Sample records for security cfo processes

  1. Why information security belongs on the CFO's agenda.

    PubMed

    Quinnild, James; Fusile, Jeff; Smith, Cindy

    2006-02-01

    Healthcare financial executives need to understand the complex and growing role of information security in supporting the business of health care. The biggest security gaps in healthcare organizations occur in strategy and centralization, business executive preparation, and protected health information. CFOs should collaborate with the CIO in engaging a comprehensive framework to develop, implement, communicate, and maintain an enterprisewide information security strategy.

  2. 22 CFR 213.17 - Liquidation of collateral.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Liquidation of collateral. Where the CFO holds a security instrument with a power of sale or has physical possession of collateral, he may liquidate the security or collateral and apply the proceeds to the overdue... circumstances require judicial foreclosure. However, collection from other businesses, including liquidation of...

  3. Multiferroic Applications of Nanoarchitectured, Solution-Processed Materials

    NASA Astrophysics Data System (ADS)

    Buditama, Abraham Nataniel

    This dissertation compiles work on sol-gel syntheses of multiferroic materials and applications thereof. Multiferroics, or materials that simultaneously exhibit multiple order parameters such as ferromagnetism, ferroelectricity, or ferroelasticity, may be fabricated by solution processing techniques. Specifically, these techniques may be used to control both the atomic and the nanoscale structures of piezoelectric lead zirconate titanate (PbZrxTi 1-xO3 or PZT) and magnetostrictive cobalt ferrite (CoFe 2O4 or CFO). The first part of this work focuses on strain-coupling PZT and CFO into a magnetoelectric composite. A mesoporous CFO framework was synthesized using block copolymer templating, which was subsequently conformally filled by PZT by atomic layer deposition (ALD). The final porosity of the film is controlled by the ALD PZT layer, and we show that this porosity influences the magnetoelectric coupling of the composite. An ex situ external electric field is applied to the composite, and samples with the greatest porosity, and thus greatest mechanical flexibility, were able to accommodate strain transfer to the CFO, resulting in a greater reduction of the sample saturation magnetization. The second part of this work focuses on using solution processing to control domain-level contributions to the material's ferroic properties. An iterative spin coating process can be used to create PZT films of arbitrary thickness. Electric domains are generally pinned in nanoscale PZT thin films, but models of PZT films on the mesoscale must consider domain reorientation. As for CFO, solution processing may be used to control the CFO grain size, which in turn limits the size of its magnetic domains, and subsequently its static magnetic properties.

  4. Diligence in front-end processes is critical: an interview with Cheryl A. Harmon.

    PubMed

    Harmon, Cheryl A

    2002-12-01

    Cheryl Harmon's position reflects her organization's emphasis on an expanded role for the CFO. Harmon was hired recently to serve as CFO of Provena Covenant Medical Center, (PCMC) in Urbana, Illinois. Her mission as CFO is to help develop strategies to ensure that Provena Covenant maintains its financial stability. Harmon appreciates Povena Covenant's creative approaches to challenges faced by many healthcare organizations, such as workforce shortages.

  5. Magnetic cobalt ferrite composite as an efficient catalyst for photocatalytic oxidation of carbamazepine.

    PubMed

    He, Yongzhen; Dai, Chaomeng; Zhou, Xuefei

    2017-01-01

    A magnetic spinel cobalt ferrite nanoparticle composite (CFO) was prepared via an ultrasonication-assisted co-precipitation method. The morphological structure and surface composition of CFO before and after reaction were investigated by using X-ray diffraction, scanning electron microscopy, transmission electron microscopy, energy dispersive X-ray, and Fourier transform infrared spectroscopy, indicating the consumption of iron oxide during photodegradation. X-ray photoelectron spectroscopy and vibrating sample magnetometry confirm the preparation of the ferrite nanoparticle composite and its magnetic properties. The prepared CFO was then used for the photocatalytic degradation of carbamazepine (CBZ) as an example of pharmaceuticals and personal care products (PPCPs) from aqueous solution. The effects of the nanocomposite dosage, contact time, and solution pH on the photodegradation process were investigated. More than 96% of the CBZ was degraded within 100 min at 0.2 g·L -1 CFO in the presence of UV light. The reactive species for CBZ degradation in the CFO/UV system was identified as hydroxyl radicals by the methanol scavenging method. Combined with the detection of leached iron ions during the process, the CBZ degradation mechanism can be presumed to be heterogeneous and homogeneous photocatalytic degradation in the CFO/UV system. Furthermore, iminostilbene and acridine were detected as intermediate products by GC-MS.

