurance organizations’ debt to health service delivery institutions

    PubMed Central

    Abolhallaj, Masood; Hosseini, Seyed Mohammadreza; Jafari, Mehdi; Alaei, Fatemeh

    2017-01-01

    Background: Sukuk is a type of financial instrument backed by balance sheet and physical assets. This applied and descriptive study aimed at providing solutions to the problems faced by insurance companies in the health sector. Methods: In this study, we achieved operational models by reviewing the release nature and mechanism of any of the securities and combining them. Results: According to the model presented in this study, 2 problems could be solved: settling the past debts and avoiding future debts. This model was deigned based on asset backed securities. Conclusion: Utilizing financing instruments (such as Sukuk), creating investment funds, and finding a solution to this problem, this study was conducted in 2 aspects: (1) models that are settling old debts of the organization, and (2) models that prevent debts in the future.

  1. Streamlining Building Efficiency Evaluation with DOE's Asset Score Preview

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goel, Supriya; Wang, Nora; Gonzalez, Juan

    2016-08-26

    Building Energy Asset Score (Asset Score), developed by the Pacific Northwest National Laboratory (PNNL) for the U.S. Department of Energy (DOE), is a tool to help building owners and managers assess the efficiency of a building's energy-related systems and encourage investment in cost-effective improvements. The Asset Score uses an EnergyPlus model to provide a quick assessment of building energy performance with minimum user inputs of building characteristics and identifies upgrade opportunities. Even with a reduced set of user inputs, data collection remains a challenge for wide-spread adoption, especially when evaluating a large number of buildings. To address this, Asset Scoremore » Preview was developed to allow users to enter as few as seven building characteristics to quickly assess their buildings before a more in-depth analysis. A streamlined assessment from Preview to full Asset Score provides an easy entry point and also enables users who manage a large number of buildings to screen and prioritize buildings that can benefit most from a more detailed evaluation and possible energy efficiency upgrades without intensive data collection.« less

  2. Security Vulnerability and Patch Management in Electric Utilities: A Data-Driven Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li, Qinghua; Zhang, Fengli

    This paper explores a real security vulnerability and patch management dataset from an electric utility in order to shed light on characteristics of the vulnerabilities that electric utility assets have and how they are remediated in practice. Specifically, it first analyzes the distribution of vulnerabilities over software, assets, and other metric. Then it analyzes how vulnerability features affect remediate actions.

  3. AVIATION SECURITY: Terrorist Acts Demonstrate Urgent Need to Improve Security at the Nation’s Airports

    DTIC Science & Technology

    2001-09-20

    what actually occurred or what all the weaknesses in the nation’s aviation security apparatus are that contributed to the horrendous events of last week...it is clear that serious weaknesses exist in our aviation security system and that their impact can be far more devastating than previously imagined...offer some observations about improving aviation security in these various areas.

  4. The Treatment of Assets and Income From Assets in Income-Conditioned Government Benefit Programs; Technical Papers.

    ERIC Educational Resources Information Center

    Wisconsin Univ., Madison. Inst. for Research on Poverty.

    These technical papers were presented at the Conference on Treatment of Assets and Income from Assets in Income Conditioned Programs. Six papers dealing with current and alternative treatments of assets and income from assets in programs that offer both cash and noncash benefits were presented. The first three authors reviewed the network of rules…

  5. Carbon Back Sputter Modeling for Hall Thruster Testing

    NASA Technical Reports Server (NTRS)

    Gilland, James H.; Williams, George J.; Burt, Jonathan M.; Yim, John Tamin

    2016-01-01

    Lifetime requirements for electric propulsion devices, including Hall Effect thrusters, are continually increasing, driven in part by NASA's inclusion of this technology in it's exploration architecture. NASA will demonstrate high-power electric propulsion system on the Solar Electric Propulsion Technology Demonstration Mission (SEP TDM). The Asteroid Redirect Robotic mission is one candidate SEP TDM, which is projected to require tens of thousands of thruster life. As thruster life is increased, for example through the use of improved magnetic field designs, the relative influence of facility effects increases. One such effect is the sputtering and redeposition, or back sputter, of facility materials by the high energy thruster plumes. In support of wear testing for the Hall Effect Rocket with Magnetic Shielding (HERMeS) project, the back sputter from a Hall effect thruster plume has been modeled for the NASA Glenn Research Center's Vacuum Facility 5. The predicted wear at a near-worst case condition of 600 V, 12.5 kW was found to be on the order of 1 micron/kh in a fully carbon-lined chamber. A more detailed numerical Monte Carlo code was also modified to estimate back sputter for a detailed facility and pumping configuration. This code demonstrated similar back sputter rate distributions, but is not yet accurately modeling the magnitudes. The modeling has been benchmarked to recent HERMeS wear testing, using multiple microbalance measurements. These recent measurements have yielded values on the order of 1.5 - 2 micron/kh at 600 V and 12.5 kW.

  6. Measurement of the e + e - → K s 0 K ± π ∓ π 0 and K s 0 K ± π ∓ η cross sections using initial-state radiation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lees, J. P.; Poireau, V.; Tisserand, V.

    The processes e + e - → Kmore » $$0\\atop{S}$$ K ±π ∓π 0 and e + e - → K$$0\\atop{S}$$ K ±π ∓η are studied over a continuum of energies from threshold to 4 GeV with the initial-state photon radiation method. Using 454 fb -1 of data collected with the BABAR detector at the SLAC PEP-II storage ring, the first measurements of the cross sections for these processes are obtained. The intermediate resonance structures from K* 0(Kπ) 0, K *(892) ± (Kπ) ∓ , and K$$0\\atop{S}$$K ±ρ ∓ are studied. Lastly, the J / ψ is observed in all of these channels, and corresponding branching fractions are measured.« less

  7. Measurement of the e + e - → K s 0 K ± π ∓ π 0 and K s 0 K ± π ∓ η cross sections using initial-state radiation

    DOE PAGES

    Lees, J. P.; Poireau, V.; Tisserand, V.; ...

    2017-05-30

    The processes e + e - → Kmore » $$0\\atop{S}$$ K ±π ∓π 0 and e + e - → K$$0\\atop{S}$$ K ±π ∓η are studied over a continuum of energies from threshold to 4 GeV with the initial-state photon radiation method. Using 454 fb -1 of data collected with the BABAR detector at the SLAC PEP-II storage ring, the first measurements of the cross sections for these processes are obtained. The intermediate resonance structures from K* 0(Kπ) 0, K *(892) ± (Kπ) ∓ , and K$$0\\atop{S}$$K ±ρ ∓ are studied. Lastly, the J / ψ is observed in all of these channels, and corresponding branching fractions are measured.« less

  8. Estimating the value of a Country's built assets: investment-based exposure modelling for global risk assessment

    NASA Astrophysics Data System (ADS)

    Daniell, James; Pomonis, Antonios; Gunasekera, Rashmin; Ishizawa, Oscar; Gaspari, Maria; Lu, Xijie; Aubrecht, Christoph; Ungar, Joachim

    2017-04-01

    In order to quantify disaster risk, there is a demand and need for determining consistent and reliable economic value of built assets at national or sub national level exposed to natural hazards. The value of the built stock in the context of a city or a country is critical for risk modelling applications as it allows for the upper bound in potential losses to be established. Under the World Bank probabilistic disaster risk assessment - Country Disaster Risk Profiles (CDRP) Program and rapid post-disaster loss analyses in CATDAT, key methodologies have been developed that quantify the asset exposure of a country. In this study, we assess the complementary methods determining value of building stock through capital investment data vs aggregated ground up values based on built area and unit cost of construction analyses. Different approaches to modelling exposure around the world, have resulted in estimated values of built assets of some countries differing by order(s) of magnitude. Using the aforementioned methodology of comparing investment data based capital stock and bottom-up unit cost of construction values per square meter of assets; a suitable range of capital stock estimates for built assets have been created. A blind test format was undertaken to compare the two types of approaches from top-down (investment) and bottom-up (construction cost per unit), In many cases, census data, demographic, engineering and construction cost data are key for bottom-up calculations from previous years. Similarly for the top-down investment approach, distributed GFCF (Gross Fixed Capital Formation) data is also required. Over the past few years, numerous studies have been undertaken through the World Bank Caribbean and Central America disaster risk assessment program adopting this methodology initially developed by Gunasekera et al. (2015). The range of values of the building stock is tested for around 15 countries. In addition, three types of costs - Reconstruction cost

  9. Technology Refresh: Five Steps to Upgrading Your District's IT Assets

    ERIC Educational Resources Information Center

    Meserve, Susie

    2006-01-01

    While most K-12 technology leaders appreciate that technology refresh--the periodic replacement of an organization's technology--is more complex than shopping for appliances, they do not necessarily have the tools to create a sustainable and comprehensive plan to upgrade their assets. Having a solid tech refresh plan helps ensure that teachers and…

  10. 24 CFR 990.270 - Asset management.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 4 2012-04-01 2012-04-01 false Asset management. 990.270 Section... THE PUBLIC HOUSING OPERATING FUND PROGRAM Asset Management § 990.270 Asset management. As owners, PHAs have asset management responsibilities that are above and beyond property management activities. These...

  11. 24 CFR 990.270 - Asset management.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 4 2011-04-01 2011-04-01 false Asset management. 990.270 Section... THE PUBLIC HOUSING OPERATING FUND PROGRAM Asset Management § 990.270 Asset management. As owners, PHAs have asset management responsibilities that are above and beyond property management activities. These...

  12. 24 CFR 990.270 - Asset management.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Asset management. 990.270 Section... THE PUBLIC HOUSING OPERATING FUND PROGRAM Asset Management § 990.270 Asset management. As owners, PHAs have asset management responsibilities that are above and beyond property management activities. These...

  13. 24 CFR 990.270 - Asset management.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Asset management. 990.270 Section... THE PUBLIC HOUSING OPERATING FUND PROGRAM Asset Management § 990.270 Asset management. As owners, PHAs have asset management responsibilities that are above and beyond property management activities. These...

  14. Design and Implementation of a Secure Modbus Protocol

    NASA Astrophysics Data System (ADS)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  15. Packaging Software Assets for Reuse

    NASA Astrophysics Data System (ADS)

    Mattmann, C. A.; Marshall, J. J.; Downs, R. R.

    2010-12-01

    The reuse of existing software assets such as code, architecture, libraries, and modules in current software and systems development projects can provide many benefits, including reduced costs, in time and effort, and increased reliability. Many reusable assets are currently available in various online catalogs and repositories, usually broken down by disciplines such as programming language (Ibiblio for Maven/Java developers, PyPI for Python developers, CPAN for Perl developers, etc.). The way these assets are packaged for distribution can play a role in their reuse - an asset that is packaged simply and logically is typically easier to understand, install, and use, thereby increasing its reusability. A well-packaged asset has advantages in being more reusable and thus more likely to provide benefits through its reuse. This presentation will discuss various aspects of software asset packaging and how they can affect the reusability of the assets. The characteristics of well-packaged software will be described. A software packaging domain model will be introduced, and some existing packaging approaches examined. An example case study of a Reuse Enablement System (RES), currently being created by near-term Earth science decadal survey missions, will provide information about the use of the domain model. Awareness of these factors will help software developers package their reusable assets so that they can provide the most benefits for software reuse.

  16. Using K-12 Lessons Learned about How to Balance Accessibility and Test Security to Inform Licensure, Credentialing, and Certification Exam Policies

    ERIC Educational Resources Information Center

    Lazarus, Sheryl S.; van den Heuvel, Jill R.; Thurlow, Martha L.

    2017-01-01

    This paper explores how to balance test security and accessibility on licensure, credentialing, and certification exams. It examines K-12 test security policies related to educational assessments across states to discover lessons learned about how to meet accessibility needs of individuals with disabilities while minimizing test security risks. It…

  17. U.S.-CHINA RADIOLOGICAL SOURCE SECURITY PROJECT: CONTINUING AND EXPANDING BILATERAL COOPERATION

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun

    2009-10-07

    The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy’s National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic andmore » beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.« less

  18. Improving organisational resilience through enterprise security risk management.

    PubMed

    Petruzzi, John; Loyear, Rachelle

    Enterprise Security Risk Management (ESRM) is a new philosophy and method of managing security programmes through the use of traditional risk principles. As a philosophy and life cycle, ESRM is focused on creating a business partnership between security practitioners and business leaders to more effectively provide protection against security risks in line with acceptable risk tolerances as defined by business asset owners and stakeholders. This paper explores the basics of the ESRM philosophy and life cycle and also shows how embracing the ESRM philosophy and implementing a risk-based security management model in the business organisation can lead to higher levels of organisational resilience as desired by organisation leaders, executives and the board of directors.

  19. An Asset-Based Approach to Tribal Community Energy Planning

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gutierrez, Rachael A.; Martino, Anthony; Begay, Sandra K.

    Community energy planning is a vital component of successful energy resource development and project implementation. Planning can help tribes develop a shared vision and strategies to accomplish their energy goals. This paper explores the benefits of an asset-based approach to tribal community energy planning. While a framework for community energy planning and federal funding already exists, some areas of difficulty in the planning cycle have been identified. This paper focuses on developing a planning framework that offsets those challenges. The asset-based framework described here takes inventory of a tribe’s capital assets, such as: land capital, human capital, financial capital, andmore » political capital. Such an analysis evaluates how being rich in a specific type of capital can offer a tribe unique advantages in implementing their energy vision. Finally, a tribal case study demonstrates the practical application of an asset-based framework.« less

  20. 17 CFR 210.3-10 - Financial statements of guarantors and issuers of guaranteed securities registered or being...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., no independent assets or operations, minor, finance subsidiary and operating subsidiary. Paragraph (i....220f of this chapter). (b) Finance subsidiary issuer of securities guaranteed by its parent company. When a finance subsidiary issues securities and its parent company guarantees those securities, the...

  1. 17 CFR 250.41 - Exemption of public utility subsidiaries with respect to limited acquisition of utility assets.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Exemption of public utility subsidiaries with respect to limited acquisition of utility assets. Any public... derived from its operations as a public-utility company during the preceding calendar year. (d... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of public utility...

  2. Using Ecological Asset Mapping to Investigate Pre-Service Teachers' Cultural Assets

    ERIC Educational Resources Information Center

    Borrero, Noah; Yeh, Christine

    2016-01-01

    We examined the impact of a pedagogical strategy, ecological asset mapping, on 19 pre-service teachers' self-exploration, development of respect for others, and critical examination of social injustice. Data were analyzed from participants' ecological asset maps and essays describing the experience of completing and sharing the maps. The analysis…

  3. 12 CFR 390.471 - Purchased credit card relationships, servicing assets, intangible assets (other than purchased...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... THE OFFICE OF THRIFT SUPERVISION Capital § 390.471 Purchased credit card relationships, servicing...

  4. 12 CFR 390.471 - Purchased credit card relationships, servicing assets, intangible assets (other than purchased...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... THE OFFICE OF THRIFT SUPERVISION Capital § 390.471 Purchased credit card relationships, servicing...

  5. 12 CFR 390.471 - Purchased credit card relationships, servicing assets, intangible assets (other than purchased...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... THE OFFICE OF THRIFT SUPERVISION Capital § 390.471 Purchased credit card relationships, servicing...

  6. Application of the API/NPRA SVA methodology to transportation security issues.

    PubMed

    Moore, David A

    2006-03-17

    Security vulnerability analysis (SVA) is becoming more prevalent as the issue of chemical process security is of greater concern. The American Petroleum Institute (API) and the National Petrochemical and Refiner's Association (NPRA) have developed a guideline for conducting SVAs of petroleum and petrochemical facilities in May 2003. In 2004, the same organizations enhanced the guidelines by adding the ability to evaluate transportation security risks (pipeline, truck, and rail). The importance of including transportation and value chain security in addition to fixed facility security in a SVA is that these issues may be critically important to understanding the total risk of the operation. Most of the SVAs done using the API/NPRA SVA and other SVA methods were centered on the fixed facility and the operations within the plant fence. Transportation interfaces alone are normally studied as a part of the facility SVA, and the entire transportation route impacts and value chain disruption are not commonly considered. Particularly from a national, regional, or local infrastructure analysis standpoint, understanding the interdependencies is critical to the risk assessment. Transportation risks may include weaponization of the asset by direct attack en route, sabotage, or a Trojan Horse style attack into a facility. The risks differ in the level of access control and the degree of public exposures, as well as the dynamic nature of the assets. The public exposures along the transportation route need to be carefully considered. Risks may be mitigated by one of many strategies including internment, staging, prioritization, conscription, or prohibition, as well as by administrative security measures and technology for monitoring and isolating the assets. This paper illustrates how these risks can be analyzed by the API/NPRA SVA methodology. Examples are given of a pipeline operation, and other examples are found in the guidelines.

  7. Security Concepts for Satellite Links

    NASA Astrophysics Data System (ADS)

    Tobehn, C.; Penné, B.; Rathje, R.; Weigl, A.; Gorecki, Ch.; Michalik, H.

    2008-08-01

    The high costs to develop, launch and maintain a satellite network makes protecting the assets imperative. Attacks may be passive such as eavesdropping on the payload data. More serious threat are active attacks that try to gain control of the satellite, which may lead to the total lost of the satellite asset. To counter these threats, new satellite and ground systems are using cryptographic technologies to provide a range of services: confidentiality, entity & message authentication, and data integrity. Additionally, key management cryptographic services are required to support these services. This paper describes the key points of current satellite control and operations, that are authentication of the access to the satellite TMTC link and encryption of security relevant TM/TC data. For payload data management the key points are multi-user ground station access and high data rates both requiring frequent updates and uploads of keys with the corresponding key management methods. For secure satellite management authentication & key negotiation algorithms as HMAC-RIPEMD160, EC- DSA and EC-DH are used. Encryption of data uses algorithms as IDEA, AES, Triple-DES, or other. A channel coding and encryption unit for payload data provides download data rates up to Nx250 Mbps. The presented concepts are based on our experience and heritage of the security systems for all German MOD satellite projects (SATCOMBw2, SAR-Lupe multi- satellite system and German-French SAR-Lupe-Helios- II systems inter-operability) as well as for further international (KOMPSAT-II Payload data link system) and ESA activities (TMTC security and GMES).