  6. Regulation of the forming process and the set voltage distribution of unipolar resistance switching in spin-coated CoFe2O4 thin films.

    PubMed

    Mustaqima, Millaty; Yoo, Pilsun; Huang, Wei; Lee, Bo Wha; Liu, Chunli

    2015-01-01

    We report the preparation of (111) preferentially oriented CoFe2O4 thin films on Pt(111)/TiO2/SiO2/Si substrates using a spin-coating process. The post-annealing conditions and film thickness were varied for cobalt ferrite (CFO) thin films, and Pt/CFO/Pt structures were prepared to investigate the resistance switching behaviors. Our results showed that resistance switching without a forming process is preferred to obtain less fluctuation in the set voltage, which can be regulated directly from the preparation conditions of the CFO thin films. Therefore, instead of thicker film, CFO thin films deposited by two times spin-coating with a thickness about 100 nm gave stable resistance switching with the most stable set voltage. Since the forming process and the large variation in set voltage have been considered as serious obstacles for the practical application of resistance switching for non-volatile memory devices, our results could provide meaningful insights in improving the performance of ferrite material-based resistance switching memory devices.

  7. Review, reaction, and projection: the role of the CFO in planning.

    PubMed

    Nauert, R C

    1985-08-01

    In recent years, CFOs have become an integral part of the healthcare organization's strategic planning process. Although not the leader in the process, CFOs should assume a role of review, reaction, and projection. Furthermore, they should oppose any venture that would weaken the financial strength of the institution--whether or not they support the venture on social grounds. The CFO's responsibility in planning is to improve the financial strength of the organization, using support documentation, thorough preparation, and logic. The CEO's concern for community needs and desire to pursue a new business should be tempered by the CFO's financial and economic judgment.

  8. The prokaryotic thermophilic TF1-ATPase is functionally compatible with the eukaryotic CFo-part of the chloroplast ATP-synthase.

    PubMed

    Galmiche, J M; Pezennec, S; Zhao, R; Girault, G; Baeuerlein, E

    1994-01-31

    The ATP synthase from chloroplasts, CFo.F1, was reconstituted into liposomes, from which most of CF1 was removed by a short treatment with guanidinium chloride. ATP-dependent proton uptake was restored with these CFo-liposomes even better by the addition of the bacterial TF1-than of the related CF1-part. This proton uptake was prevented by tentoxin, a specific inhibitor of the CF1-ATPase, in these CFo.F1-liposomes, but not in the hybrid CFo.TF1-liposomes. Venturicidin, a specific inhibitor of proton flow through CFo, was able to block it in both the hybrid CFo.TF1-liposomes and reconstituted CFo.F1-liposomes. These results indicate that the bacterial TF1-part binds to the eukaryotic CFo-part of four subunits forming a functional CFo.TF1-ATPase.

  9. CFO compensation method using optical feedback path for coherent optical OFDM system

    NASA Astrophysics Data System (ADS)

    Moon, Sang-Rok; Hwang, In-Ki; Kang, Hun-Sik; Chang, Sun Hyok; Lee, Seung-Woo; Lee, Joon Ki

    2017-07-01

    We investigate feasibility of carrier frequency offset (CFO) compensation method using optical feedback path for coherent optical orthogonal frequency division multiplexing (CO-OFDM) system. Recently proposed CFO compensation algorithms provide wide CFO estimation range in electrical domain. However, their practical compensation range is limited by sampling rate of an analog-to-digital converter (ADC). This limitation has not drawn attention, since the ADC sampling rate was high enough comparing to the data bandwidth and CFO in the wireless OFDM system. For CO-OFDM, the limitation is becoming visible because of increased data bandwidth, laser instability (i.e. large CFO) and insufficient ADC sampling rate owing to high cost. To solve the problem and extend practical CFO compensation range, we propose a CFO compensation method having optical feedback path. By adding simple wavelength control for local oscillator, the practical CFO compensation range can be extended to the sampling frequency range. The feasibility of the proposed method is experimentally investigated.