  8. Rethinking Social Welfare: Toward Assets.

    ERIC Educational Resources Information Center

    Sherraden, Michael

    1988-01-01

    Suggests that social welfare policy focus on household assets. Asset distribution is less unequal than income distribution. Assets cushion income shocks, reduce household transaction costs, and provide a stake in the future. Reviews the current policy debate. Discusses policy directions in direct financial transfers, housing, and support for…

  9. Security Assistance: U.S. and International Historical Perspectives

    DTIC Science & Technology

    2006-08-01

    Major Schumann’s study , A transformational approach to US security assistance – the case of Romania. 45 Quadrennial Defense Review Report (QDRR...545 A Transformational Approach to Security Assistance: The Case of Romania by Major Drew Schumann...intent of this study is to examine a small group of nineteenth- and twentieth-century cases in search of useful, or at least noteworthy

  10. 76 FR 5072 - Cuban Assets Control Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-28

    ... DEPARTMENT OF THE TREASURY Office of Foreign Assets Control 31 CFR Part 515 Cuban Assets Control Regulations AGENCY: Office of Foreign Assets Control, Treasury. ACTION: Final rule. SUMMARY: The Department of the Treasury's Office of Foreign Assets Control (``OFAC'') is amending the Cuban Assets Control...

  11. 77 FR 71530 - Cuban Assets Control Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-03

    ... DEPARTMENT OF THE TREASURY Office of Foreign Assets Control 31 CFR Part 515 Cuban Assets Control Regulations AGENCY: Office of Foreign Assets Control, Treasury. ACTION: Final rule. SUMMARY: The Department of the Treasury's Office of Foreign Assets Control (``OFAC'') is amending the Cuban Assets Control...

  12. 75 FR 10996 - Cuban Assets Control Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-10

    ... DEPARTMENT OF THE TREASURY Office of Foreign Assets Control 31 CFR Part 515 Cuban Assets Control Regulations AGENCY: Office of Foreign Assets Control, Treasury. ACTION: Final rule. SUMMARY: The Department of the Treasury's Office of Foreign Assets Control (``OFAC'') is amending the Cuban Assets Control...

  13. The Cost of Deploying a Role 2 Medical Asset to Afghanistan.

    PubMed

    Childers, Richard; Parker, Paul

    2015-11-01

    The costs of military assets, including medical resources, are necessary for military planners when determining their force make up. The monetary cost of operating a Role 3 unit, the most comprehensive medical asset in the combat theater, has been determined. The cost of operating a Role 2 (R2) facility-the less comprehensive but more common asset-has not been assessed. Here we estimate the cost of operating an R2 medical asset in Afghanistan. Personnel costs were assessed by combining the U.S. Department of Defense estimate for personnel cost with the replacement costs for deployed staff. Manning was for a U.S. Marine Corps Shock Trauma Platoon and Forward Resuscitative Surgical System. It costs $2,956,873 a month to operate an R2 medical facility in Afghanistan. It also takes the place of a rifle platoon and disrupts the domestic military health care mission. The costs of operating an R2 medical facility are significant and should be considered when the medical benefits of an R2 are unclear. Reprint & Copyright © 2015 Association of Military Surgeons of the U.S.

  14. 12 CFR 160.160 - Asset classification.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Asset classification. 160.160 Section 160.160....160 Asset classification. (a)(1) Each savings association must evaluate and classify its assets on a regular basis in a manner consistent with, or reconcilable to, the asset classification system used by the...

  15. 12 CFR 160.160 - Asset classification.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Asset classification. 160.160 Section 160.160....160 Asset classification. (a)(1) Each savings association must evaluate and classify its assets on a regular basis in a manner consistent with, or reconcilable to, the asset classification system used by the...

  16. 12 CFR 160.160 - Asset classification.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Asset classification. 160.160 Section 160.160....160 Asset classification. (a)(1) Each savings association must evaluate and classify its assets on a regular basis in a manner consistent with, or reconcilable to, the asset classification system used by the...

  17. Usage of cornea and sclera back reflected images captured in security cameras for forensic and card games applications

    NASA Astrophysics Data System (ADS)

    Zalevsky, Zeev; Ilovitsh, Asaf; Beiderman, Yevgeny

    2013-10-01

    We present an approach allowing seeing objects that are hidden and that are not positioned in direct line of sight with security inspection cameras. The approach is based on inspecting the back reflections obtained from the cornea and the sclera of the eyes of people attending the inspected scene and which are positioned in front of the hidden objects we aim to image after performing proper calibration with point light source (e.g. a LED). The scene can be a forensic scene or for instance a casino in which the application is to see the cards of poker players seating in front of you.

  18. Norwegian Security Determinants: Deterrence and Reassurance.

    DTIC Science & Technology

    1984-03-01

    September 1979, pp. 20-25; Rear Admiral 104 |eve Roy Breivik , R.N.N., Inspector General, "Assuring the Security of Reinforcements to Norway," NATO’s Fift...2-15; a:zc $ Patrick Wall, "The Third Battle of the Atlantic," i Power, July 1981, pp. 52-57. 11 Richard K. Betts, "Surprise Attack: NATO’s...Force," NATO’s Fifteen Nations, December 1977-January 1978, pp. 81-89. 186 Breivik , Pear Admiral Roy, R.N.N., "Assuring the Security: of Reinforcements

  19. Foreign Ownership of U.S. Financial Assets: Implications of a Withdrawal

    DTIC Science & Technology

    2008-01-14

    interest rate derivatives, which are the most widely used hedges against movements in currencies, were valued at $243 trillion in 2006, nearly 60% larger... arbitrage and investment opportunities to acquire assets that investors likely would deem to be temporarily undervalued. As a result, investors likely would

  20. 26 CFR 31.3121(k)-4 - Constructive filing of waivers of exemption from social security taxes by certain tax-exempt...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... from social security taxes by certain tax-exempt organizations. 31.3121(k)-4 Section 31.3121(k)-4... Contributions Act (Chapter 21, Internal Revenue Code of 1954) General Provisions § 31.3121(k)-4 Constructive... organization did not file a valid waiver certificate under section 3121(k)(1) of the Internal Revenue Code of...

  1. 26 CFR 31.3121(k)-4 - Constructive filing of waivers of exemption from social security taxes by certain tax-exempt...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... from social security taxes by certain tax-exempt organizations. 31.3121(k)-4 Section 31.3121(k)-4... Contributions Act (Chapter 21, Internal Revenue Code of 1954) General Provisions § 31.3121(k)-4 Constructive... organization did not file a valid waiver certificate under section 3121(k)(1) of the Internal Revenue Code of...

  2. 26 CFR 31.3121(k)-4 - Constructive filing of waivers of exemption from social security taxes by certain tax-exempt...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... from social security taxes by certain tax-exempt organizations. 31.3121(k)-4 Section 31.3121(k)-4... Contributions Act (Chapter 21, Internal Revenue Code of 1954) General Provisions § 31.3121(k)-4 Constructive... organization did not file a valid waiver certificate under section 3121(k)(1) of the Internal Revenue Code of...

  3. 26 CFR 31.3121(k)-4 - Constructive filing of waivers of exemption from social security taxes by certain tax-exempt...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... from social security taxes by certain tax-exempt organizations. 31.3121(k)-4 Section 31.3121(k)-4... Contributions Act (Chapter 21, Internal Revenue Code of 1954) General Provisions § 31.3121(k)-4 Constructive... organization did not file a valid waiver certificate under section 3121(k)(1) of the Internal Revenue Code of...

  4. 12 CFR 701.36 - Federal credit union ownership of fixed assets.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... officer. For example, these individuals typically hold the title of President or Treasurer/Manager... of fixed assets. (a) Scope. (1) Section 107(4) of the Federal Credit Union Act (12 U.S.C. 1757(4... premises; (3) The aggregate of all capital and operating lease payments on fixed assets, without...

  5. Verifying the secure setup of Unix client/servers and detection of network intrusion

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Feingold, R.; Bruestle, H.R.; Bartoletti, T.

    1995-07-01

    This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to checkmore » on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.« less

  6. 78 FR 261 - Moving Security Zone Around Escorted Vessels on the Lower Mississippi River

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-03

    ... Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Captain of the Port of New Orleans (COTP New... of the COTP New Orleans or the on-scene Coast Guard or enforcement agency asset to enter the security... COTP New Orleans or the on-scene asset. The COTP New Orleans will inform the public of the existence or...

  7. Asset tracking systems.

    PubMed

    2006-11-01

    Asset tracking systems are used in healthcare to find objects--medical devices and other hospital equipment--and to record the physical location of those objects over time. Interest in asset tracking is growing daily, but the technology is still evolving, and so far very few systems have been implemented in hospitals. This situation is likely to change over the next few years, at which point many hospitals will be faced with choosing a system. We evaluated four asset tracking systems from four suppliers: Agility Healthcare Solutions, Ekahau, Radianse, and Versus Technology. We judged the systems' performance for two "levels" of asset tracking. The first level is basic locating--simply determining where in the facility an item can be found. This may be done because the equipment needs routine inspection and preventive maintenance or because it is required for recall purposes; or the equipment may be needed, often urgently, for clinical use. The second level, which is much more involved, is inventory optimization and workflow improvement. This entails analyzing asset utilization based on historical location data to improve the use, distribution, and processing of equipment. None of the evaluated products is ideal for all uses--each has strengths and weaknesses. In many cases, hospitals will have to select a product based on their specific needs. For example, they may need to choose between a supplier whose system is easy to install and a supplier whose tags have a long battery operating life.

  8. Updated branching fraction measurements of B ( s) 0 → K S 0 h + h ' - decays

    NASA Astrophysics Data System (ADS)