  10. Synthesis and structural characterization of magnetic cadmium sulfide-cobalt ferrite nanocomposite, and study of its activity for dyes degradation under ultrasound

    NASA Astrophysics Data System (ADS)

    Farhadi, Saeed; Siadatnasab, Firouzeh

    2016-11-01

    Cadmium sulfide-cobalt ferrite (CdS/CFO) nanocomposite was easily synthesized by one-step hydrothermal decomposition of cadmium diethyldithiocarbamate complex on the CoFe2O4 nanoparticles at 200 °C. Spectroscopic techniques of powder X-ray diffraction (XRD), Fourier-transform infrared spectroscopy (FT-IR), UV-visible spectroscopy, field emission scanning electron microscopy (FESEM), energy-dispersive X-ray spectroscopy (EDX), Brunauer-Emmett-Teller (BET), and magnetic measurements were applied for characterizing the structure and morphology of the product. The results of FT-IR, XRD and EDX indicated that the CdS/CFO was highly pure. SEM and TEM results revealed that the CdS/CFO nanocomposite was formed from nearly uniform and sphere-like nanoparticles with the size of approximately 20 nm. The UV-vis absorption spectrum of the CdS/CFO nanocomposite showed the band gap of 2.21 eV, which made it suitable for sono-/photo catalytic purposes. By using the obtained CdS/CFO nanocomposite, an ultrasound-assisted advanced oxidation process (AOP) has been developed for catalytic degradation of methylene blue (MB), Rhodamine B (RhB), and methyl orange (MO)) in the presence of H2O2 as a green oxidant. CdS/CFO nanocomposite exhibited excellent sonocatalytic activity, so that, dyes were completely degraded in less than 10 min. The influences of crucial factors such as the H2O2 amount and catalyst dosage on the degradation efficiency were evaluated. The as-prepared CdS/CFO nanocomposite exhibited higher catalytic activity than pure CdS nanoparticles. Moreover, the magnetic property of CoFe2O4 made the nanocomposite recyclable.

  11. Lattice strain induced multiferroicity in PZT-CFO particulate composite

    NASA Astrophysics Data System (ADS)

    Pradhan, Lagen Kumar; Pandey, Rabichandra; Kumar, Rajnish; Kar, Manoranjan

    2018-02-01

    Lead Zirconate Titanate [Pb(Zr0.52Ti0.48)O3/PZT] and Cobalt Ferrite [CoFe2O4/CFO] based multiferroic composites [(1-x)PZT-(x)CFO] with (x = 0.10-0.40) have been prepared to study its magnetoelectric (ME) and multiferroic properties. X-ray diffraction method along with the Rietveld refinement technique reveals that the crystal symmetries corresponding to PZT and CFO exist independently in the composites. The effect of interfacial strain on lattice distortion in PZT has been observed. It is well correlated with the magnetoelectric coupling of the composites. Dispersion behavior of dielectric constant with frequency can be explained by the modified Debye model. Different relaxation phenomena have been observed in PZT-CFO particulate composites. The ferroelectric properties of composites decrease with the increase in percentage of CFO in the composite. Both saturation (Ms) and remanent (Mr) magnetization increase with the increase in CFO content in the composite. The maximum ME coupling was found to be 1.339 pC/cm2 Oe for the composition (0.80) PZT-(0.20) CFO at the application of maximum magnetic field of 50 Oe. The multiferroic properties in CFO-PZT can be explained by the lattice strain at the CFO-PZT interfaces.

  12. Cobalt ferrite nanoparticles with improved aqueous colloidal stability and electrophoretic mobility

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Munjal, Sandeep, E-mail: drsandeepmunjal@gmail.com; Khare, Neeraj, E-mail: nkhare@physics.iitd.ernet.in

    We have synthesized CoFe{sub 2}O{sub 4} (CFO) nanoparticles of size ∼ 12.2 nm by hydrothermal synthesis method. To control the size of these CFO nanoparticles, oleic acid was used as a surfactant. The inverse spinel phase of the synthesized nanoparticles was confirmed by X-ray diffraction method. As synthesized oleic acid coated CFO (OA@CFO) nanoparticles has very less electrophoretic mobility in the water and are not water dispersible. These OA@CFO nanoparticles were successfully turned into water soluble phase with a better colloidal aqueous stability, through a chemical treatment using citric acid. The modified citric acid coated CFO (CA@CFO) nanoparticles were dispersible inmore » water and form a stable aqueous solution with high electrophoretic mobility.« less

  13. Magnetic and electron spin resonance studies of W doped CoFe2O4 polycrystalline materials

    NASA Astrophysics Data System (ADS)

    Singamaneni, S. R.; Martinez, L. M.; Swadipta, R.; Ramana, C. V.