    Aaij, R.; Adeva, B.; Adinolfi, M.; Ajaltouni, Z.; Akar, S.; Albrecht, J.; Alessio, F.; Alexander, M.; Ali, S.; Alkhazov, G.; Alvarez Cartelle, P.; Alves, A. A.; Amato, S.; Amerio, S.; Amhis, Y.; An, L.; Anderlini, L.; Andreassi, G.; Andreotti, M.; Andrews, J. E.; Appleby, R. B.; Archilli, F.; d'Argent, P.; Arnau Romeu, J.; Artamonov, A.; Artuso, M.; Aslanides, E.; Auriemma, G.; Baalouch, M.; Babuschkin, I.; Bachmann, S.; Back, J. J.; Badalov, A.; Baesso, C.; Baker, S.; Balagura, V.; Baldini, W.; Baranov, A.; Barlow, R. J.; Barschel, C.; Barsuk, S.; Barter, W.; Baryshnikov, F.; Baszczyk, M.; Batozskaya, V.; Batsukh, B.; Battista, V.; Bay, A.; Beaucourt, L.; Beddow, J.; Bedeschi, F.; Bediaga, I.; Beiter, A.; Bel, L. J.; Bellee, V.; Belloli, N.; Belous, K.; Belyaev, I.; Ben-Haim, E.; Bencivenni, G.; Benson, S.; Beranek, S.; Berezhnoy, A.; Bernet, R.; Bertolin, A.; Betancourt, C.; Betti, F.; Bettler, M.-O.; van Beuzekom, M.; Bezshyiko, Ia.; Bifani, S.; Billoir, P.; Birnkraut, A.; Bitadze, A.; Bizzeti, A.; Blake, T.; Blanc, F.; Blouw, J.; Blusk, S.; Bocci, V.; Boettcher, T.; Bondar, A.; Bondar, N.; Bonivento, W.; Bordyuzhin, I.; Borgheresi, A.; Borghi, S.; Borisyak, M.; Borsato, M.; Bossu, F.; Boubdir, M.; Bowcock, T. J. V.; Bowen, E.; Bozzi, C.; Braun, S.; Britton, T.; Brodzicka, J.; Buchanan, E.; Burr, C.; Bursche, A.; Buytaert, J.; Cadeddu, S.; Calabrese, R.; Calvi, M.; Calvo Gomez, M.; Camboni, A.; Campana, P.; Campora Perez, D. H.; Capriotti, L.; Carbone, A.; Carboni, G.; Cardinale, R.; Cardini, A.; Carniti, P.; Carson, L.; Carvalho Akiba, K.; Casse, G.; Cassina, L.; Castillo Garcia, L.; Cattaneo, M.; Cavallero, G.; Cenci, R.; Chamont, D.; Charles, M.; Charpentier, Ph.; Chatzikonstantinidis, G.; Chefdeville, M.; Chen, S.; Cheung, S. F.; Chobanova, V.; Chrzaszcz, M.; Chubykin, A.; Cid Vidal, X.; Ciezarek, G.; Clarke, P. E. L.; Clemencic, M.; Cliff, H. V.; Closier, J.; Coco, V.; Cogan, J.; Cogneras, E.; Cogoni, V.; Cojocariu, L.; Collins, P.; Comerma-Montells, A.; Contu, A.; Cook, A.; Coombs, G.; Coquereau, S.; Corti, G.; Corvo, M.; Costa Sobral, C. M.; Couturier, B.; Cowan, G. A.; Craik, D. C.; Crocombe, A.; Cruz Torres, M.; Cunliffe, S.; Currie, R.; D'Ambrosio, C.; Da Cunha Marinho, F.; Dall'Occo, E.; Dalseno, J.; Davis, A.; De Bruyn, K.; De Capua, S.; De Cian, M.; De Miranda, J. M.; De Paula, L.; De Serio, M.; De Simone, P.; Dean, C. T.; Decamp, D.; Deckenhoff, M.; Del Buono, L.; Dembinski, H.-P.; Demmer, M.; Dendek, A.; Derkach, D.; Deschamps, O.; Dettori, F.; Dey, B.; Di Canto, A.; Di Nezza, P.; Dijkstra, H.; Dordei, F.; Dorigo, M.; Dosil Suárez, A.; Dovbnya, A.; Dreimanis, K.; Dufour, L.; Dujany, G.; Dungs, K.; Durante, P.; Dzhelyadin, R.; Dziewiecki, M.; Dziurda, A.; Dzyuba, A.; Déléage, N.; Easo, S.; Ebert, M.; Egede, U.; Egorychev, V.; Eidelman, S.; Eisenhardt, S.; Eitschberger, U.; Ekelhof, R.; Eklund, L.; Ely, S.; Esen, S.; Evans, H. M.; Evans, T.; Falabella, A.; Farley, N.; Farry, S.; Fay, R.; Fazzini, D.; Ferguson, D.; Fernandez, G.; Fernandez Prieto, A.; Ferrari, F.; Ferreira Rodrigues, F.; Ferro-Luzzi, M.; Filippov, S.; Fini, R. A.; Fiore, M.; Fiorini, M.; Firlej, M.; Fitzpatrick, C.; Fiutowski, T.; Fleuret, F.; Fohl, K.; Fontana, M.; Fontanelli, F.; Forshaw, D. C.; Forty, R.; Franco Lima, V.; Frank, M.; Frei, C.; Fu, J.; Funk, W.; Furfaro, E.; Färber, C.; Gabriel, E.; Gallas Torreira, A.; Galli, D.; Gallorini, S.; Gambetta, S.; Gandelman, M.; Gandini, P.; Gao, Y.; Garcia Martin, L. M.; García Pardiñas, J.; Garra Tico, J.; Garrido, L.; Garsed, P. J.; Gascon, D.; Gaspar, C.; Gavardi, L.; Gazzoni, G.; Gerick, D.; Gersabeck, E.; Gersabeck, M.; Gershon, T.; Ghez, Ph.; Gianì, S.; Gibson, V.; Girard, O. G.; Giubega, L.; Gizdov, K.; Gligorov, V. V.; Golubkov, D.; Golutvin, A.; Gomes, A.; Gorelov, I. V.; Gotti, C.; Govorkova, E.; Graciani Diaz, R.; Granado Cardoso, L. A.; Graugés, E.; Graverini, E.; Graziani, G.; Grecu, A.; Greim, R.; Griffith, P.; Grillo, L.; Gruber, L.; Gruberg Cazon, B. R.; Grünberg, O.; Gushchin, E.; Guz, Yu.; Gys, T.; Göbel, C.; Hadavizadeh, T.; Hadjivasiliou, C.; Haefeli, G.; Haen, C.; Haines, S. C.; Hamilton, B.; Han, X.; Hansmann-Menzemer, S.; Harnew, N.; Harnew, S. T.; Harrison, J.; Hatch, M.; He, J.; Head, T.; Heister, A.; Hennessy, K.; Henrard, P.; Henry, L.; van Herwijnen, E.; Heß, M.; Hicheur, A.; Hill, D.; Hombach, C.; Hopchev, P. H.; Huard, Z.-C.; Hulsbergen, W.; Humair, T.; Hushchyn, M.; Hutchcroft, D.; Idzik, M.; Ilten, P.; Jacobsson, R.; Jalocha, J.; Jans, E.; Jawahery, A.; Jiang, F.; John, M.; Johnson, D.; Jones, C. R.; Joram, C.; Jost, B.; Jurik, N.; Kandybei, S.; Karacson, M.; Kariuki, J. M.; Karodia, S.; Kecke, M.; Kelsey, M.; Kenzie, M.; Ketel, T.; Khairullin, E.; Khanji, B.; Khurewathanakul, C.; Kirn, T.; Klaver, S.; Klimaszewski, K.; Klimkovich, T.; Koliiev, S.; Kolpin, M.; Komarov, I.; Kopecna, R.; Koppenburg, P.; Kosmyntseva, A.; Kotriakhova, S.; Kozachuk, A.; Kozeiha, M.; Kravchuk, L.; Kreps, M.; Krokovny, P.; Kruse, F.; Krzemien, W.; Kucewicz, W.; Kucharczyk, M.; Kudryavtsev, V.; Kuonen, A. K.; Kurek, K.; Kvaratskheliya, T.; Lacarrere, D.; Lafferty, G.; Lai, A.; Lanfranchi, G.; Langenbruch, C.; Latham, T.; Lazzeroni, C.; Le Gac, R.; van Leerdam, J.; Leflat, A.; Lefrançois, J.; Lefèvre, R.; Lemaitre, F.; Lemos Cid, E.; Leroy, O.; Lesiak, T.; Leverington, B.; Li, T.; Li, Y.; Li, Z.; Likhomanenko, T.; Lindner, R.; Lionetto, F.; Liu, X.; Loh, D.; Longstaff, I.; Lopes, J. H.; Lucchesi, D.; Lucio Martinez, M.; Luo, H.; Lupato, A.; Luppi, E.; Lupton, O.; Lusiani, A.; Lyu, X.; Machefert, F.; Maciuc, F.; Maev, O.; Maguire, K.; Malde, S.; Malinin, A.; Maltsev, T.; Manca, G.; Mancinelli, G.; Manning, P.; Maratas, J.; Marchand, J. F.; Marconi, U.; Marin Benito, C.; Marinangeli, M.; Marino, P.; Marks, J.; Martellotti, G.; Martin, M.; Martinelli, M.; Martinez Santos, D.; Martinez Vidal, F.; Martins Tostes, D.; Massacrier, L. M.; Massafferri, A.; Matev, R.; Mathad, A.; Mathe, Z.; Matteuzzi, C.; Mauri, A.; Maurice, E.; Maurin, B.; Mazurov, A.; McCann, M.; McNab, A.; McNulty, R.; Meadows, B.; Meier, F.; Melnychuk, D.; Merk, M.; Merli, A.; Michielin, E.; Milanes, D. A.; Minard, M.-N.; Mitzel, D. S.; Mogini, A.; Molina Rodriguez, J.; Monroy, I. A.; Monteil, S.; Morandin, M.; Morello, M. J.; Morgunova, O.; Moron, J.; Morris, A. B.; Mountain, R.; Muheim, F.; Mulder, M.; Mussini, M.; Müller, D.; Müller, J.; Müller, K.; Müller, V.; Naik, P.; Nakada, T.; Nandakumar, R.; Nandi, A.; Nasteva, I.; Needham, M.; Neri, N.; Neubert, S.; Neufeld, N.; Neuner, M.; Nguyen, T. D.; Nguyen-Mau, C.; Nieswand, S.; Niet, R.; Nikitin, N.; Nikodem, T.; Nogay, A.; O'Hanlon, D. P.; Oblakowska-Mucha, A.; Obraztsov, V.; Ogilvy, S.; Oldeman, R.; Onderwater, C. J. G.; Ossowska, A.; Otalora Goicochea, J. M.; Owen, P.; Oyanguren, A.; Pais, P. R.; Palano, A.; Palutan, M.; Papanestis, A.; Pappagallo, M.; Pappalardo, L. L.; Pappenheimer, C.; Parker, W.; Parkes, C.; Passaleva, G.; Pastore, A.; Patel, M.; Patrignani, C.; Pearce, A.; Pellegrino, A.; Penso, G.; Pepe Altarelli, M.; Perazzini, S.; Perret, P.; Pescatore, L.; Petridis, K.; Petrolini, A.; Petrov, A.; Petruzzo, M.; Picatoste Olloqui, E.; Pietrzyk, B.; Pikies, M.; Pinci, D.; Pistone, A.; Piucci, A.; Placinta, V.; Playfer, S.; Plo Casasus, M.; Poikela, T.; Polci, F.; Poli Lener, M.; Poluektov, A.; Polyakov, I.; Polycarpo, E.; Pomery, G. J.; Ponce, S.; Popov, A.; Popov, D.; Popovici, B.; Poslavskii, S.; Potterat, C.; Price, E.; Prisciandaro, J.; Prouve, C.; Pugatch, V.; Puig Navarro, A.; Punzi, G.; Qian, C.; Qian, W.; Quagliani, R.; Rachwal, B.; Rademacker, J. H.; Rama, M.; Ramos Pernas, M.; Rangel, M. S.; Raniuk, I.; Ratnikov, F.; Raven, G.; Ravonel Salzgeber, M.; Reboud, M.; Redi, F.; Reichert, S.; dos Reis, A. C.; Remon Alepuz, C.; Renaudin, V.; Ricciardi, S.; Richards, S.; Rihl, M.; Rinnert, K.; Rives Molina, V.; Robbe, P.; Rodrigues, A. B.; Rodrigues, E.; Rodriguez Lopez, J. A.; Rodriguez Perez, P.; Rogozhnikov, A.; Roiser, S.; Rollings, A.; Romanovskiy, V.; Romero Vidal, A.; Ronayne, J. W.; Rotondo, M.; Rudolph, M. S.; Ruf, T.; Ruiz Valls, P.; Saborido Silva, J. J.; Sadykhov, E.; Sagidova, N.; Saitta, B.; Salustino Guimaraes, V.; Sanchez Gonzalo, D.; Sanchez Mayordomo, C.; Sanmartin Sedes, B.; Santacesaria, R.; Santamarina Rios, C.; Santimaria, M.; Santovetti, E.; Sarti, A.; Satriano, C.; Satta, A.; Saunders, D. M.; Savrina, D.; Schael, S.; Schellenberg, M.; Schiller, M.; Schindler, H.; Schlupp, M.; Schmelling, M.; Schmelzer, T.; Schmidt, B.; Schneider, O.; Schopper, A.; Schreiner, H. F.; Schubert, K.; Schubiger, M.; Schune, M.-H.; Schwemmer, R.; Sciascia, B.; Sciubba, A.; Semennikov, A.; Sergi, A.; Serra, N.; Serrano, J.; Sestini, L.; Seyfert, P.; Shapkin, M.; Shapoval, I.; Shcheglov, Y.; Shears, T.; Shekhtman, L.; Shevchenko, V.; Siddi, B. G.; Silva Coutinho, R.; Silva de Oliveira, L.; Simi, G.; Simone, S.; Sirendi, M.; Skidmore, N.; Skwarnicki, T.; Smith, E.; Smith, I. T.; Smith, J.; Smith, M.; Soares Lavra, l.; Sokoloff, M. D.; Soler, F. J. P.; Souza De Paula, B.; Spaan, B.; Spradlin, P.; Sridharan, S.; Stagni, F.; Stahl, M.; Stahl, S.; Stefko, P.; Stefkova, S.; Steinkamp, O.; Stemmle, S.; Stenyakin, O.; Stevens, H.; Stoica, S.; Stone, S.; Storaci, B.; Stracka, S.; Stramaglia, M. E.; Straticiuc, M.; Straumann, U.; Sun, L.; Sutcliffe, W.; Swientek, K.; Syropoulos, V.; Szczekowski, M.; Szumlak, T.; T'Jampens, S.; Tayduganov, A.; Tekampe, T.; Tellarini, G.; Teubert, F.; Thomas, E.; van Tilburg, J.; Tilley, M. J.; Tisserand, V.; Tobin, M.; Tolk, S.; Tomassetti, L.; Tonelli, D.; Topp-Joergensen, S.; Toriello, F.; Tourinho Jadallah Aoude, R.; Tournefier, E.; Tourneur, S.; Trabelsi, K.; Traill, M.; Tran, M. T.; Tresch, M.; Trisovic, A.; Tsaregorodtsev, A.; Tsopelas, P.; Tully, A.; Tuning, N.; Ukleja, A.; Ustyuzhanin, A.; Uwer, U.; Vacca, C.; Vagnoni, V.; Valassi, A.; Valat, S.; Valenti, G.; Vazquez Gomez, R.; Vazquez Regueiro, P.; Vecchi, S.; van Veghel, M.; Velthuis, J. J.; Veltri, M.; Veneziano, G.; Venkateswaran, A.; Verlage, T. A.; Vernet, M.; Vesterinen, M.; Viana Barbosa, J. V.; Viaud, B.; Vieira, D.; Vieites Diaz, M.; Viemann, H.; Vilasis-Cardona, X.; Vitti, M.; Volkov, V.; Vollhardt, A.; Voneki, B.; Vorobyev, A.; Vorobyev, V.; Voß, C.; de Vries, J. A.; Vázquez Sierra, C.; Waldi, R.; Wallace, C.; Wallace, R.; Walsh, J.; Wang, J.; Ward, D. R.; Wark, H. M.; Watson, N. K.; Websdale, D.; Weiden, A.; Whitehead, M.; Wicht, J.; Wilkinson, G.; Wilkinson, M.; Williams, M.; Williams, M. P.; Williams, M.; Williams, T.; Wilson, F. F.; Wimberley, J.; Winn, M. A.; Wishahi, J.; Wislicki, W.; Witek, M.; Wormser, G.; Wotton, S. A.; Wraight, K.; Wyllie, K.; Xie, Y.; Xing, Z.; Xu, Z.; Yang, Z.; Yang, Z.; Yao, Y.; Yin, H.; Yu, J.; Yuan, X.; Yushchenko, O.; Zarebski, K. A.; Zavertyaev, M.; Zhang, L.; Zhang, Y.; Zhelezov, A.; Zheng, Y.; Zhu, X.; Zhukov, V.; Zonneveld, J. B.; Zucchelli, S.

    2017-11-01

    The charmless three-body decays B ( s) 0 → K S 0 h + h ' - (where h (') = π, K) are analysed using a sample of pp collision data recorded by the LHCb experiment, corresponding to an integrated luminosity of 3 fb-1. The branching fractions are measured relative to that of the B 0 → K S 0 π + π - decay, and are determined to be: B({B}^0\\to {K}S^0{K}^{± /π^{∓})}{B({B}^0\\to {K}S^0{K}+{π}-)}=0.123± 0.009(stat)± 0.015(syst), B({B}^0\\to {K}S^0{K}^{+/K-)}{B({B}^0\\to {K}S^0{π}+{π}-)}=0.549± 0.018(stat)± 0.033(syst), B({B}_s^0\\to {K}S^0{π}^{+/π-)}{B({B}^0\\to {K}S^0{π}+{π}-)}=0.191± 0.027(stat)± 0.031(syst)± 0.011({f}_s/{f}_d), B({B}_s^0\\to {K}S^0{K}^{± /π^{∓})}{B({B}^0\\to {K}S^0{π}+{π}-)}=1.70± 0.07(stat)± 0.11(syst)± 0.10({f}_s/{f}_d), B({B}_s^0\\to {K}S^0{K}^{+/K-)}{B({B}^0\\to {K}S^0{π}+{π}-)}\\in [0.008-0.051] at 90% confidence level, where f s / f d represents the ratio of hadronisation fractions of the B s 0 and B 0 mesons. [Figure not available: see fulltext.

  9. 77 FR 2453 - Security Zone; 24th Annual North American International Auto Show, Detroit River, Detroit, MI

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-18

    ... Docket Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room.... The security zone will encompass an area of the Detroit River beginning at a point of origin on land... shoreline to connect back to the point of origin. Vessels in close proximity to the security zone will be...

  10. AUTOMATING ASSET KNOWLEDGE WITH MTCONNECT.

    PubMed

    Venkatesh, Sid; Ly, Sidney; Manning, Martin; Michaloski, John; Proctor, Fred

    2016-01-01

    In order to maximize assets, manufacturers should use real-time knowledge garnered from ongoing and continuous collection and evaluation of factory-floor machine status data. In discrete parts manufacturing, factory machine monitoring has been difficult, due primarily to closed, proprietary automation equipment that make integration difficult. Recently, there has been a push in applying the data acquisition concepts of MTConnect to the real-time acquisition of machine status data. MTConnect is an open, free specification aimed at overcoming the "Islands of Automation" dilemma on the shop floor. With automated asset analysis, manufacturers can improve production to become lean, efficient, and effective. The focus of this paper will be on the deployment of MTConnect to collect real-time machine status to automate asset management. In addition, we will leverage the ISO 22400 standard, which defines an asset and quantifies asset performance metrics. In conjunction with these goals, the deployment of MTConnect in a large aerospace manufacturing facility will be studied with emphasis on asset management and understanding the impact of machine Overall Equipment Effectiveness (OEE) on manufacturing.

  11. AUTOMATING ASSET KNOWLEDGE WITH MTCONNECT

    PubMed Central

    Venkatesh, Sid; Ly, Sidney; Manning, Martin; Michaloski, John; Proctor, Fred

    2017-01-01

    In order to maximize assets, manufacturers should use real-time knowledge garnered from ongoing and continuous collection and evaluation of factory-floor machine status data. In discrete parts manufacturing, factory machine monitoring has been difficult, due primarily to closed, proprietary automation equipment that make integration difficult. Recently, there has been a push in applying the data acquisition concepts of MTConnect to the real-time acquisition of machine status data. MTConnect is an open, free specification aimed at overcoming the “Islands of Automation” dilemma on the shop floor. With automated asset analysis, manufacturers can improve production to become lean, efficient, and effective. The focus of this paper will be on the deployment of MTConnect to collect real-time machine status to automate asset management. In addition, we will leverage the ISO 22400 standard, which defines an asset and quantifies asset performance metrics. In conjunction with these goals, the deployment of MTConnect in a large aerospace manufacturing facility will be studied with emphasis on asset management and understanding the impact of machine Overall Equipment Effectiveness (OEE) on manufacturing. PMID:28691121

  12. Effects of HfO2 encapsulation on electrical performances of few-layered MoS2 transistor with ALD HfO2 as back-gate dielectric.

    PubMed

    Xu, Jingping; Wen, Ming; Zhao, Xinyuan; Liu, Lu; Song, Xingjuan; Lai, Pui-To; Tang, Wing-Man

    2018-08-24

    The carrier mobility of MoS 2 transistors can be greatly improved by the screening role of high-k gate dielectric. In this work, atomic-layer deposited (ALD) HfO 2 annealed in NH 3 is used to replace SiO 2 as the gate dielectric to fabricate back-gated few-layered MoS 2 transistors, and good electrical properties are achieved with field-effect mobility (μ) of 19.1 cm 2 V -1 s -1 , subthreshold swing (SS) of 123.6 mV dec -1 and on/off ratio of 3.76 × 10 5 . Furthermore, enhanced device performance is obtained when the surface of the MoS 2 channel is coated by an ALD HfO 2 layer with different thicknesses (10, 15 and 20 nm), where the transistor with a 15 nm HfO 2 encapsulation layer exhibits the best overall electrical properties: μ = 42.1 cm 2 V -1 s -1 , SS = 87.9 mV dec -1 and on/off ratio of 2.72 × 10 6 . These improvements should be associated with the enhanced screening effect on charged-impurity scattering and protection from absorption of environmental gas molecules by the high-k encapsulation. The capacitance equivalent thickness of the back-gate dielectric (HfO 2 ) is only 6.58 nm, which is conducive to scaling of the MoS 2 transistors.

  13. 33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas, U.S. Virgin Islands. The security zone for a cruise ship entering port is activated when the vessel...

  14. 33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas, U.S. Virgin Islands. The security zone for a cruise ship entering port is activated when the vessel...

  15. 33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas, U.S. Virgin Islands. The security zone for a cruise ship entering port is activated when the vessel...

  16. 33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas, U.S. Virgin Islands. The security zone for a cruise ship entering port is activated when the vessel...