    2018-05-01

    We report the magnetic and electron spin resonance (ESR) properties of W doped CoFe2O4 polycrystalline materials, prepared by standard solid-state reaction method. W was doped (0-15%) in CFO lattice on Fe site. Isothermal magnetization measurements reveal that the coercive field (Hc) (1300-2200 Oe) and saturation magnetization MS (35-82 emu/g) vary strongly as a function of W doping at all the temperatures (4-300 K) measured. We believe that a strong decrease in magnetic anisotropy in CFO after doping with W could cause a decrease in Hc. Up on doping CFO with W in place of Fe, the process transforms part of Fe3+ into Fe2+ due to the creation of more oxygen vacancies. This hinders the super-exchange interaction between Fe3+ and Fe2+, which causes a decrease in MS. Zero-field cooled (ZFC) and field cooled (FC, 1000 Oe) magnetization responses measured at 4 K on 1% W doped CFO show no indication of exchange bias, inferring that there are no other microscopic secondary magnetic phases (no segregation). This observation is corroborated by ESR (9.398 GHz) measurements collected as a function of temperature (10-150 K) and W doping (0-15%). We find that ESR spectra did not change after doping with W above 0.5%. However, ESR spectra collected from 0.5% W doped CFO sample showed a strong temperature dependence. We observed several ESR signals from 0.5% W doped CFO sample that could be due to phase separation.

  14. Impacts of amorphous and crystalline cobalt ferrite layers on the giant magneto-impedance response of a soft ferromagnetic amorphous ribbon

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mukherjee, D.; Devkota, J.; Ruiz, A.

    2014-09-28

    A systematic study of the effect of depositing CoFe₂O₄ (CFO) films of various thicknesses (d = 0–600 nm) on the giant magneto-impedance (GMI) response of a soft ferromagnetic amorphous ribbon Co₆₅Fe₄Ni₂Si₁₅B₁₄ has been performed. The CFO films were grown on the amorphous ribbons by the pulsed laser deposition technique. X-ray diffraction and transmission electron microscopy revealed a structural variation of the CFO film from amorphous to polycrystalline as the thickness of the CFO film exceeded a critical value of 300 nm. Atomic force microscopy evidenced the increase in surface roughness of the CFO film as the thickness of the CFOmore » film was increased. These changes in the crystallinity and morphology of the CFO film were found to have a distinct impact on the GMI response of the ribbon. Relative to the bare ribbon, coating of amorphous CFO films significantly enhanced the GMI response of the ribbon, while polycrystalline CFO films decreased it considerably. The maximum GMI response was achieved near the onset of the structural transition of the CFO film. These findings are of practical importance in developing high-sensitivity magnetic sensors.« less

  15. Six Lessons We Learned Applying Six Sigma

    NASA Technical Reports Server (NTRS)

    Carroll, Napoleon; Casleton, Christa H.

    2005-01-01

    As Chief Financial Officer of Kennedy Space Center (KSC), I'm not only responsible for financial planning and accounting but also for building strong partnerships with the CFO customers, who include Space Shuttle and International Space Station operations as well all who manage the KSC Spaceport. My never ending goal is to design, manage and continuously improve our core business processes so that they deliver world class products and services to the CFO's customers. I became interested in Six Sigma as Christa Casleton (KSC's first Six Sigma Black belt) applied Six Sigma tools and methods to our Plan and Account for Travel Costs Process. Her analysis was fresh, innovative and thorough but, even more impressive, was her approach to ensure ongoing, continuous process improvement. Encouraged by the results, I launched two more process improvement initiatives aimed at applying Six Sigma principles to CFO processes that not only touch most of my employees but also have direct customer impact. As many of you know, Six Sigma is a measurement scale that compares the output of a process with customer requirements. That's straight forward, but demands that you not only understand your processes but also know your products and the critical customer requirements. The objective is to isolate and eliminate the causes of process variation so that the customer sees consistently high quality.

  16. Porous carbon nanotubes decorated with nanosized cobalt ferrite as anode materials for high-performance lithium-ion batteries

    NASA Astrophysics Data System (ADS)

    Wang, Lingyan; Zhuo, Linhai; Cheng, Haiyang; Zhang, Chao; Zhao, Fengyu

    2015-06-01

    Generally, the fast ion/electron transport and structural stability dominate the superiority in lithium-storage applications. In this work, porous carbon nanotubes decorated with nanosized CoFe2O4 particles (p-CNTs@CFO) have been rationally designed and synthesized by the assistance of supercritical carbon dioxide (scCO2). When tested as anode materials for lithium-ion batteries, the p-CNTs@CFO composite exhibits outstanding electrochemical behavior with high lithium-storage capacity (1077 mAh g-1 after 100 cycles) and rate capability (694 mAh g-1 at 3 A g-1). These outstanding electrochemical performances are attributed to the synergistic effect of porous p-CNTs and nanosized CFO. Compared to pristine CNTs, the p-CNTs with substantial pores in the tubes possess largely increased specific surface area and rich oxygen-containing functional groups. The porous structure can not only accommodate the volume change during lithiation/delithiation processes, but also provide bicontinuous electron/ion pathways and large electrode/electrolyte interface, which facilitate the ion diffusion kinetics, improving the rate performance. Moreover, the CFO particles are bonded strongly to the p-CNTs through metal-oxygen bridges, which facilitate the electron fast capture from p-CNTs to CFO, and thus resulting in a high reversible capacity and excellent rate performance. Overall, the porous p-CNTs provide an efficient way for ion diffusion and continuous electron transport as anode materials.