  17. Suppression of back-to-back hadron pairs at forward rapidity in d+Au collisions at √s(NN)=200 GeV.

    PubMed

    Adare, A; Afanasiev, S; Aidala, C; Ajitanand, N N; Akiba, Y; Al-Bataineh, H; Alexander, J; Angerami, A; Aoki, K; Apadula, N; Aramaki, Y; Atomssa, E T; Averbeck, R; Awes, T C; Azmoun, B; Babintsev, V; Bai, M; Baksay, G; Baksay, L; Barish, K N; Bassalleck, B; Basye, A T; Bathe, S; Baublis, V; Baumann, C; Bazilevsky, A; Belikov, S; Belmont, R; Bennett, R; Berdnikov, A; Berdnikov, Y; Bhom, J H; Blau, D S; Bok, J S; Boyle, K; Brooks, M L; Buesching, H; Bumazhnov, V; Bunce, G; Butsyk, S; Campbell, S; Caringi, A; Chen, C-H; Chi, C Y; Chiu, M; Choi, I J; Choi, J B; Choudhury, R K; Christiansen, P; Chujo, T; Chung, P; Chvala, O; Cianciolo, V; Citron, Z; Cole, B A; Conesa del Valle, Z; Connors, M; Csanád, M; Csörgo, T; Dahms, T; Dairaku, S; Danchev, I; Das, K; Datta, A; David, G; Dayananda, M K; Denisov, A; Deshpande, A; Desmond, E J; Dharmawardane, K V; Dietzsch, O; Dion, A; Donadelli, M; Drapier, O; Drees, A; Drees, K A; Durham, J M; Durum, A; Dutta, D; D'Orazio, L; Edwards, S; Efremenko, Y V; Ellinghaus, F; Engelmore, T; Enokizono, A; En'yo, H; Esumi, S; Fadem, B; Fields, D E; Finger, M; Finger, M; Fleuret, F; Fokin, S L; Fraenkel, Z; Frantz, J E; Franz, A; Frawley, A D; Fujiwara, K; Fukao, Y; Fusayasu, T; Garishvili, I; Glenn, A; Gong, H; Gonin, M; Goto, Y; Granier de Cassagnac, R; Grau, N; Greene, S V; Grim, G; Grosse Perdekamp, M; Gunji, T; Gustafsson, H-Å; Haggerty, J S; Hahn, K I; Hamagaki, H; Hamblen, J; Han, R; Hanks, J; Haslum, E; Hayano, R; He, X; Heffner, M; Hemmick, T K; Hester, T; Hill, J C; Hohlmann, M; Holzmann, W; Homma, K; Hong, B; Horaguchi, T; Hornback, D; Huang, S; Ichihara, T; Ichimiya, R; Ikeda, Y; Imai, K; Inaba, M; Isenhower, D; Ishihara, M; Issah, M; Isupov, A; Ivanischev, D; Iwanaga, Y; Jacak, B V; Jia, J; Jiang, X; Jin, J; Johnson, B M; Jones, T; Joo, K S; Jouan, D; Jumper, D S; Kajihara, F; Kamin, J; Kang, J H; Kapustinsky, J; Karatsu, K; Kasai, M; Kawall, D; Kawashima, M; Kazantsev, A V; Kempel, T; Khanzadeev, A; Kijima, K M; Kikuchi, J; Kim, A; Kim, B I; Kim, D J; Kim, E J; Kim, Y-J; Kinney, E; Kiss, Á; Kistenev, E; Kochenda, L; Komkov, B; Konno, M; Koster, J; Král, A; Kravitz, A; Kunde, G J; Kurita, K; Kurosawa, M; Kwon, Y; Kyle, G S; Lacey, R; Lai, Y S; Lajoie, J G; Lebedev, A; Lee, D M; Lee, J; Lee, K B; Lee, K S; Leitch, M J; Leite, M A L; Li, X; Lichtenwalner, P; Liebing, P; Linden Levy, L A; Liška, T; Litvinenko, A; Liu, H; Liu, M X; Love, B; Lynch, D; Maguire, C F; Makdisi, Y I; Malakhov, A; Malik, M D; Manko, V I; Mannel, E; Mao, Y; Masui, H; Matathias, F; McCumber, M; McGaughey, P L; Means, N; Meredith, B; Miake, Y; Mibe, T; Mignerey, A C; Miki, K; Milov, A; Mitchell, J T; Mohanty, A K; Moon, H J; Morino, Y; Morreale, A; Morrison, D P; Moukhanova, T V; Murakami, T; Murata, J; Nagamiya, S; Nagle, J L; Naglis, M; Nagy, M I; Nakagawa, I; Nakamiya, Y; Nakamura, K R; Nakamura, T; Nakano, K; Nam, S; Newby, J; Nguyen, M; Nihashi, M; Nouicer, R; Nyanin, A S; Oakley, C; O'Brien, E; Oda, S X; Ogilvie, C A; Oka, M; Okada, K; Onuki, Y; Oskarsson, A; Ouchida, M; Ozawa, K; Pak, R; Pantuev, V; Papavassiliou, V; Park, I H; Park, S K; Park, W J; Pate, S F; Pei, H; Peng, J-C; Pereira, H; Peresedov, V; Peressounko, D Yu; Petti, R; Pinkenburg, C; Pisani, R P; Proissl, M; Purschke, M L; Qu, H; Rak, J; Ravinovich, I; Read, K F; Reygers, K; Riabov, V; Riabov, Y; Richardson, E; Roach, D; Roche, G; Rolnick, S D; Rosati, M; Rosen, C A; Rosendahl, S S E; Rukoyatkin, P; Ružička, P; Sahlmueller, B; Saito, N; Sakaguchi, T; Sakashita, K; Samsonov, V; Sano, S; Sato, T; Sawada, S; Sedgwick, K; Seele, J; Seidl, R; Seto, R; Sharma, D; Shein, I; Shibata, T-A; Shigaki, K; Shimomura, M; Shoji, K; Shukla, P; Sickles, A; Silva, C L; Silvermyr, D; Silvestre, C; Sim, K S; Singh, B K; Singh, C P; Singh, V; Slunečka, M; Soltz, R A; Sondheim, W E; Sorensen, S P; Sourikova, I V; Stankus, P W; Stenlund, E; Stoll, S P; Sugitate, T; Sukhanov, A; Sziklai, J; Takagui, E M; Taketani, A; Tanabe, R; Tanaka, Y; Taneja, S; Tanida, K; Tannenbaum, M J; Tarafdar, S; Taranenko, A; Themann, H; Thomas, D; Thomas, T L; Togawa, M; Toia, A; Tomášek, L; Torii, H; Towell, R S; Tserruya, I; Tsuchimoto, Y; Vale, C; Valle, H; van Hecke, H W; Vazquez-Zambrano, E; Veicht, A; Velkovska, J; Vértesi, R; Virius, M; Vrba, V; Vznuzdaev, E; Wang, X R; Watanabe, D; Watanabe, K; Watanabe, Y; Wei, F; Wei, R; Wessels, J; White, S N; Winter, D; Woody, C L; Wright, R M; Wysocki, M; Yamaguchi, Y L; Yamaura, K; Yang, R; Yanovich, A; Ying, J; Yokkaichi, S; You, Z; Young, G R; Younus, I; Yushmanov, I E; Zajc, W A; Zhou, S; Zolin, L

    2011-10-21

    Back-to-back hadron pair yields in d+Au and p+p collisions at √s(NN)=200 GeV were measured with the PHENIX detector at the Relativistic Heavy Ion Collider. Rapidity separated hadron pairs were detected with the trigger hadron at pseudorapidity |η|<0.35 and the associated hadron at forward rapidity (deuteron direction, 3.0<η<3.8). Pairs were also detected with both hadrons measured at forward rapidity; in this case, the yield of back-to-back hadron pairs in d+Au collisions with small impact parameters is observed to be suppressed by a factor of 10 relative to p+p collisions. The kinematics of these pairs is expected to probe partons in the Au nucleus with a low fraction x of the nucleon momenta, where the gluon densities rise sharply. The observed suppression as a function of nuclear thickness, p(T), and η points to cold nuclear matter effects arising at high parton densities. © 2011 American Physical Society

  18. Search for CP Violation and Measurement of the Branching Fraction in the Decay D^{0}→K_{S}^{0}K_{S}^{0}.

    PubMed

    Dash, N; Bahinipati, S; Bhardwaj, V; Trabelsi, K; Adachi, I; Aihara, H; Al Said, S; Asner, D M; Aulchenko, V; Aushev, T; Ayad, R; Babu, V; Badhrees, I; Bakich, A M; Bansal, V; Barberio, E; Bhuyan, B; Biswal, J; Bobrov, A; Bondar, A; Bonvicini, G; Bozek, A; Bračko, M; Breibeck, F; Browder, T E; Červenkov, D; Chang, M-C; Chekelian, V; Chen, A; Cheon, B G; Chilikin, K; Cho, K; Choi, Y; Cinabro, D; Di Carlo, S; Doležal, Z; Drásal, Z; Dutta, D; Eidelman, S; Epifanov, D; Farhat, H; Fast, J E; Ferber, T; Fulsom, B G; Gaur, V; Gabyshev, N; Garmash, A; Gillard, R; Goldenzweig, P; Haba, J; Hara, T; Hayasaka, K; Hayashii, H; Hedges, M T; Hou, W-S; Iijima, T; Inami, K; Ishikawa, A; Itoh, R; Iwasaki, Y; Jacobs, W W; Jaegle, I; Jeon, H B; Jin, Y; Joffe, D; Joo, K K; Julius, T; Kahn, J; Kaliyar, A B; Karyan, G; Katrenko, P; Kawasaki, T; Kiesling, C; Kim, D Y; Kim, H J; Kim, J B; Kim, K T; Kim, M J; Kim, S H; Kim, Y J; Kinoshita, K; Kodyš, P; Korpar, S; Kotchetkov, D; Križan, P; Krokovny, P; Kuhr, T; Kulasiri, R; Kumar, R; Kumita, T; Kuzmin, A; Kwon, Y-J; Lange, J S; Lee, I S; Li, C H; Li, L; Li, Y; Li Gioi, L; Libby, J; Liventsev, D; Lubej, M; Luo, T; Masuda, M; Matvienko, D; Merola, M; Miyabayashi, K; Miyata, H; Mizuk, R; Mohanty, G B; Mohanty, S; Moon, H K; Mori, T; Mussa, R; Nakano, E; Nakao, M; Nanut, T; Nath, K J; Natkaniec, Z; Nayak, M; Niiyama, M; Nisar, N K; Nishida, S; Ogawa, S; Okuno, S; Ono, H; Pakhlov, P; Pakhlova, G; Pal, B; Pardi, S; Park, C-S; Park, H; Paul, S; Pedlar, T K; Pesántez, L; Pestotnik, R; Piilonen, L E; Prasanth, K; Ritter, M; Rostomyan, A; Sahoo, H; Sakai, Y; Sandilya, S; Santelj, L; Sanuki, T; Sato, Y; Savinov, V; Schneider, O; Schnell, G; Schwanda, C; Schwartz, A J; Seino, Y; Senyo, K; Sevior, M E; Shebalin, V; Shen, C P; Shibata, T-A; Shiu, J-G; Shwartz, B; Simon, F; Sokolov, A; Solovieva, E; Starič, M; Strube, J F; Stypula, J; Sumisawa, K; Sumiyoshi, T; Takizawa, M; Tamponi, U; Tanida, K; Tenchini, F; Uchida, M; Uglov, T; Unno, Y; Uno, S; Urquijo, P; Usov, Y; Van Hulse, C; Varner, G; Vorobyev, V; Vossen, A; Waheed, E; Wang, C H; Wang, M-Z; Wang, P; Watanabe, M; Watanabe, Y; Widmann, E; Williams, K M; Won, E; Yamashita, Y; Ye, H; Yelton, J; Yook, Y; Yuan, C Z; Yusa, Y; Zhang, Z P; Zhilich, V; Zhukova, V; Zhulanov, V; Zupanc, A

    2017-10-27

    We report a study of the decay D^{0}→K_{S}^{0}K_{S}^{0} using 921  fb^{-1} of data collected at or near the ϒ(4S) and ϒ(5S) resonances with the Belle detector at the KEKB asymmetric energy e^{+}e^{-} collider. The measured time-integrated CP asymmetry is A_{CP}(D^{0}→K_{S}^{0}K_{S}^{0})=(-0.02±1.53±0.02±0.17)%, and the branching fraction is B(D^{0}→K_{S}^{0}K_{S}^{0})=(1.321±0.023±0.036±0.044)×10^{-4}, where the first uncertainty is statistical, the second is systematic, and the third is due to the normalization mode (D^{0}→K_{S}^{0}π^{0}). These results are significantly more precise than previous measurements available for this mode. The A_{CP} measurement is consistent with the standard model expectation.

  19. 33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; St. Thomas, U.S....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas...

  20. A layered trust information security architecture.

    PubMed

    de Oliveira Albuquerque, Robson; Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Buiati, Fábio; Kim, Tai-Hoon

    2014-12-01

    Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed.

  1. A Layered Trust Information Security Architecture

    PubMed Central

    de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Sandoval Orozco, Ana Lucila; Buiati, Fábio; Kim, Tai-Hoon

    2014-01-01

    Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed. PMID:25470490

  2. Analysis System for Self-Efficacy Training (ASSET). Assessing treatment fidelity of self-management interventions.

    PubMed

    Zinken, Katarzyna M; Cradock, Sue; Skinner, T Chas

    2008-08-01

    The paper presents the development of a coding tool for self-efficacy orientated interventions in diabetes self-management programmes (Analysis System for Self-Efficacy Training, ASSET) and explores its construct validity and clinical utility. Based on four sources of self-efficacy (i.e., mastery experience, role modelling, verbal persuasion and physiological and affective states), published self-efficacy based interventions for diabetes care were analysed in order to identify specific verbal behavioural techniques. Video-recorded facilitating behaviours were evaluated using ASSET. The reliability between four coders was high (K=0.71). ASSET enabled assessment of both self-efficacy based techniques and participants' response to those techniques. Individual patterns of delivery and shifts over time across facilitators were found. In the presented intervention we observed that self-efficacy utterances were followed by longer patient verbal responses than non-self-efficacy utterances. These detailed analyses with ASSET provide rich data and give the researcher an insight into the underlying mechanism of the intervention process. By providing a detailed description of self-efficacy strategies ASSET can be used by health care professionals to guide reflective practice and support training programmes.

  3. Retrading, production, and asset market performance.

    PubMed

    Gjerstad, Steven D; Porter, David; Smith, Vernon L; Winn, Abel

    2015-11-24

    Prior studies have shown that traders quickly converge to the price-quantity equilibrium in markets for goods that are immediately consumed, but they produce speculative price bubbles in resalable asset markets. We present a stock-flow model of durable assets in which the existing stock of assets is subject to depreciation and producers may produce additional units of the asset. In our laboratory experiments inexperienced consumers who can resell their units disregard the consumption value of the assets and compete vigorously with producers, depressing prices and production. Consumers who have first participated in experiments without resale learn to heed their consumption values and, when they are given the option to resell, trade at equilibrium prices. Reproducibility is therefore the most natural and most effective treatment for suppression of bubbles in asset market experiments.

  4. Retrading, production, and asset market performance

    PubMed Central

    Gjerstad, Steven D.; Porter, David; Smith, Vernon L.; Winn, Abel

    2015-01-01

    Prior studies have shown that traders quickly converge to the price–quantity equilibrium in markets for goods that are immediately consumed, but they produce speculative price bubbles in resalable asset markets. We present a stock-flow model of durable assets in which the existing stock of assets is subject to depreciation and producers may produce additional units of the asset. In our laboratory experiments inexperienced consumers who can resell their units disregard the consumption value of the assets and compete vigorously with producers, depressing prices and production. Consumers who have first participated in experiments without resale learn to heed their consumption values and, when they are given the option to resell, trade at equilibrium prices. Reproducibility is therefore the most natural and most effective treatment for suppression of bubbles in asset market experiments. PMID:26553991

  5. FASB Statement No. 136 clarifies transfers of assets.

    PubMed

    Luecke, R W; Meeting, D T

    2000-03-01

    FASB Statement of Financial Accounting Standards No. 136, Transfers of Assets to a Not-for-Profit Organization or Charitable Trust That Raises or Holds Contributions for Others, provides guidance and establishes accounting standards for the transfer of assets from donors to not-for-profit organizations that may then transfer those same assets to a beneficiary organization. Recipient organizations that accept financial assets from a donor and agree to use those assets on behalf of a specified unaffiliated beneficiary or transfer those assets, the return on investment of those assets, or both to that beneficiary must recognize the assets received from the donor and recognize the assets' fair value as a liability to the beneficiary. The statement describes circumstances in which a transfer of assets to a recipient organization is accounted for as an asset and corresponding liability of the recipient organization, and as an asset and donation revenue by the beneficiary organization because the transfer is irrevocable.

  6. Sun-Burned: Space Weather’s Impact On U.S. National Security

    DTIC Science & Technology

    2013-06-01

    for navigation, the wideband global satellite communications system used for secure links in multiple frequencies , the space-based infrared system...used for early warning missile detection, the advanced extremely high frequency used for jam resistant strategic communications , and the defense...NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11 . SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for

  7. Heavy Lift for National Security: The Ares V

    NASA Technical Reports Server (NTRS)

    Sumrall, Phil

    2009-01-01

    The NASA Ares Projects Office is developing the launch vehicles to move the United States and humanity beyond low earth orbit. Ares I is a crewed vehicle, and Ares V is a heavy lift vehicle being designed to launch cargo into LEO and transfer cargo and crews to the Moon. This is a snapshot of development and capabilities. Ares V is early in the requirements formulation stage of development pending the outcome of the Review of U.S. Human Space Flight Plans Committee and White House action. The Ares V vehicle will be considered a national asset, creating unmatched opportunities for human exploration, science, national security, and space business.

  8. Asset Allocation to Cover a Region of Piracy

    DTIC Science & Technology

    2011-09-01

    1087-1092. 8. Kirkpatrick, S., Optimization by Simulated Annealing. Science, 1983. 220(4598): p. 671-680. 9. Daskin , M. S., A bibliography for some...... a uniform piracy risk and where some areas are more vulnerable than others. Simulated annealing was used to allocate the patrolling naval assets

  9. How Can France’s New NATO Policy Be Explained vis-a-vis European Security Cooperation?

    DTIC Science & Technology

    2010-05-21

    Dunkirk negotiations. The differences stemmed from what should constitute a threat requiring support from an ally; an actual invasion, as the U.K...strategic approaches between the U.K. and France, dating back to the 1947 Treaty of Dunkirk negotiations, were finally coming to an end

  10. Using Virtual and In-Person Engagement Opportunities to Connect K-12 Students, Teachers, and the Public With NASA Astromaterials Research and Exploration Science Assets

    NASA Technical Reports Server (NTRS)

    Graff, P.; Foxworth, S.; Luckey, M. K.; McInturff, B.; Mosie, A.; Runco, S.; Todd, N.; Willis, K. J.; Zeigler, R.

    2017-01-01

    Engaging K-12 students, teachers, and the public with NASA Astromaterials Research and Exploration Science (ARES) assets provides an extraordinary opportunity to connect audiences with authentic aspects unique to our nation's space program. NASA ARES has effectively engaged audiences with 1) Science, Technology, Engineering and Mathematics (STEM) experts, 2) NASA specialized facilities, and 3) NASA astromaterial samples through both virtual and in-person engagement opportunities. These engagement opportunities help connect local and national audiences with STEM role models, promote the exciting work being facilitated through NASA's Science Mission Directorate, and expose our next generation of scientific explorers to science they may be inspired to pursue as a future STEM career.