  17. Compositional dependence of magnetic anisotropy in chemically synthesized Co3- x Fe x O4 (0 ≤ x ≤ 2)

    NASA Astrophysics Data System (ADS)

    Hayashi, Kensuke; Yamada, Keisuke; Shima, Mutsuhiro

    2018-01-01

    Magnetic anisotropy of Co3- x Fe x O4 (CFO, 0 ≤ x ≤ 2) thin-film and powder samples prepared by a sol-gel method has been investigated as a function of Fe composition x. Structural analyses by X-ray diffraction show that CFO powder samples exhibit diffraction peaks associated with the spinel structure when x < 2, while CFO thin-film samples with thickness of 130-510 nm yield the peaks when 0 ≤ x ≤ 2. CFO thin-film samples are highly (111)-oriented with the Lotgering factor greater than 0.9 when 0.6 ≤ x ≤ 1.3. The magnetic anisotropy constant K 1 of CFO powder samples estimated from their room-temperature hysteresis loops yields a minimum when x = 0.9. Relatively large in-plane magnetic anisotropy (K eff = 5.7 × 105 erg/cm3) is observed for the CFO thin-film sample when x = 1.3. With increasing x, the magnetic easy axis of the spinel CFO changes from 〈111〉 to 〈100〉 when x = 0.9.

  18. Engineering Nano-Structured Multiferroic Thin Films

    NASA Astrophysics Data System (ADS)

    Cheung, Pui Lam

    Multiferroics exhibit remarkable tunabilities in their ferromagnetic, ferroelectric and magnetoelectric properties that provide the potential in enabling the control of magnetizations by electric field for the next generation non-volatile memories, antennas and motors. In recent research and developments in integrating single-phase ferroelectric and ferromagnetic materials, multiferroic composite demonstrated a promising magnetoelectric (ME) coupling for future applications. Atomic layer deposition (ALD) technique, on the other hand, allows fabrications of complex multiferroic nanostructures to investigate interfacial coupling between the two materials. In this work, radical-enhanced ALD of cobalt ferrite (CFO) and thermal ALD of lead zirconate titanate (PZT) were combined in fabricating complex multiferroic architectures in investigating the effect of nanostructuring and magnetic shape anisotropy on improving ME coupling. In particular, 1D CFO nanotubes and nanowires; 0D-3D CFO/PZT mesoporous composite; and 1D-1D CFO/PZT core-shell nanowire composite were studied. The potential implementation of nanostructured multiferroic composites into functioning devices was assessed by quantifying the converse ME coupling coefficient. The synthesis of 1D CFO nanostructures was realized by ALD of CFO in anodic aluminum oxide (AAO) membranes. This work provided a simple and inexpensive route to create parallel and high aspect ratio ( 55) magnetic nanostructures. The change in magnetic easy axis of (partially filled) CFO nanotubes from perpendicular to parallel in (fully-filled) nanowires indicated the significance of the geometric factor in controlling magnetizations and ME coupling. The 0D-3D CFO/PZT mesoporous composite demonstrated the optimizations of the strain transfer could be achieved by precise thickness control. 100 nm of mesoporous PZT was synthesized on Pt/TiOx/SiO2/Si using amphiphilic diblock copolymers as a porous ferroelectric template (10 nm pore diameter) for ALD CFO growth. The increased filling of CFO decreased the mechanical flexibility of the composite for electric field induced strain, hence the converse ME coupling was mitigated. The highest converse ME coefficient of 1.2 10-5 Oe-cm/mV was achieved with a 33% pore filling of CFO, in compare to 1 x 10-5 Oe-cm/mV from mesoporous CFO filled with 3 nm of PZT in literature (Chien 2016). Highly directional 1D-1D PZT-core CFO-shell composite in AAO demonstrated the magnetic shape anisotropy could be modulated. The CFO shell thickness allowed the tuning of magnetic easy axis and saturation magnetizations; whereas the PZT volume allowed the optimization of electric field induced strain of the composite. Enhanced converse ME coupling of 1.3 x 10-4 Oe-cm/mV was realized by 5 nm CFO shell on 30 nm of PZT core. In summary, the work has demonstrated nanostructuring of multiferroic composite is an effective pathway to engineer converse ME coupling through optimizations of magnetic shape anisotropy and interfacial strain transfer.

  19. Structural, multiferroic, dielectric and magnetoelectric properties of (1-x)Ba0.85Ca0.15Ti0.90Zr0.10O3-(x)CoFe2O4 lead-free composites

    NASA Astrophysics Data System (ADS)

    Negi, N. S.; Kumar, Rakesh; Sharma, Hakikat; Shah, J.; Kotnala, R. K.

    2018-06-01

    High performance lead-free multiferroic composites with strong magnetoelectric coupling effect are desired to replace lead-based ceramics in multifunctional device applications due to increasing environmental issues. We report crystal structure, ferroelectric, magnetic, dielectric and magnetoelectric properties of (1-x)Ba0.85Ca0.15Ti0.90Zr0.10O3-(x)CoFe2O4 (BCTZ-CFO) lead-free composites with x = 0.1, 0.3, 0.5, 0.7 and 0.9 synthesized by chemical solution method. BCTZ power was synthesized by sol-gel method while CFO was prepared by metallo-organic decomposition (MOD) method. The XRD results confirm successful formation of the BCTZ-CFO composites without presence of any impurity phase. At room temperature, the BCTZ-CFO composites show multiferroic behavior characterized by ferroelectric and ferromagnetic hysteresis curves. The composite having 10 wt% of CFO exhibited maximum polarization, remnant polarization and coercive field of Ps ∼ 5.1 μC/cm2, Pr ∼ 1.4 μC/cm2 and Ec ∼ 11.6 kV/cm respectively. The BCTZ-CFO composite with 90 wt% of CFO incorporation exhibits improved ferromagnetic properties with Ms ∼ 32 emu/g, Mr ∼ 11.7 emu/g and Hc ∼ 504 Oe. Mӧssbauer spectra analysis show two sets of six-line hyperfine patterns for BCTZ-CFO composites, indicating the presence of Fe3+ ions in both A and B sites. Increasing BCTZ content was found to decrease the hyperfine field strength at both sites and is consistent with the decreasing magnetic moment observed for the samples. The maximum dielectric constant value ε‧ ∼ 678 is obtained at 1 MHz for composite with 10 wt% of CFO phase. The results indicate that the BCTZ-CFO composites are potential lead-free room temperature multiferroic systems.

  20. 7 CFR 1468.4 - Establishing Conservation Farm Option (CFO) pilot project areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Establishing Conservation Farm Option (CFO) pilot...) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION FARM OPTION General Provisions § 1468.4 Establishing Conservation Farm Option (CFO) pilot project areas...

  1. The Large Public University. CFO Perspectives

    ERIC Educational Resources Information Center

    Jessell, Kenneth A.

    2013-01-01

    "CFO Perspectives" is a series of white papers that examines at role of the CFO within different institutional or operational settings. Each white paper, available free from the National Association of College and University Business Officers (NACUBO) and released periodically during 2012, NACUBO's 50th anniversary year, focuses on the…

  2. Structural, magnetic, and electrical properties of (1-x)Bi0.85La0.15FeO3-(x)CoFe2O4 multiferroic composites

    NASA Astrophysics Data System (ADS)

    Pandey, Rabichandra; Pradhan, Lagen Kumar; Kar, Manoranjan

    2018-04-01

    In this study, the tartaric acid modified sol-gel method was used to synthesize (1-x)Bi0.85La0.15FeO3-(x)CoFe2O4 (BLFO-CFO) composites where x = 0.00, 0.10, 0.20, 0.30, 0.40, and 0.50. The X-ray diffraction (XRD) patterns indicated the formation of composites with both BLFO and CFO crystal symmetry, i.e., perovskite and spinel structures, respectively. Rietveld refinement of the XRD patterns was performed for all of the samples in order to analyze the crystal phases and obtain the structural parameters. There were decreases in the lattice parameters of the perovskite phase as the CFO spinel phase increased in the composites, which may be explained by the strain at the interface of the BLFO and CFO phases. Electrical polarization and dielectric constant enhancements were observed in the BLFO-CFO composites compared with BLFO. The saturation magnetization increased as the CFO phase increased in the composites. The theoretical saturation magnetization (calculated using Vegard's law) was less than the experimentally observed value, possibly due to the spin interaction at the interface of BLFO and CFO.