  11. The widow(er)'s limit provision of Social Security.

    PubMed

    Weaver, D A

    Widow benefits have been a part of the Social Security program since the 1939 amendments to the Social Security Act (widower benefits were added later). For many years, the Social Security law called for paying a widow(er) a fraction of the deceased worker's primary insurance amount (PIA). However, the worker--while alive--may have received the full PIA as his or her retirement benefit. Over time, arguments were made that a widow(er) should be treated as generously as his or her spouse was. The 1972 amendments to the Social Security Act allowed for a widow(er) to receive a full PIA, subject to actuarial reductions if the widow(er) benefit was claimed before the normal retirement age (NRA) and subject to a new provision of the law commonly referred to as the widow(er)'s limit. Generally, the widow(er)'s limit specifies that if a worker received reduced retirement benefits (because the worker claimed benefits before the NRA), then the worker's widow(er) cannot receive a monthly benefit equal to the full PIA. Rather, the widow(er)'s benefit is generally limited to the amount the worker would receive if he or she was still alive. The limit provision appears to be motivated by the overall intent of the 1972 Congress to pay a benefit to a widow(er) that was comparable with what the worker received. A number of changes to the limit provision have been discussed. This article looks at the following options: Abolishing the limit, Raising the limit by requiring that it never be set below the average PIA among all retired-worker beneficiaries. Adjusting the limit for some widow(er)s--that is, only persons who are widowed before the NRA (the ARLA option), Making a simpler adjustment to the limit by abolishing it for persons who are widowed before age 62 (the SARLA option), and A proposal by Robert J. Myers that would make modest adjustments to the limit for cases in which the worker died before the NRA. The most fundamental change--abolishing the limit--would increase benefits

  12. 76 FR 4123 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-24

    .... The closed portions of the meeting will address threats to our homeland security, results of a cyber... designed to keep our country safe. A briefing on the Cyber Storm III Exercise will include lessons learned and vulnerabilities of cyber assets, as well as potential methods to improve a Federal response to a...

  13. Observation of the Decay B_{s}^{0}→K^{0}K[over ¯]^{0}.

    PubMed

    Pal, B; Schwartz, A J; Abdesselam, A; Adachi, I; Aihara, H; Asner, D M; Aushev, T; Ayad, R; Aziz, T; Babu, V; Badhrees, I; Bahinipati, S; Bakich, A M; Barberio, E; Behera, P; Bhardwaj, V; Bhuyan, B; Biswal, J; Bobrov, A; Bozek, A; Bračko, M; Browder, T E; Červenkov, D; Chekelian, V; Chen, A; Cheon, B G; Chistov, R; Cho, K; Chobanova, V; Choi, Y; Cinabro, D; Dalseno, J; Dash, N; Doležal, Z; Drásal, Z; Drutskoy, A; Dutta, D; Eidelman, S; Farhat, H; Fast, J E; Fulsom, B G; Gaur, V; Garmash, A; Gillard, R; Goh, Y M; Goldenzweig, P; Greenwald, D; Grzymkowska, O; Haba, J; Hara, T; Hayasaka, K; Hayashii, H; He, X H; Hou, W-S; Inami, K; Ishikawa, A; Iwasaki, Y; Jacobs, W W; Jaegle, I; Jeon, H B; Joffe, D; Joo, K K; Julius, T; Kang, K H; Kato, E; Kawasaki, T; Kiesling, C; Kim, D Y; Kim, H J; Kim, K T; Kim, M J; Kim, S H; Kinoshita, K; Kodyš, P; Korpar, S; Križan, P; Krokovny, P; Kuhr, T; Kumar, R; Kumita, T; Kuzmin, A; Kwon, Y-J; Lee, I S; Li, C H; Li, H; Li, L; Li Gioi, L; Libby, J; Liventsev, D; Lukin, P; Luo, T; Masuda, M; Matvienko, D; Miyabayashi, K; Miyata, H; Mizuk, R; Mohanty, G B; Mohanty, S; Moll, A; Moon, H K; Mori, T; Mussa, R; Nakano, E; Nakao, M; Nanut, T; Natkaniec, Z; Nayak, M; Nisar, N K; Nishida, S; Ogawa, S; Okuno, S; Pakhlov, P; Pakhlova, G; Park, C W; Park, H; Paul, S; Pedlar, T K; Pesántez, L; Pestotnik, R; Petrič, M; Piilonen, L E; Pulvermacher, C; Rauch, J; Ribežl, E; Ritter, M; Rostomyan, A; Ryu, S; Sahoo, H; Sakai, Y; Sandilya, S; Sanuki, T; Sato, Y; Savinov, V; Schlüter, T; Schneider, O; Schnell, G; Schwanda, C; Seino, Y; Senyo, K; Seon, O; Seong, I S; Shebalin, V; Shibata, T-A; Shiu, J-G; Shwartz, B; Simon, F; Sohn, Y-S; Sokolov, A; Solovieva, E; Stanič, S; Starič, M; Stypula, J; Sumihama, M; Sumiyoshi, T; Tamponi, U; Teramoto, Y; Trabelsi, K; Uchida, M; Uehara, S; Uglov, T; Uno, S; Urquijo, P; Usov, Y; Van Hulse, C; Vanhoefer, P; Varner, G; Vinokurova, A; Vossen, A; Wagner, M N; Wang, C H; Wang, M-Z; Wang, X L; Watanabe, M; Watanabe, Y; Williams, K M; Won, E; Yamaoka, J; Yelton, J; Yuan, C Z; Yusa, Y; Zhang, Z P; Zhilich, V; Zhulanov, V; Zupanc, A

    2016-04-22

    We measure the decay B_{s}^{0}→K^{0}K[over ¯]^{0} using data collected at the ϒ(5S) resonance with the Belle detector at the KEKB e^{+}e^{-} collider. The data sample used corresponds to an integrated luminosity of 121.4  fb^{-1}. We measure a branching fraction B(B_{s}^{0}→K^{0}K[over ¯]^{0})=[19.6_{-5.1}^{+5.8}(stat)±1.0(syst)±2.0(N_{B_{s}^{0}B[over ¯]_{s}^{0}})]×10^{-6} with a significance of 5.1 standard deviations. This measurement constitutes the first observation of this decay.

  14. Observation of B_{s}^{0}→D[over ¯]^{0}K_{S}^{0} and Evidence for B_{s}^{0}→D[over ¯]^{*}^{0}K_{S}^{0} Decays.

    PubMed

    Aaij, R; Abellán Beteta, C; Adeva, B; Adinolfi, M; Affolder, A; Ajaltouni, Z; Akar, S; Albrecht, J; Alessio, F; Alexander, M; Ali, S; Alkhazov, G; Alvarez Cartelle, P; Alves, A A; Amato, S; Amerio, S; Amhis, Y; An, L; Anderlini, L; Andreassi, G; Andreotti, M; Andrews, J E; Appleby, R B; Aquines Gutierrez, O; Archilli, F; d'Argent, P; Artamonov, A; Artuso, M; Aslanides, E; Auriemma, G; Baalouch, M; Bachmann, S; Back, J J; Badalov, A; Baesso, C; Baldini, W; Barlow, R J; Barschel, C; Barsuk, S; Barter, W; Batozskaya, V; Battista, V; Bay, A; Beaucourt, L; Beddow, J; Bedeschi, F; Bediaga, I; Bel, L J; Bellee, V; Belloli, N; Belyaev, I; Ben-Haim, E; Bencivenni, G; Benson, S; Benton, J; Berezhnoy, A; Bernet, R; Bertolin, A; Bettler, M-O; van Beuzekom, M; Bifani, S; Billoir, P; Bird, T; Birnkraut, A; Bizzeti, A; Blake, T; Blanc, F; Blouw, J; Blusk, S; Bocci, V; Bondar, A; Bondar, N; Bonivento, W; Borghi, S; Borisyak, M; Borsato, M; Bowcock, T J V; Bowen, E; Bozzi, C; Braun, S; Britsch, M; Britton, T; Brodzicka, J; Brook, N H; Buchanan, E; Burr, C; Bursche, A; Buytaert, J; Cadeddu, S; Calabrese, R; Calvi, M; Calvo Gomez, M; Campana, P; Campora Perez, D; Capriotti, L; Carbone, A; Carboni, G; Cardinale, R; Cardini, A; Carniti, P; Carson, L; Carvalho Akiba, K; Casse, G; Cassina, L; Castillo Garcia, L; Cattaneo, M; Cauet, Ch; Cavallero, G; Cenci, R; Charles, M; Charpentier, Ph; Chatzikonstantinidis, G; Chefdeville, M; Chen, S; Cheung, S-F; Chiapolini, N; Chrzaszcz, M; Cid Vidal, X; Ciezarek, G; Clarke, P E L; Clemencic, M; Cliff, H V; Closier, J; Coco, V; Cogan, J; Cogneras, E; Cogoni, V; Cojocariu, L; Collazuol, G; Collins, P; Comerma-Montells, A; Contu, A; Cook, A; Coombes, M; Coquereau, S; Corti, G; Corvo, M; Couturier, B; Cowan, G A; Craik, D C; Crocombe, A; Cruz Torres, M; Cunliffe, S; Currie, R; D'Ambrosio, C; Dall'Occo, E; Dalseno, J; David, P N Y; Davis, A; De Aguiar Francisco, O; De Bruyn, K; De Capua, S; De Cian, M; De Miranda, J M; De Paula, L; De Simone, P; Dean, C-T; Decamp, D; Deckenhoff, M; Del Buono, L; Déléage, N; Demmer, M; Derkach, D; Deschamps, O; Dettori, F; Dey, B; Di Canto, A; Di Ruscio, F; Dijkstra, H; Donleavy, S; Dordei, F; Dorigo, M; Dosil Suárez, A; Dovbnya, A; Dreimanis, K; Dufour, L; Dujany, G; Dungs, K; Durante, P; Dzhelyadin, R; Dziurda, A; Dzyuba, A; Easo, S; Egede, U; Egorychev, V; Eidelman, S; Eisenhardt, S; Eitschberger, U; Ekelhof, R; Eklund, L; El Rifai, I; Elsasser, Ch; Ely, S; Esen, S; Evans, H M; Evans, T; Falabella, A; Färber, C; Farley, N; Farry, S; Fay, R; Ferguson, D; Fernandez Albor, V; Ferrari, F; Ferreira Rodrigues, F; Ferro-Luzzi, M; Filippov, S; Fiore, M; Fiorini, M; Firlej, M; Fitzpatrick, C; Fiutowski, T; Fleuret, F; Fohl, K; Fol, P; Fontana, M; Fontanelli, F; Forshaw, D C; Forty, R; Frank, M; Frei, C; Frosini, M; Fu, J; Furfaro, E; Gallas Torreira, A; Galli, D; Gallorini, S; Gambetta, S; Gandelman, M; Gandini, P; Gao, Y; García Pardiñas, J; Garra Tico, J; Garrido, L; Gascon, D; Gaspar, C; Gauld, R; Gavardi, L; Gazzoni, G; Gerick, D; Gersabeck, E; Gersabeck, M; Gershon, T; Ghez, Ph; Gianì, S; Gibson, V; Girard, O G; Giubega, L; Gligorov, V V; Göbel, C; Golubkov, D; Golutvin, A; Gomes, A; Gotti, C; Grabalosa Gándara, M; Graciani Diaz, R; Granado Cardoso, L A; Graugés, E; Graverini, E; Graziani, G; Grecu, A; Greening, E; Griffith, P; Grillo, L; Grünberg, O; Gui, B; Gushchin, E; Guz, Yu; Gys, T; Hadavizadeh, T; Hadjivasiliou, C; Haefeli, G; Haen, C; Haines, S C; Hall, S; Hamilton, B; Han, X; Hansmann-Menzemer, S; Harnew, N; Harnew, S T; Harrison, J; He, J; Head, T; Heijne, V; Heister, A; Hennessy, K; Henrard, P; Henry, L; Hernando Morata, J A; van Herwijnen, E; Heß, M; Hicheur, A; Hill, D; Hoballah, M; Hombach, C; Hulsbergen, W; Humair, T; Hushchyn, M; Hussain, N; Hutchcroft, D; Hynds, D; Idzik, M; Ilten, P; Jacobsson, R; Jaeger, A; Jalocha, J; Jans, E; Jawahery, A; John, M; Johnson, D; Jones, C R; Joram, C; Jost, B; Jurik, N; Kandybei, S; Kanso, W; Karacson, M; Karbach, T M; Karodia, S; Kecke, M; Kelsey, M; Kenyon, I R; Kenzie, M; Ketel, T; Khairullin, E; Khanji, B; Khurewathanakul, C; Kirn, T; Klaver, S; Klimaszewski, K; Kochebina, O; Kolpin, M; Komarov, I; Koopman, R F; Koppenburg, P; Kozeiha, M; Kravchuk, L; Kreplin, K; Kreps, M; Krokovny, P; Kruse, F; Krzemien, W; Kucewicz, W; Kucharczyk, M; Kudryavtsev, V; Kuonen, A K; Kurek, K; Kvaratskheliya, T; Lacarrere, D; Lafferty, G; Lai, A; Lambert, D; Lanfranchi, G; Langenbruch, C; Langhans, B; Latham, T; Lazzeroni, C; Le Gac, R; van Leerdam, J; Lees, J-P; Lefèvre, R; Leflat, A; Lefrançois, J; Lemos Cid, E; Leroy, O; Lesiak, T; Leverington, B; Li, Y; Likhomanenko, T; Liles, M; Lindner, R; Linn, C; Lionetto, F; Liu, B; Liu, X; Loh, D; Longstaff, I; Lopes, J H; Lucchesi, D; Lucio Martinez, M; Luo, H; Lupato, A; Luppi, E; Lupton, O; Lusardi, N; Lusiani, A; Machefert, F; Maciuc, F; Maev, O; Maguire, K; Malde, S; Malinin, A; Manca, G; Mancinelli, G; Manning, P; Mapelli, A; Maratas, J; Marchand, J F; Marconi, U; Marin Benito, C; Marino, P; Marks, J; Martellotti, G; Martin, M; Martinelli, M; Martinez Santos, D; Martinez Vidal, F; Martins Tostes, D; Massacrier, L M; Massafferri, A; Matev, R; Mathad, A; Mathe, Z; Matteuzzi, C; Mauri, A; Maurin, B; Mazurov, A; McCann, M; McCarthy, J; McNab, A; McNulty, R; Meadows, B; Meier, F; Meissner, M; Melnychuk, D; Merk, M; Michielin, E; Milanes, D A; Minard, M-N; Mitzel, D S; Molina Rodriguez, J; Monroy, I A; Monteil, S; Morandin, M; Morawski, P; Mordà, A; Morello, M J; Moron, J; Morris, A B; Mountain, R; Muheim, F; Müller, D; Müller, J; Müller, K; Müller, V; Mussini, M; Muster, B; Naik, P; Nakada, T; Nandakumar, R; Nandi, A; Nasteva, I; Needham, M; Neri, N; Neubert, S; Neufeld, N; Neuner, M; Nguyen, A D; Nguyen, T D; Nguyen-Mau, C; Niess, V; Niet, R; Nikitin, N; Nikodem, T; Novoselov, A; O'Hanlon, D P; Oblakowska-Mucha, A; Obraztsov, V; Ogilvy, S; Okhrimenko, O; Oldeman, R; Onderwater, C J G; Osorio Rodrigues, B; Otalora Goicochea, J M; Otto, A; Owen, P; Oyanguren, A; Palano, A; Palombo, F; Palutan, M; Panman, J; Papanestis, A; Pappagallo, M; Pappalardo, L L; Pappenheimer, C; Parker, W; Parkes, C; Passaleva, G; Patel, G D; Patel, M; Patrignani, C; Pearce, A; Pellegrino, A; Penso, G; Pepe Altarelli, M; Perazzini, S; Perret, P; Pescatore, L; Petridis, K; Petrolini, A; Petruzzo, M; Picatoste Olloqui, E; Pietrzyk, B; Pikies, M; Pinci, D; Pistone, A; Piucci, A; Playfer, S; Plo Casasus, M; Poikela, T; Polci, F; Poluektov, A; Polyakov, I; Polycarpo, E; Popov, A; Popov, D; Popovici, B; Potterat, C; Price, E; Price, J D; Prisciandaro, J; Pritchard, A; Prouve, C; Pugatch, V; Puig Navarro, A; Punzi, G; Qian, W; Quagliani, R; Rachwal, B; Rademacker, J H; Rama, M; Ramos Pernas, M; Rangel, M S; Raniuk, I; Rauschmayr, N; Raven, G; Redi, F; Reichert, S; Dos Reis, A C; Renaudin, V; Ricciardi, S; Richards, S; Rihl, M; Rinnert, K; Rives Molina, V; Robbe, P; Rodrigues, A B; Rodrigues, E; Rodriguez Lopez, J A; Rodriguez Perez, P; Roiser, S; Romanovsky, V; Romero Vidal, A; Ronayne, J W; Rotondo, M; Ruf, T; Ruiz Valls, P; Saborido Silva, J J; Sagidova, N; Saitta, B; Salustino Guimaraes, V; Sanchez Mayordomo, C; Sanmartin Sedes, B; Santacesaria, R; Santamarina Rios, C; Santimaria, M; Santovetti, E; Sarti, A; Satriano, C; Satta, A; Saunders, D M; Savrina, D; Schael, S; Schiller, M; Schindler, H; Schlupp, M; Schmelling, M; Schmelzer, T; Schmidt, B; Schneider, O; Schopper, A; Schubiger, M; Schune, M-H; Schwemmer, R; Sciascia, B; Sciubba, A; Semennikov, A; Serra, N; Serrano, J; Sestini, L; Seyfert, P; Shapkin, M; Shapoval, I; Shcheglov, Y; Shears, T; Shekhtman, L; Shevchenko, V; Shires, A; Siddi, B G; Silva Coutinho, R; Silva de Oliveira, L; Simi, G; Sirendi, M; Skidmore, N; Skwarnicki, T; Smith, E; Smith, E; Smith, I T; Smith, J; Smith, M; Snoek, H; Sokoloff, M D; Soler, F J P; Soomro, F; Souza, D; Souza De Paula, B; Spaan, B; Spradlin, P; Sridharan, S; Stagni, F; Stahl, M; Stahl, S; Stefkova, S; Steinkamp, O; Stenyakin, O; Stevenson, S; Stoica, S; Stone, S; Storaci, B; Stracka, S; Straticiuc, M; Straumann, U; Sun, L; Sutcliffe, W; Swientek, K; Swientek, S; Syropoulos, V; Szczekowski, M; Szumlak, T; T'Jampens, S; Tayduganov, A; Tekampe, T; Tellarini, G; Teubert, F; Thomas, C; Thomas, E; van Tilburg, J; Tisserand, V; Tobin, M; Todd, J; Tolk, S; Tomassetti, L; Tonelli, D; Topp-Joergensen, S; Torr, N; Tournefier, E; Tourneur, S; Trabelsi, K; Traill, M; Tran, M T; Tresch, M; Trisovic, A; Tsaregorodtsev, A; Tsopelas, P; Tuning, N; Ukleja, A; Ustyuzhanin, A; Uwer, U; Vacca, C; Vagnoni, V; Valenti, G; Vallier, A; Vazquez Gomez, R; Vazquez Regueiro, P; Vázquez Sierra, C; Vecchi, S; van Veghel, M; Velthuis, J J; Veltri, M; Veneziano, G; Vesterinen, M; Viaud, B; Vieira, D; Vieites Diaz, M; Vilasis-Cardona, X; Volkov, V; Vollhardt, A; Voong, D; Vorobyev, A; Vorobyev, V; Voß, C; de Vries, J A; Waldi, R; Wallace, C; Wallace, R; Walsh, J; Wang, J; Ward, D R; Watson, N K; Websdale, D; Weiden, A; Whitehead, M; Wicht, J; Wilkinson, G; Wilkinson, M; Williams, M; Williams, M P; Williams, M; Williams, T; Wilson, F F; Wimberley, J; Wishahi, J; Wislicki, W; Witek, M; Wormser, G; Wotton, S A; Wraight, K; Wright, S; Wyllie, K; Xie, Y; Xu, Z; Yang, Z; Yu, J; Yuan, X; Yushchenko, O; Zangoli, M; Zavertyaev, M; Zhang, L; Zhang, Y; Zhelezov, A; Zhokhov, A; Zhong, L; Zhukov, V; Zucchelli, S

    2016-04-22

    The first observation of the B_{s}^{0}→D[over ¯]^{0}K_{S}^{0} decay mode and evidence for the B_{s}^{0}→D[over ¯]^{*0}K_{S}^{0} decay mode are reported. The data sample corresponds to an integrated luminosity of 3.0  fb^{-1} collected in pp collisions by LHCb at center-of-mass energies of 7 and 8 TeV. The branching fractions are measured to be B(B_{s}^{0}→D[over ¯]^{0}K[over ¯]^{0})=[4.3±0.5(stat)±0.3(syst)±0.3(frag)±0.6(norm)]×10^{-4},B(B_{s}^{0}→D[over ¯]^{*0}K[over ¯]^{0})=[2.8±1.0(stat)±0.3(syst)±0.2(frag)±0.4(norm)]×10^{-4},where the uncertainties are due to contributions coming from statistical precision, systematic effects, and the precision of two external inputs, the ratio f_{s}/f_{d} and the branching fraction of B^{0}→D[over ¯]^{0}K_{S}^{0}, which is used as a calibration channel.

  15. 76 FR 52998 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change by NYSE...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-24

    ... assets in Fixed Income Securities denominated in U.S. dollars. The Fund may invest in Money Market... shorter depending upon market conditions. The Fund may also invest in short-term Money Market Securities.... government securities, as applicable. Money Market Securities Assets not invested in Fixed Income Securities...

  16. Three Essays on Information Technology Security Management in Organizations

    ERIC Educational Resources Information Center

    Gupta, Manish

    2011-01-01

    Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…

  17. Three-dimensional GIS approach for management of assets

    NASA Astrophysics Data System (ADS)

    Lee, S. Y.; Yee, S. X.; Majid, Z.; Setan, H.

    2014-02-01

    Assets play an important role in human life, especially to an organization. Organizations strive and put more effort to improve its operation and assets management. The development of GIS technology has become a powerful tool in management as it is able to provide a complete inventory for managing assets with location-based information. Spatial information is one of the requirements in decision making in various areas, including asset management in the buildings. This paper describes a 3D GIS approach for management of assets. An asset management system was developed by integrating GIS concept and 3D model assets. The purposes of 3D visualization to manage assets are to facilitate the analysis and understanding in the complex environment. Behind the 3D model of assets is a database to store the asset information. A user-friendly interface was also designed for more easier to operate the application. In the application developed, location of each individual asset can be easily tracked according to the referring spatial information and 3D viewing. The 3D GIS approach described in this paper is certainly would be useful in asset management. Systematic management of assets can be carried out and this will lead to less-time consuming and cost-effective. The results in this paper will show a new approach to improve asset management.

  18. Incarceration and Household Asset Ownership.

    PubMed

    Turney, Kristin; Schneider, Daniel

    2016-12-01

    A considerable literature documents the deleterious economic consequences of incarceration. However, little is known about the consequences of incarceration for household assets-a distinct indicator of economic well-being that may be especially valuable to the survival of low-income families-or about the spillover economic consequences of incarceration for families. In this article, we use longitudinal data from the Fragile Families and Child Wellbeing Study to examine how incarceration is associated with asset ownership among formerly incarcerated men and their romantic partners. Results, which pay careful attention to the social forces that select individuals into incarceration, show that incarceration is negatively associated with ownership of a bank account, vehicle, and home among men and that these consequences for asset ownership extend to the romantic partners of these men. These associations are concentrated among men who previously held assets. Results also show that post-incarceration changes in romantic relationships are an important pathway by which even short-term incarceration depletes assets.

  19. The K-π+ S-wave from the D+→K-π+π+ decay

    NASA Astrophysics Data System (ADS)

    FOCUS Collaboration; Link, J. M.; Yager, P. M.; Anjos, J. C.; Bediaga, I.; Castromonte, C.; Machado, A. A.; Magnin, J.; Massafferri, A.; de Miranda, J. M.; Pepe, I. M.; Polycarpo, E.; Dos Reis, A. C.; Carrillo, S.; Cuautle, E.; Sánchez-Hernández, A.; Uribe, C.; Vázquez, F.; Agostino, L.; Cinquini, L.; Cumalat, J. P.; Frisullo, V.; O'Reilly, B.; Segoni, I.; Stenson, K.; Butler, J. N.; Cheung, H. W. K.; Chiodini, G.; Gaines, I.; Garbincius, P. H.; Garren, L. A.; Gottschalk, E.; Kasper, P. H.; Kreymer, A. E.; Kutschke, R.; Wang, M.; Benussi, L.; Bianco, S.; Fabbri, F. L.; Zallo, A.; Casimiro, E.; Reyes, M.; Cawlfield, C.; Kim, D. Y.; Rahimi, A.; Wiss, J.; Gardner, R.; Kryemadhi, A.; Chung, Y. S.; Kang, J. S.; Ko, B. R.; Kwak, J. W.; Lee, K. B.; Cho, K.; Park, H.; Alimonti, G.; Barberis, S.; Boschini, M.; Cerutti, A.; D'Angelo, P.; Dicorato, M.; Dini, P.; Edera, L.; Erba, S.; Inzani, P.; Leveraro, F.; Malvezzi, S.; Menasce, D.; Mezzadri, M.; Moroni, L.; Pedrini, D.; Pontoglio, C.; Prelz, F.; Rovere, M.; Sala, S.; Davenport, T. F.; Arena, V.; Boca, G.; Bonomi, G.; Gianini, G.; Liguori, G.; Pegna, D. Lopes; Merlo, M. M.; Pantea, D.; Ratti, S. P.; Riccardi, C.; Vitulo, P.; Göbel, C.; Otalora, J.; Hernandez, H.; Lopez, A. M.; Mendez, H.; Paris, A.; Quinones, J.; Ramirez, J. E.; Zhang, Y.; Wilson, J. R.; Handler, T.; Mitchell, R.; Engh, D.; Hosack, M.; Johns, W. E.; Luiggi, E.; Moore, J. E.; Nehring, M.; Sheldon, P. D.; Vaandering, E. W.; Webster, M.; Sheaff, M.

    2009-10-01

    Using data from FOCUS (E831) experiment at Fermilab, we present a model independent partial-wave analysis of the K-π+ S-wave amplitude from the decay D+→K-π+π+. The S-wave is a generic complex function to be determined directly from the data fit. The P- and D-waves are parameterized by a sum of Breit-Wigner amplitudes. The measurement of the S-wave amplitude covers the whole elastic range of the K-π+ system.

  20. AFRICOM’s Role in Promoting U.S. Energy Security

    DTIC Science & Technology

    2009-01-01

    L-’:::"’+~~ s --,,......,.,...,...-~ _ Date: --.f-’--l..:I.-f’-’-’-’---=’---I- -+-_) Oral Defense CommitteY’Member:----"’F·’--__-=E=--~-L...other provision of law , no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a...Role In Promoting U.S. Energy Security 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR( S ) 5d. PROJECT NUMBER 5e. TASK

  1. Heterogeneous belief and asset returns

    NASA Astrophysics Data System (ADS)

    Lei-Sun, Wen-Zou, Hui

    2014-10-01

    Based on DSSW model, this paper introduces the noise traders with heterogeneous belief. With an equilibrium analysis, this paper examines the return of risky asset. The results show that the belief biases, the probability of economy state, the degree of the heterogeneous noise trader's aversion risk, the coefficient between heterogeneous noise traders are all the factors that have effects on the risky asset pricing and the return of risky asset.

  2. Fundamental quantitative security in quantum key generation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yuen, Horace P.

    2010-12-15

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographicmore » context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.« less

  3. Nuclear Attack on U.S. Space-Based Assets: Current Strategy, Policy, Reality, and Implications for the Future.

    DTIC Science & Technology

    1998-06-05

    other.46 This can be useful when certain links 70 have been negated through the destruction of a ground station or actual jamming or interference...system is to attack the enemy’s ground station.59 The link segment can be jammed or spoofed60. However, the DoD has nothing in its inventory currently...currently conducted primarily by jamming assets that prevent the enemy use of his systems. These systems are classified and can only be discussed in

  4. 17 CFR 229.904 - (Item 904) Risk factors and other considerations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975-REGULATION S-K Roll-Up Transactions § 229.904 (Item... successor received by investors in the roll-up transaction will trade in the securities markets at a price... assets of the successor, and the effects on investors of such a trading market discount. (b) Quantify...

  5. Leadership Matters: Prime Minister Koizumi’s Role in the Normalization of Japan’s Post-9/11 Security Policy

    DTIC Science & Technology

    2008-12-01

    normalization of Japan’s post-9/11 security policy and discuss why it took his specific brand of leadership to allow Japan’s security policy to...security policy and discuss why it took his specific brand of leadership to allow Japan’s security policy to expand. vi THIS PAGE INTENTIONALLY LEFT...performance will demonstrate that institutional reasons alone will not make the position of prime minister stronger or more effective . The literature

  6. System and Method for Monitoring Distributed Asset Data

    NASA Technical Reports Server (NTRS)

    Gorinevsky, Dimitry (Inventor)

    2015-01-01

    A computer-based monitoring system and monitoring method implemented in computer software for detecting, estimating, and reporting the condition states, their changes, and anomalies for many assets. The assets are of same type, are operated over a period of time, and outfitted with data collection systems. The proposed monitoring method accounts for variability of working conditions for each asset by using regression model that characterizes asset performance. The assets are of the same type but not identical. The proposed monitoring method accounts for asset-to-asset variability; it also accounts for drifts and trends in the asset condition and data. The proposed monitoring system can perform distributed processing of massive amounts of historical data without discarding any useful information where moving all the asset data into one central computing system might be infeasible. The overall processing is includes distributed preprocessing data records from each asset to produce compressed data.

  7. Laplace transform analysis of a multiplicative asset transfer model

    NASA Astrophysics Data System (ADS)

    Sokolov, Andrey; Melatos, Andrew; Kieu, Tien

    2010-07-01

    We analyze a simple asset transfer model in which the transfer amount is a fixed fraction f of the giver’s wealth. The model is analyzed in a new way by Laplace transforming the master equation, solving it analytically and numerically for the steady-state distribution, and exploring the solutions for various values of f∈(0,1). The Laplace transform analysis is superior to agent-based simulations as it does not depend on the number of agents, enabling us to study entropy and inequality in regimes that are costly to address with simulations. We demonstrate that Boltzmann entropy is not a suitable (e.g. non-monotonic) measure of disorder in a multiplicative asset transfer system and suggest an asymmetric stochastic process that is equivalent to the asset transfer model.

  8. Search for C P Violation and Measurement of the Branching Fraction in the Decay D 0 → K S 0 K S 0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dash, N.; Bahinipati, S.; Bhardwaj, V.

    We repormore » t a study of the decay D 0 → K S 0 K S 0 using 921 fb -1 of data collected at or near the Υ(4 S) and Υ(5 S) resonances with the Belle detector at the KEKB asymmetric energy e+e- collider. The measured time-integrated CP asymmetry is A CP( D 0 → K S 0 K S 0 ) = (-0.02 ± 1.53 ± 0.02 ± 0.17)%, and the branching fraction is B( D 0 → K S 0 K S 0 ) = (1.321 ± 0.023 ± 0.036 ± 0.044) × 10 -4, where the first uncertainty is statistical, the second is systematic, and the third is due to the normalization mode ( D 0 → K S 0 π 0). These results are significantly more precise than previous measurements available for this mode. The A CP measurement is consistent with the standard model expectation.« less

  9. It’s Not New: Historical U.S. Army Security Forces Assistance Efforts

    DTIC Science & Technology

    2012-12-06

    obligation.30 In a recent article published by Small Wars Journal, Kip Whittington , a research associate at the National Defense University...operations in Afghanistan, Whittington believes that building capable indigenous national security institutions meets U.S. and international security...29Ibid., 11. 30Ibid. 31Kip Whittington , “An Afghanistan Without Institutions: A World Without Rest,” Small Wars Journal 8, no. 2 (February 2012

  10. ISO 55000: Creating an asset management system.

    PubMed

    Bradley, Chris; Main, Kevin

    2015-02-01

    In the October 2014 issue of HEJ, Keith Hamer, group vice-president, Asset Management & Engineering at Sodexo, and marketing director at Asset Wisdom, Kevin Main, argued that the new ISO 55000 standards present facilities managers with an opportunity to create 'a joined-up, whole lifecycle approach' to managing and delivering value from assets. In this article, Kevin Main and Chris Bradley, who runs various asset management projects, examine the process of creating an asset management system.

  11. Iran: Politics, Gulf Security, and U.S. Policy

    DTIC Science & Technology

    2016-03-30

    to produce the added benefit of improving U.S.-Iran relations. However, since the deal was finalized, Iran, Iran has tested ballistic missiles and...political and social freedoms and reducing Iran’s international isolation, continues to back state intervention in the economy to benefit workers and lower...is able to generate profits from its business affiliates, which enjoy vast tax and regulatory benefits , and can spend significant amounts of

  12. Fabrication and electrical properties of MoS2 nanodisc-based back-gated field effect transistors.

    PubMed

    Gu, Weixia; Shen, Jiaoyan; Ma, Xiying

    2014-02-28

    Two-dimensional (2D) molybdenum disulfide (MoS2) is an attractive alternative semiconductor material for next-generation low-power nanoelectronic applications, due to its special structure and large bandgap. Here, we report the fabrication of large-area MoS2 nanodiscs and their incorporation into back-gated field effect transistors (FETs) whose electrical properties we characterize. The MoS2 nanodiscs, fabricated via chemical vapor deposition (CVD), are homogeneous and continuous, and their thickness of around 5 nm is equal to a few layers of MoS2. In addition, we find that the MoS2 nanodisc-based back-gated field effect transistors with nickel electrodes achieve very high performance. The transistors exhibit an on/off current ratio of up to 1.9 × 105, and a maximum transconductance of up to 27 μS (5.4 μS/μm). Moreover, their mobility is as high as 368 cm2/Vs. Furthermore, the transistors have good output characteristics and can be easily modulated by the back gate. The electrical properties of the MoS2 nanodisc transistors are better than or comparable to those values extracted from single and multilayer MoS2 FETs.

  13. Attachment anxiety benefits from security priming: Evidence from working memory performance

    PubMed Central

    2018-01-01

    The present study investigates the relationship between the attachment dimensions (anxious vs. avoidance) and the cognitive performance of individuals, specifically whether the attachment dimensions would predict the working memory (WM) performance. In the n-back task, reflecting the WM capacity, both attachment related and non-attachment related words were used. Participants were randomly assigned into two groups that received either the secure or the neutral subliminal priming. In the secure priming condition, the aim was to induce sense of security by presenting secure attachment words prior to the n-back task performance. In neutral priming condition, neutral words that did not elicit sense of security were presented. Structural equation modeling revealed divergent patterns for attachment anxiety and avoidance dimensions under the different priming conditions. In neutral priming condition, WM performance declined in terms of capacity in the n-back task for individuals who rated higher levels of attachment anxiety. However in the secure priming condition, WM performance was boosted in the n-back task for individuals who rated higher levels of attachment anxiety. In other words, the subliminal priming of the security led to increased WM capacity of individuals who rated higher levels of attachment anxiety. This effect, however, was not observed for higher levels of attachment avoidance. Results are discussed along the lines of hyperactivation and deactivation strategies of the attachment system. PMID:29522549

  14. A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms

    NASA Astrophysics Data System (ADS)

    Hassan, Ahmed A.; Bahgat, Waleed M.

    2010-01-01

    Security policies have different components; firewall, active directory, and IDS are some examples of these components. Enforcement of network security policies to low level security mechanisms faces some essential difficulties. Consistency, verification, and maintenance are the major ones of these difficulties. One approach to overcome these difficulties is to automate the process of translation of high level security policy into low level security mechanisms. This paper introduces a framework of an automation process that translates a high level security policy into low level security mechanisms. The framework is described in terms of three phases; in the first phase all network assets are categorized according to their roles in the network security and relations between them are identified to constitute the network security model. This proposed model is based on organization based access control (OrBAC). However, the proposed model extend the OrBAC model to include not only access control policy but also some other administrative security policies like auditing policy. Besides, the proposed model enables matching of each rule of the high level security policy with the corresponding ones of the low level security policy. Through the second phase of the proposed framework, the high level security policy is mapped into the network security model. The second phase could be considered as a translation of the high level security policy into an intermediate model level. Finally, the intermediate model level is translated automatically into low level security mechanism. The paper illustrates the applicability of proposed approach through an application example.