  3. How Future Economic Trends Will Affect the 21st Century CFO.

    ERIC Educational Resources Information Center

    Malone, John

    1998-01-01

    The CFO (chief financial officer) performs the budgeting, accounting, and financial functions for a local education agency (LEA). The CFO of 1998 works in a very different environment from 25 years ago, due to changes in school funding sources (from local to state systems), information technology, and school district organization and…

  4. 75 FR 79787 - Unified Agenda of Federal Regulatory and Deregulatory Actions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-20

    ... pursuant to the requirements of the Chief Financial Officers Act of 1990 (CFO Act), 31 U.S.C. 901-03. The CFO Act requires each agency's chief financial officer (CFO) to ``review, on a biennial basis, the... abandoned and help prevent future marine pollution. This rulemaking supports the Coast Guard's broad role...

  5. A comparative study of a (0-3) connectivity type composite and core-shell structure of CoFe2O4 - BaTiO3 based on microstructure and magnetic property

    NASA Astrophysics Data System (ADS)

    Das, Avisek; Gorige, Venkataiah

    2018-04-01

    In this work CoFe2O4 (CFO)-BaTiO3 (BTO) composite and core-shell CFO-BTO have been prepared to investigate the effect of microstructure on the magnetic properties. Detailed microstructure analysis has been carried out using X-ray diffraction, field emission scanning electron microscope and transmission electron microscope. Although uniform distribution of CFO is found in BTO matrix for the composite sample, magnetization and coercivity values are more enhanced in core-shell CFO-BTO.

  6. 75 FR 21805 - Unified Agenda of Federal Regulatory and Deregulatory Actions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-26

    ... FR Cite NPRM 08/00/10 NPRM Comment Period End 10/00/10 Regulatory Flexibility Analysis Required: Yes... pursuant to the requirements of the Chief Financial Officers Act of 1990 (CFO Act), 31 U.S.C. 901-03. The CFO Act requires each agency's chief financial officer (CFO) to ``review, on a biennial basis, the...

  7. Exchange coupling and microwave absorption in core/shell-structured hard/soft ferrite-based CoFe2O4/NiFe2O4 nanocapsules

    NASA Astrophysics Data System (ADS)

    Feng, Chao; Liu, Xianguo; Or, Siu Wing; Ho, S. L.

    2017-05-01

    Core/shell-structured, hard/soft spinel-ferrite-based CoFe2O4/NiFe2O4 (CFO/NFO) nanocapsules with an average diameter of 17 nm are synthesized by a facile two-step hydrothermal process using CFO cores of ˜15 nm diameter as the hard magnetic phase and NFO shells of ˜1 nm thickness as the soft magnetic phase. The single-phase-like hysteresis loop with a high remnant-to-saturation magnetization ratio of 0.7, together with a small grain size of ˜16 nm, confirms the existence of exchange-coupling interaction between the CFO cores and the NFO shells. The effect of hard/soft exchange coupling on the microwave absorption properties is studied. Comparing to CFO and NFO nanoparticles, the finite-size NFO shells and the core/shell structure enable a significant reduction in electric resistivity and an enhancement in dipole and interfacial polarizations in the CFO/NFO nanocapsules, resulting in an obvious increase in dielectric permittivity and loss in the whole S-Ku bands of microwaves of 2-18 GHz, respectively. The exchange-coupling interaction empowers a more favorable response of magnetic moment to microwaves, leading to enhanced exchange resonances in magnetic permeability and loss above 10 GHz. As a result, strong absorption, as characterized by a large reflection loss (RL) of -20.1 dB at 9.7 GHz for an absorber thickness of 4.5 mm as well as a broad effective absorption bandwidth (for RL<-10 dB) of 8.4 GHz (7.8-16.2 GHz) at an absorber thickness range of 3.0-4.5 mm, is obtained.

  8. Corn fiber oil lowers plasma cholesterol levels and increases cholesterol excretion greater than corn oil and similar to diets containing soy sterols and soy stanols in hamsters.