  15. U.S.-Canadian Border Security: Lessons Learned from Denmarks Experience with the Schengen Convention

    DTIC Science & Technology

    2014-03-01

    January 1, 1994, binding the North American continent with similar economic interests and pursuits.10 NAFTA does not deal with security and laws in the...SC). The Department of Homeland Security coordinates U.S. security with representatives from law enforcement, military and civilian entities. Public...European Schengen Convention (SC). The Department of Homeland Security coordinates U.S. security with representatives from law enforcement, military

  16. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglectedmore » or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .« less

  17. Combating Terrorism in the Philippines to Improve U.S. Homeland Security

    DTIC Science & Technology

    2010-12-01

    IMPROVE U.S. HOMELAND SECURITY William E. Lowery Major, United States Air Force B.A., University of Missouri at Kansas City, 1996 M.S., Troy...departing from Manila.1 They also planned to crash an airliner into CIA headquarters. These acts directly threatened U.S. homeland security. The...in Southeast Asia, known as Jemaah Islamiyah (JI), have also been discovered since 9/11. In 2002, Philippine military forces repeatedly uncovered

  18. 12 CFR 560.160 - Asset classification.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Asset classification. 560.160 Section 560.160... Lending and Investment Provisions Applicable to all Savings Associations § 560.160 Asset classification... consistent with, or reconcilable to, the asset classification system used by OTS in its Thrift Activities...

  19. 12 CFR 560.160 - Asset classification.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Asset classification. 560.160 Section 560.160... Lending and Investment Provisions Applicable to all Savings Associations § 560.160 Asset classification... consistent with, or reconcilable to, the asset classification system used by OTS in its Thrift Activities...

  20. 12 CFR 560.160 - Asset classification.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Asset classification. 560.160 Section 560.160... Lending and Investment Provisions Applicable to all Savings Associations § 560.160 Asset classification... consistent with, or reconcilable to, the asset classification system used by OTS in its Thrift Activities...

  1. 12 CFR 560.160 - Asset classification.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Asset classification. 560.160 Section 560.160... Lending and Investment Provisions Applicable to all Savings Associations § 560.160 Asset classification... consistent with, or reconcilable to, the asset classification system used by OTS in its Thrift Activities...

  2. Intelligent cloud computing security using genetic algorithm as a computational tools

    NASA Astrophysics Data System (ADS)

    Razuky AL-Shaikhly, Mazin H.

    2018-05-01

    An essential change had occurred in the field of Information Technology which represented with cloud computing, cloud giving virtual assets by means of web yet awesome difficulties in the field of information security and security assurance. Currently main problem with cloud computing is how to improve privacy and security for cloud “cloud is critical security”. This paper attempts to solve cloud security by using intelligent system with genetic algorithm as wall to provide cloud data secure, all services provided by cloud must detect who receive and register it to create list of users (trusted or un-trusted) depend on behavior. The execution of present proposal has shown great outcome.

  3. Judging Risk and Return of Financial Assets.

    PubMed

    Ganzach

    2000-11-01

    This article examines the relationship between judgments of risk and judgments of expected return of financial assets. It suggests that for unfamiliar assets, both risk and return judgments are derived from global preference toward the asset, whereas for familiar assets, these judgments tend to be derived from the ecological values of the asset's risk and expected return-their values in the financial markets. In addition, the article examines the role of causal schemas and the role of risk attitudes in mediating the relationships between judgments of risk and return of familiar and unfamiliar assets. Conceptual and practical questions concerning the nature, the meaning, and the assessment of risk and expected return are discussed. Copyright 2000 Academic Press.

  4. Compliance with HIPAA security standards in U.S. Hospitals.

    PubMed

    Davis, Diane; Having, Karen

    2006-01-01

    With the widespread use of computer networks, the amount of information stored electronically has grown exponentially, resulting in increased concern for privacy and security of information. The healthcare industry has been put to the test with the federally mandated Health Insurance Portability and Accountability Act (HIPAA) of 1996. To assess the compliance status of HIPAA security standards, a random sample of 1,000 U.S. hospitals was surveyed in January 2004, yielding a return rate of 29 percent. One year later, a follow-up survey was sent to all previous respondents, with 50 percent replying. HIPAA officers'perceptions of security compliance in 2004 and 2005 are compared in this article. The security standards achieving the highest level of compliance in both 2004 and 2005 were obtaining required business associate agreements and physical safeguards to limit access to electronic information systems. Respondents indicated least compliance both years in performing periodic evaluation of security practices governed by the Security Rule. Roadblocks, threats, problems and solutions regarding HIPAA compliance are discussed. This information may be applied to current and future strategies toward maintaining security of information systems throughout the healthcare industry.

  5. Building Efficiency Evaluation and Uncertainty Analysis with DOE's Asset Score Preview

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2016-08-12

    Building Energy Asset Score Tool, developed by the U.S. Department of Energy (DOE), is a program to encourage energy efficiency improvement by helping building owners and managers assess a building's energy-related systems independent of operations and maintenance. Asset Score Tool uses a simplified EnergyPlus model to provide an assessment of building systems, through minimum user inputs of basic building characteristics. Asset Score Preview is a newly developed option that allows users to assess their building's systems and the potential value of a more in-depth analysis via an even more simplified approach. This methodology provides a preliminary approach to estimating amore » building's energy efficiency and potential for improvement. This paper provides an overview of the methodology used for the development of Asset Score Preview and the scoring methodology.« less

  6. 117. Back side technical facilities S.R. radar transmitter & computer ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    117. Back side technical facilities S.R. radar transmitter & computer building no. 102, "building sections - sheet I" - architectural, AS-BLT AW 35-46-04, sheet 12, dated 23 January, 1961. - Clear Air Force Station, Ballistic Missile Early Warning System Site II, One mile west of mile marker 293.5 on Parks Highway, 5 miles southwest of Anderson, Anderson, Denali Borough, AK

  7. 122. Back side technical facilities S.R. radar transmitter & computer ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    122. Back side technical facilities S.R. radar transmitter & computer building no. 102, section II "elevations & details" - structural, AS-BLT AW 35-46-04, sheet 73, dated 23 January, 1961. - Clear Air Force Station, Ballistic Missile Early Warning System Site II, One mile west of mile marker 293.5 on Parks Highway, 5 miles southwest of Anderson, Anderson, Denali Borough, AK

  8. 120. Back side technical facilities S.R. radar transmitter & computer ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    120. Back side technical facilities S.R. radar transmitter & computer building no. 102, section II "foundation & first floor plan" - structural, AS-BLT AW 35-46-04, sheet 65, dated 23 January, 1961. - Clear Air Force Station, Ballistic Missile Early Warning System Site II, One mile west of mile marker 293.5 on Parks Highway, 5 miles southwest of Anderson, Anderson, Denali Borough, AK

  9. 118. Back side technical facilities S.R. radar transmitter & computer ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    118. Back side technical facilities S.R. radar transmitter & computer building no. 102, "building sections - sheet I" - architectural, AS-BLT AW 35-46-04, sheet 13, dated 23 January, 1961. - Clear Air Force Station, Ballistic Missile Early Warning System Site II, One mile west of mile marker 293.5 on Parks Highway, 5 miles southwest of Anderson, Anderson, Denali Borough, AK

  10. 119. Back side technical facilities S.R. radar transmitter & computer ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    119. Back side technical facilities S.R. radar transmitter & computer building no. 102, section I "tower plan, sections & details" - structural, AS-BLT AW 35-46-04, sheet 62, dated 23 January, 1961. - Clear Air Force Station, Ballistic Missile Early Warning System Site II, One mile west of mile marker 293.5 on Parks Highway, 5 miles southwest of Anderson, Anderson, Denali Borough, AK

  11. 121. Back side technical facilities S.R. radar transmitter & computer ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    121. Back side technical facilities S.R. radar transmitter & computer building no. 102, section II "sections & elevations" - structural, AS-BLT AW 35-46-04, sheet 72, dated 23 January, 1961. - Clear Air Force Station, Ballistic Missile Early Warning System Site II, One mile west of mile marker 293.5 on Parks Highway, 5 miles southwest of Anderson, Anderson, Denali Borough, AK

  12. Water security, risk, and economic growth: Insights from a dynamical systems model

    NASA Astrophysics Data System (ADS)

    Dadson, Simon; Hall, Jim W.; Garrick, Dustin; Sadoff, Claudia; Grey, David; Whittington, Dale

    2017-08-01

    Investments in the physical infrastructure, human capital, and institutions needed for water resources management have been noteworthy in the development of most civilizations. These investments affect the economy in two distinct ways: (i) by improving the factor productivity of water in multiple economic sectors, especially those that are water intensive such as agriculture and energy and (ii) by reducing acute and chronic harmful effects of water-related hazards like floods, droughts, and water-related diseases. The need for capital investment to mitigate risks and promote economic growth is widely acknowledged, but prior conceptual work on the relationship between water-related investments and economic growth has focused on the productive and harmful roles of water in the economy independently. Here the two influences are combined using a simple, dynamical systems model of water-related investment, risk, and growth. In cases where initial water security is low, initial investment in water-related assets enables growth. Without such investment, losses due to water-related hazards exert a drag on economic growth and may create a poverty trap. The presence and location of the poverty trap is context-specific and depends on the exposure of productive water-related assets to water-related risk. Exogenous changes in water-related risk can potentially push an economy away from a growth path toward a poverty trap. Our investigation shows that an inverted-U-shaped investment relation between the level of investment in water security and the current level of water security leads to faster rates of growth than the alternatives that we consider here, and that this relation is responsible for the "S"-curve that is posited in the literature. These results illustrate the importance of accounting for environmental and health risks in economic models and offer insights for the design of robust policies for investment in water-related productive assets to manage risk, in the face

  13. Metaphors for cyber security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a varietymore » of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).« less

  14. Preparing for asset retirement.

    PubMed

    Luecke, Randall W; Reinstein, Alan

    2003-04-01

    Statement of Financial Accounting Standards (SFAS) No. 143 requires organizations to recognize a liability for an asset retirement obligation when it is incurred--even if that occurs far in advance of the asset's planned retirement. For example, organizations must recognize future costs associated with medical equipment disposal that carries hazardous material legal obligations.

  15. Mission and Assets Database

    NASA Technical Reports Server (NTRS)

    Baldwin, John; Zendejas, Silvino; Gutheinz, Sandy; Borden, Chester; Wang, Yeou-Fang

    2009-01-01

    Mission and Assets Database (MADB) Version 1.0 is an SQL database system with a Web user interface to centralize information. The database stores flight project support resource requirements, view periods, antenna information, schedule, and forecast results for use in mid-range and long-term planning of Deep Space Network (DSN) assets.

  16. Vulnerable transportation and utility assets near actively migrating streams in Indiana

    USGS Publications Warehouse

    Sperl, Benjamin J.

    2017-11-02

    An investigation was completed by the U.S. Geological Survey in cooperation with the Indiana Office of Community and Rural Affairs that found 1,132 transportation and utility assets in Indiana are vulnerable to fluvial erosion hazards due to close proximity to actively migrating streams. Locations of transportation assets (bridges, roadways, and railroad lines) and selected utility assets (high-capacity overhead power-transmission lines, underground pipelines, water treatment facilities, and in-channel dams) were determined using aerial imagery hosted by the Google Earth platform. Identified assets were aggregated by stream reach, county, and class. Accompanying the report is a polyline shapefile of the stream reaches documented by Robinson. The shapefile, derived from line work in the National Hydrography Dataset and attributed with channel migration rates, is released with complete Federal Geographic Data Committee metadata. The data presented in this report are intended to help stakeholders and others identify high-risk areas where transportation and utility assets may be threatened by fluvial erosion hazards thus warranting consideration for mitigation strategies.

  17. Solubility of K in Fe-S liquid, silicate-K/Fe-S/liq equilibria, and their planetary implications

    NASA Technical Reports Server (NTRS)

    Gangully, J.; Kennedy, G. C.

    1977-01-01

    Potassium has been found to have extremely limited absolute solubility in Fe-S liquid in the pressure-temperature range of 18 to 40 kbars, 1050 to 1150 C, and fO2 within the field of metallic iron. It also partitioned into a certain silicate phase highly in preference to Fe-S liquid at 30 kbar and 1100 C. The dependence of the partitioning of K between solid silicate and Fe-S liquid on fO2 and compositions of mineral solid solutions have been analyzed. These experimental data, along with those of others, limit the amount of K that could fractionate in Fe-S liquid layers or a core in the early history of the moon and, thus, act as localized heat sources in its thermal history models; the data also seem to argue against a chondritic abundance of potassium for earth. The question of fractionation of enough K-40 in an Fe-S liquid outer core of earth to provide the necesary thermal energy for the geomagnetic dynamo remains unresolved.

  18. Semiconductor Technology and U.S. National Security

    DTIC Science & Technology

    2010-04-21

    control regime as hindrances to compete in the global market.45 Interestingly, DOD’s Defense Technology Security Administration ( DTSA ) reviews export...licenses and only advises DOS or DOC.46 DTSA has neither compliance nor enforcement authority. There is no lead organization or a centralized...which lists several semiconductor technologies, is out of date and not used, even by DOD’s DTSA .51 In order to remove certain export controls on

  19. 12 CFR 390.270 - Asset classification.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Asset classification. 390.270 Section 390.270... classification. (a)(1) Each State savings association must evaluate and classify its assets on a regular basis in a manner consistent with, or reconcilable to, the asset classification system used by the FDIC. (2...

  20. 12 CFR 390.270 - Asset classification.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Asset classification. 390.270 Section 390.270... classification. (a)(1) Each State savings association must evaluate and classify its assets on a regular basis in a manner consistent with, or reconcilable to, the asset classification system used by the FDIC. (2...

  1. 12 CFR 390.270 - Asset classification.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Asset classification. 390.270 Section 390.270... classification. (a)(1) Each State savings association must evaluate and classify its assets on a regular basis in a manner consistent with, or reconcilable to, the asset classification system used by the FDIC. (2...

  2. Rapidly Deployable Security System Final Report CRADA No. TC-2030-01

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kohlhepp, V.; Whiteman, B.; McKibben, M. T.

    The ultimate objective of the LEADER and LLNL strategic partnership was to develop and commercialize_a security-based system product and platform for the use in protecting the substantial physical and economic assets of the government and commerce of the United States. The primary goal of this project was to integrate video surveillance hardware developed by LLNL with a security software backbone developed by LEADER. Upon completion of the project, a prototype hardware/software security system that is highly scalable was to be demonstrated.

  3. Design Principles and Guidelines for Security

    DTIC Science & Technology

    2007-11-21

    Padula , Secure Computer Systems: Unified Exposition and Multics Interpretation. Electronic Systems Division, USAF. ESD-TR-75-306, MTR-2997 Rev.1...Hanscom AFB, MA. March 1976 [7] David Elliott Bell. “Looking Back at the Bell-La Padula Model,” Proc. Annual Computer Security Applications Conference

  4. K(L) - K(S) mass difference from lattice QCD.

    PubMed

    Bai, Z; Christ, N H; Izubuchi, T; Sachrajda, C T; Soni, A; Yu, J

    2014-09-12

    We report on the first complete calculation of the K_{L}-K_{S} mass difference, ΔM_{K}, using lattice QCD. The calculation is performed on a 2+1 flavor, domain wall fermion ensemble with a 330 MeV pion mass and a 575 MeV kaon mass. We use a quenched charm quark with a 949 MeV mass to implement Glashow-Iliopoulos-Maiani cancellation. For these heavier-than-physical particle masses, we obtain ΔM_{K}=3.19(41)(96)×10^{-12}  MeV, quite similar to the experimental value. Here the first error is statistical, and the second is an estimate of the systematic discretization error. An interesting aspect of this calculation is the importance of the disconnected diagrams, a dramatic failure of the Okubo-Zweig-Iizuka rule.

  5. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...

  6. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...

  7. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...

  8. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...

  9. Distributed charging of electrical assets

    DOEpatents

    Ghosh, Soumyadip; Phan, Dung; Sharma, Mayank; Wu, Chai Wah; Xiong, Jinjun

    2016-02-16

    The present disclosure relates generally to the field of distributed charging of electrical assets. In various examples, distributed charging of electrical assets may be implemented in the form of systems, methods and/or algorithms.

  10. 17 CFR 249.618 - Form BD-Y2K, information required of broker-dealers pursuant to section 17 of the Securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form BD-Y2K, information... Exchange Members, Brokers, and Dealers § 249.618 Form BD-Y2K, information required of broker-dealers... FR 37674, July 13, 1998] Editorial Note: For Federal Register citations affecting Form BD-Y2K, see...

  11. 16 CFR 802.4 - Acquisitions of voting securities of issuers or non-corporate interests in unincorporated...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... § 802.4 Acquisitions of voting securities of issuers or non-corporate interests in unincorporated... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Acquisitions of voting securities of issuers or non-corporate interests in unincorporated entities holding certain assets the acquisition of which...

  12. 16 CFR 802.4 - Acquisitions of voting securities of issuers or non-corporate interests in unincorporated...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... § 802.4 Acquisitions of voting securities of issuers or non-corporate interests in unincorporated... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Acquisitions of voting securities of issuers or non-corporate interests in unincorporated entities holding certain assets the acquisition of which...

  13. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

    PubMed

    Ali, Bako; Awad, Ali Ismail

    2018-03-08

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  14. Facilities Stewardship: Measuring the Return on Physical Assets.

    ERIC Educational Resources Information Center

    Kadamus, David A.

    2001-01-01

    Asserts that colleges and universities should apply the same analytical rigor to physical assets as they do financial assets. Presents a management tool, the Return on Physical Assets model, to help guide physical asset allocation decisions. (EV)

  15. Self Help Groups and Household Asset Acquisition and Income among Women Group Members in Kisumu East Sub County, Kenya

    ERIC Educational Resources Information Center

    Atieno, Paul Okello

    2017-01-01

    Many studies covering Self-Help Groups (SHGs) have delved extensively on their impacts on food security, livelihoods, socio-economic empowerment, and enterprise enhancement. However, little attention has been paid to the impact of SHGs on household assets acquisition. Traditionally, SHGs are formed by people (mainly women) who are not in formal…

  16. 12 CFR 550.500 - How much must I deposit if I administer fiduciary assets in more than one State?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false How much must I deposit if I administer fiduciary assets in more than one State? 550.500 Section 550.500 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FIDUCIARY POWERS OF SAVINGS ASSOCIATIONS Depositing Securities With...

  17. U.S. National Security: A Selected Bibliography

    DTIC Science & Technology

    2013-12-01

    and Access Services Division, U.S. Army War College Library, by sending an e -mail message to USAWC.LibraryR@us.army.mil, or by phoning (717) 245...ProQuest May, Peter J., Ashley E . Jochim, and Joshua Sapotichne. "Constructing Homeland Security: An Anemic Policy Regime." Policy Studies Journal 39... Layton G., Jr. Reposturing the Force: Implications of Budget Reductions and Regional Rebalancing. Strategy Research Project. Carlisle Barracks: U.S

  18. Identification and Ranking of Critical Assets within an Electrical Grid under Threat of Cyber Attack

    NASA Astrophysics Data System (ADS)

    Boyer, Blake R.

    This paper examines the ranking of critical assets within an electrical grid under threat of cyber attack.1 Critical to this analysis is the assumption of zero hour exploits namely, the threat of an immediate attack as soon as a vulnerability is discovered. Modeling shows that over time load fluctuations as well as other system variations will change the importance of each asset in the delivery of bulk power. As opposed to classic stability studies where risk can be shown to be greatest during high load periods, the zero hour exploit-cyber-risk assumes that vulnerabilities will be attacked as soon as they are discovered. The probability of attacks is made uniform over time to include any and all possible attacks. Examining the impact of an attack and how the grid reacts immediately following an attack will identify and determine the criticality of each asset. This work endeavors to fulfill the NERC Critical Infrastructure Protection Requirements CIP-001-1 through CIP-009-2, cyber security requirements for the reliable supply of bulk power to customers throughout North America. 1Critical assets will here refer to facilities, systems, and equipment, which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the Bulk Electric System, NERC Glossary of Terms Used in Reliability Standards, 2009

  19. Economic security, 1935-85.

    PubMed

    Reno, V P; Grad, S

    1985-12-01

    The economic well-being of both working and retired persons has improved significantly since the Social Security Act was passed in 1935. More people are employed now than at any time since then, despite declining employment among the aged and more years of school attendance among the young. The ratio of non-workers to workers--a broad measure of dependency--is lower now than at any time since the 1930's. Social security has grown and matured to become a strong foundation of retirement income, and other work-related employee benefits have grown in tandem with social security. Employer contributions for social insurance and related employee benefits have grown from being about a 1-percent supplement to aggregate wages and salaries in 1929 to nearly 20 percent today. Social security and Medicare account for just over a fourth of employer contributions, while other public and private retirement systems represent just over another fourth. The balance of benefits for active workers includes group health and life insurance, unemployment insurance, workers' compensation, temporary disability insurance, and related benefits. Pay for holidays, vacations, and sick leave is estimated to have increased from less than 1 percent of aggregate pay in 1929 to about 10 percent today. The improved economic status of the aged has been documented by a series of surveys beginning in 1941-42 and carried out from time to time until 1972 and biennially since 1976. The earlier surveys were supplemented with estimates from record data and tables from the Bureau of the Census. The income of the aged as a whole has grown by about 75 percent over the past 2 decades after taking inflation into account. The income of the aged as a whole grew faster than that of the nonaged in the 1970's and early 1980's when real social security benefits increased faster than inflation and wages lagged behind it. New beneficiaries in 1982 were in better health and were more likely to retire because they wanted to

  20. 17 CFR 249.619 - Form TA-Y2K, information required of transfer agents pursuant to section 17 of the Securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form TA-Y2K, information... Certain Exchange Members, Brokers, and Dealers § 249.619 Form TA-Y2K, information required of transfer... affecting Form TA-Y2K, see the List of CFR Sections Affected, which appears in the Finding Aids section of...

  1. Lessons from Burundi’s Security Sector Reform Process

    DTIC Science & Technology

    2014-11-01

    Defense University,Africa Center for Strategic Studies,300 Fifth Avenue, Building 20 Fort McNair,Washington ,DC,20319-5066 8. PERFORMING ORGANIZATION...Fifth Avenue, Building 20 Fort McNair Washington, D.C. 20319-5066 Phone: + 1 202-685-7300 Website: www.africacenter.org AfricA Security briefS Director...Official Complicity and Impunity (New York: Human Rights Watch, March 2010). 4 Louis- Alexandre Berg, “Security Governance and the Recurrence of

  2. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    DTIC Science & Technology

    2009-10-15

    and technical measures to prevent unauthorized or accidental use of nuclear weapons, as well as contribute to physical security of storage ...Talks On Nuclear Security,” The Boston Globe, May 5, 2009. 79 Abdul Mannan, “Preventing Nuclear Terrorism in Pakistan: Sabotage of a Spent Fuel Cask or...a Commercial Irradiation Source in Transport ,” in Pakistan’s Nuclear Future, 2008; Martellini, 2008. 80 Martellini, 2008. 81 For more information

  3. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    ERIC Educational Resources Information Center

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  4. Information risk and security modeling

    NASA Astrophysics Data System (ADS)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  5. Report: Fiscal Year 2006 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    EPA Pesticide Factsheets

    Report #2006-S-00008, September 25, 2006. Although the Agency has made substantial progress to improve its security program, the OIG identified weaknesses in the Agency’s incident reporting practices.

  6. Late Cenozoic calc-alkaline volcanism over the Payenia shallow subduction zone, South-Central Andean back-arc (34°30‧-37°S), Argentina

    NASA Astrophysics Data System (ADS)

    Litvak, Vanesa D.; Spagnuolo, Mauro G.; Folguera, Andrés; Poma, Stella; Jones, Rosemary E.; Ramos, Víctor A.

    2015-12-01

    A series of mesosilicic volcanic centers have been studied on the San Rafael Block (SRB), 300 km to the east of the present-day volcanic arc. K-Ar ages indicate that this magmatic activity was developed in at least two stages: the older volcanic centers (˜15-10 Ma) are located in the central and westernmost part of the SRB (around 36°S and 69°W) and the younger centers (8-3.5 Ma) are located in an eastern position (around 36°S and 69°30‧W) with respect to the older group. These volcanic rocks have andesitic to dacitic compositions and correspond to a high-K calc-alkaline sequence as shown by their SiO2, K2O and FeO/MgO contents. Elevated Ba/La, Ba/Ta and La/Ta ratios show an arc-like signature, and primitive mantle normalized trace element diagrams show typical depletions of high field strength elements (HFSE) relative to large ion lithophile elements (LILE). Rare earth element (REE) patterns suggest pyroxene and amphibole crystallization. Geochemical data obtained for SRB volcanic rocks support the proposal for a shallow subduction zone for the latest Miocene between 34°30″-37°S. Regionally, SRB volcanism is associated with a mid-Miocene to early Pliocene eastward arc migration caused by the shallowing of the subducting slab in the South-Central Andes at these latitudes, which represents the evolution of the Payenia shallow subduction segment. Overall, middle Miocene to early Pliocene volcanism located in the Payenia back-arc shows evidence for the influence of slab-related components. The younger (8-3.5 Ma) San Rafael volcanic rocks indicate the maximum slab shallowing and the easternmost extent of slab influence in the back-arc.

  7. Cyber Security and Resilient Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments tomore » date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and

  8. Kuwait: Security, Reform, and U.S. Policy

    DTIC Science & Technology

    2014-01-30

    is a member of the Middle East North Africa Financial Action Task Force ( FATF ), but it has been identified by that body as having deficiencies in...Security, Reform, and U.S. Policy Congressional Research Service 24 has developed an action plan with the FATF to address the weaknesses. Some Kuwait

  9. Information Security Analysis: A Study to Analyze the Extent to Which Information Security Systems Can Be Utilized to Prevent Intoxicated Individuals from Driving

    ERIC Educational Resources Information Center

    Pierre, Joseph D.

    2011-01-01

    Information security systems (ISS) have been designed to protect assets from damages and from unauthorized access internally as well as externally. This research is promising similar protection from ISS methods that could prevent intoxicated individuals under the influence of alcohol from driving. However, previous research has shown significant…

  10. Two-photon decay of K-shell vacancies in silver atoms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mokler, P.H.; University of Giessen, Giessen; Schaeffer, H.W.

    2004-09-01

    The spectral distributions for the two-photon decay modes of singly K-shell ionized silver atoms are determined by x-ray-x-ray coincidence measurements. Ag K-shell vacancies were induced by nuclear electron capture decay of radioactive cadmium isotopes {sup 109}Cd and two-photon coincidences were taken back to back (180 deg.) and at a 90 deg. opening angle for the emission. Each of the two-photon transitions from the 2s, 3s, and 3d states exhibits unique angular and spectral distributions. The measurements agree nicely with relativistic self-consistent field calculations of Tong et al. Our results also confirm and extend the earlier experimental data of Ilakovac andmore » co-workers with improved accuracy.« less

  11. Asset surveillance system: apparatus and method

    NASA Technical Reports Server (NTRS)

    Bickford, Randall L. (Inventor)

    2007-01-01

    System and method for providing surveillance of an asset comprised of numerically fitting at least one mathematical model to obtained residual data correlative to asset operation; storing at least one mathematical model in a memory; obtaining a current set of signal data from the asset; retrieving at least one mathematical model from the memory, using the retrieved mathematical model in a sequential hypothesis test for determining if the current set of signal data is indicative of a fault condition; determining an asset fault cause correlative to a determined indication of a fault condition; providing an indication correlative to a determined fault cause, and an action when warranted. The residual data can be mode partitioned, a current mode of operation can be determined from the asset, and at least one mathematical model can be retrieved from the memory as a function of the determined mode of operation.

  12. Integrating QoS and security functions in an IP-VPN gateway

    NASA Astrophysics Data System (ADS)

    Fan, Kuo-Pao; Chang, Shu-Hsin; Lin, Kuan-Ming; Pen, Mau-Jy

    2001-10-01

    IP-based Virtual Private Network becomes more and more popular. It can not only reduce the enterprise communication cost but also increase the revenue of the service provider. The common IP-VPN application types include Intranet VPN, Extranet VPN, and remote access VPN. For the large IP-VPN market, some vendors develop dedicated IP-VPN devices; while some vendors add the VPN functions into their existing network equipment such as router, access gateway, etc. The functions in the IP-VPN device include security, QoS, and management. The common security functions supported are IPSec (IP Security), IKE (Internet Key Exchange), and Firewall. The QoS functions include bandwidth control and packet scheduling. In the management component, policy-based network management is under standardization in IETF. In this paper, we discuss issues on how to integrate the QoS and security functions in an IP-VPN Gateway. We propose three approaches to do this. They are (1) perform Qos first (2) perform IPSec first and (3) reserve fixed bandwidth for IPSec. We also compare the advantages and disadvantages of the three proposed approaches.

  13. Analysis of information security management systems at 5 domestic hospitals with more than 500 beds.

    PubMed

    Park, Woo-Sung; Seo, Sun-Won; Son, Seung-Sik; Lee, Mee-Jeong; Kim, Shin-Hyo; Choi, Eun-Mi; Bang, Ji-Eon; Kim, Yea-Eun; Kim, Ok-Nam

    2010-06-01

    The information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on information security and security countermeasures which meet both international standards and the needs of individual hospitals. The ISMS check-list derived from international/domestic standards was distributed to each hospital to complete and the staff of each hospital was interviewed. Information Security Indicator and Information Security Values were used to estimate the present security levels and evaluate the application of each hospital's current system. With regard to the moderate clause of the ISMS, the hospitals were determined to be in compliance. The most vulnerable clause was asset management, in particular, information asset classification guidelines. The clauses of information security incident management and business continuity management were deemed necessary for the establishment of successful ISMS. The level of current ISMS in the hospitals evaluated was determined to be insufficient. Establishment of adequate ISMS is necessary to ensure patient privacy and the safe use of medical records for various purposes. Implementation of ISMS which meet international standards with a long-term and comprehensive perspective is of prime importance. To reflect the requirements of the varied interests of medical staff, consumers, and institutions, the establishment of political support is essential to create suitable hospital ISMS.

  14. National Security and U.S.-Soviet Relations. Occasional Paper 26.

    ERIC Educational Resources Information Center

    Clemens, Walter C., Jr.

    This paper provides an analytical look at the evolving relationship between the United States and the Soviet Union. The author explores the prospects for international security and advocates a number of policies which would benefit both societies. The first section in the booklet discusses how U.S. security cannot be assured even if the Congress…

  15. 76 FR 78594 - Reporting of Specified Foreign Financial Assets

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-19

    ... Reporting of Specified Foreign Financial Assets AGENCY: Internal Revenue Service (IRS), Treasury. ACTION... foreign financial assets and the value of those assets is more than the applicable reporting threshold... hold specified foreign financial assets generally will be excepted from reporting such assets under...

  16. Food Security and Women's Access to Natural Resources workshop; a brief report.

    PubMed

    1997-01-01

    This article describes the workshop on Food Security and Women's Access to Natural Resources, held in January 1997 in Mumbai, India. The workshop was organized jointly by the Tata Institute of Social Sciences and the Indian Association of Women's Studies. The aim was to examine the food security situation in Maharashtra and Gujarat states in the west, the initiative to build alternative institutions, legal changes augmenting industrialization, and how traditional rights to common property resources can be legalized and how the poor can have access to new resources. The workshop organizers were unable to obtain experts on some topics. Core discussion centered on changes in industrialization, natural resources, gender and food security; access to natural resources and poverty alleviation programs; initiatives to create food security; and laws related to access to land and water. Discussions revealed the alienation of small and marginal farmers, landless laborers, and artisans from their livelihoods and survival strategies for these disenfranchised groups. The design of drought eradication and water conservation programs did not permit women and men working at construction sites to have access to the program assets. Case studies revealed situations in which women won the right of access to community water and then negotiated for land in lease. The women used landowners to negotiate credit and access development program assets, but normal channels of the National Bank of Agricultural Research and Development could have provided these benefits. Participants discussed how governments can be held accountable and how public funds could be used to revamp poverty alleviation and asset creation programs. All agreed that macrolevel development should give priority to agricultural development and legal constraints or problems. Five follow-up activities are identified.

  17. Cost approach of health care entity intangible asset valuation.

    PubMed

    Reilly, Robert F

    2012-01-01

    In the valuation synthesis and conclusion process, the analyst should consider the following question: Does the selected valuation approach(es) and method(s) accomplish the analyst's assignment? Also, does the selected valuation approach and method actually quantify the desired objective of the intangible asset analysis? The analyst should also consider if the selected valuation approach and method analyzes the appropriate bundle of legal rights. The analyst should consider if there were sufficient empirical data available to perform the selected valuation approach and method. The valuation synthesis should consider if there were sufficient data available to make the analyst comfortable with the value conclusion. The valuation analyst should consider if the selected approach and method will be understandable to the intended audience. In the valuation synthesis and conclusion, the analyst should also consider which approaches and methods deserve the greatest consideration with respect to the intangible asset's RUL. The intangible asset RUL is a consideration of each valuation approach. In the income approach, the RUL may affect the projection period for the intangible asset income subject to either yield capitalization or direct capitalization. In the cost approach, the RUL may affect the total amount of obsolescence, if any, from the estimate cost measure (that is, the intangible reproduction cost new or replacement cost new). In the market approach, the RUL may effect the selection, rejection, and/or adjustment of the comparable or guideline intangible asset sale and license transactional data. The experienced valuation analyst will use professional judgment to weight the various value indications to conclude a final intangible asset value, based on: The analyst's confidence in the quantity and quality of available data; The analyst's level of due diligence performed on that data; The relevance of the valuation method to the intangible asset life cycle stage and

  18. Risk Quantification for Sustaining Coastal Military Installation Assets and Mission Capabilities

    DTIC Science & Technology

    2014-06-01

    Sustaining Coastal Military Assets and 5a. CONTRACT NUMBER Mission Capabilities: Final Technical Report 5b. GRANT NUMBER 6. AUTHOR(S) Burks-Copes...critical assets system wide: 1) Hurricane winds have been generated using the Planetary Boundary Layer (PBL) wind model TC96 (Thompson and Cardone 1996...mean air density, pc is pressure representing the tropical cyclone, CD is the drag coefficient, and h is the depth of the PBL (Thompson and Cardone

  19. 78 FR 23565 - Determination of Insufficient Assets To Satisfy Claims Against Financial Institution in Receivership

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-19

    ... costly to the deposit insurance fund (see 12 U.S.C. 1823(c)(4)), the FDIC facilitated a transaction with... most of the assets of the failed institution. Section 11(d)(11)(A) of the FDI Act, 12 U.S.C. 1821(d)(11... by $1,698,423,504. Accordingly, the FDIC has determined that insufficient assets exist to make any...

  20. The Q theory of investment, the capital asset pricing model, and asset valuation: a synthesis.

    PubMed

    McDonald, John F

    2004-05-01

    The paper combines Tobin's Q theory of real investment with the capital asset pricing model to produce a new and relatively simple procedure for the valuation of real assets using the income approach. Applications of the new method are provided.