    PubMed

    Wilson, T A; DeSimone, A P; Romano, C A; Nicolosi, R J

    2000-09-01

    The aims of this study were to compare the cholesterol-lowering properties of corn fiber oil (CFO) to corn oil (CO), whether the addition of soy stanols or soy sterols to CO at similar levels in CFO would increase CO's cholesterol-lowering properties, and the mechanism(s) of action of these dietary ingredients. Fifty male Golden Syrian hamsters were divided into 5 groups of 10 hamsters each, based on similar plasma total cholesterol (TC) levels. The first group of hamsters was fed a chow-based hypercholesterolemic diet containing either 5% coconut oil + 0.24% cholesterol (coconut oil), 5% CO, 5% CFO, 5% CO + 0.6% soy sterols (sterol), or 5% CO + 0.6% soy stanols (stanol) in place of the coconut oil for 4 weeks. The stanol diet significantly inhibited the elevation of plasma TC compared to all other dietary treatments. Also, the CFO and sterol diets significantly inhibited the elevation of plasma TC compared to the CO and coconut oil diets. The CFO, sterol, and stanol diets significantly inhibited the elevation of plasma non-high density lipoprotein cholesterol compared to the CO and coconut oil diets. The stanol diet significantly inhibited the elevation of plasma high density lipoprotein cholesterol (HDL-C) compared to all other dietary treatments. The sterol diet significantly inhibited the elevation of plasma HDL-C compared to the CO and coconut oil diets, whereas the CFO diet significantly inhibited the elevation of plasma HDL-C compared to the coconut oil diet only. No differences were observed between the CFO and CO for plasma HDL-C. There were no differences observed between groups for plasma triglycerides. The CO and CFO diets had significantly less hepatic TC compared to the coconut oil, sterol, and stanol diets. The CO and CFO diets had significantly less hepatic free cholesterol compared to the sterol and stanol diets but not compared to the coconut oil diet; whereas the coconut oil and sterol diets had significantly less hepatic free cholesterol compared to the stanol diet. The CFO, sterol, and stanol diets excreted significantly more fecal cholesterol compared to the coconut oil and CO diets. In summary, CFO reduces plasma and hepatic cholesterol concentrations and increases fecal cholesterol excretion greater than CO through some other mechanism(s) in addition to increase dietary sterols and stanols-possibly oryzanols.

  9. Discounting medical malpractice claim reserves for self-insured hospitals.

    PubMed

    Frese, Richard; Kitchen, Patrick

    2011-01-01

    The hospital CFO often works with the hospital's actuary and external auditor to calculate the reserves recorded in financial statements. Hospital management, usually the CFO, needs to decide the discount rate that is most appropriate. A formal policy addressing the rationale for discounting and the rationale for selecting the discount rate can be helpful to the CFO, actuary, and external auditor.

  10. Senate Confirmation Hearing CFO

    NASA Image and Video Library

    2009-10-14

    Dr. Elizabeth M. Robinson, nominee for Chief Financial Officer for NASA, center, answers questions during her confirmation hearing in front of the Senate Committee on Commerce, Science and Transportation, Thursday, Oct. 15, 2009, on Capitol Hill in Washington. Robinson is flanked by Dr. Patrick Gallagher, nominee to be Assistant Secretary of the Transportation Security Administration at the U.S. Department of Commerce, far left, and Paul K. Martin, nominee to be Inspector General at NASA. Photo Credit: (NASA/Paul E. Alers)

  11. Room temperature magnetic ordering, enhanced magnetization and exchange bias of GdMnO3 nanoparticles in (GdMnO3)0.70(CoFe2O4)0.30

    NASA Astrophysics Data System (ADS)

    Mitra, A.; Mahapatra, A. S.; Mallick, A.; Chakrabarti, P. K.

    2017-02-01

    Nanoparticles of GdMnO3 (GMO) are prepared by sol-gel method. To enhance the magnetic property and also to obtain the magnetic ordering at room temperature (RT), nanoparticles of GMO are incorporated in the matrix of CoFe2O4 (CFO). Desired crystallographic phases of CFO, GMO and GMO-CFO are confirmed by analyzing X-ray diffractrograms (XRD) using Rietveld method. The average size of nanoparticles and their distribution, crystallographic phase, nanocrystallinity etc. are studied by high-resolution transmission electron microscope (HRTEM). Magnetic hysteresis loops (M-H) of GMO-CFO under zero field cooled (ZFC) and field cooled (FC) conditions are observed at different temperatures down to 5 K. Magnetization vs. temperature (M-T) under ZFC and FC conditions are also recorded. Interestingly, exchange bias (EB) is found at low temperature which suggests the encapsulation of the ferromagnetic (FM) nanoparticles of GMO by the ferrimagnetic nanoparticles of CFO below 100 K. Enhanced magnetization, EB effect and RT magnetic ordering of GMO-CFO would be interesting for both theoretical and experimental investigations.

  12. Synthesis and Characterization of CuFe 2O 4 Nano/Submicron Wire–Carbon Nanotube Composites as Binder-free Anodes for Li-Ion Batteries

    DOE PAGES

    Wang, Lei; Bock, David C.; Li, Jing; ...

    2018-02-20

    Here, a series of one-dimensional CuFe 2O 4 nano/sub-micron wires possessing different diameters, crystal phases, and crystal sizes have been successfully generated using a facile template-assisted co precipitation reaction at room temperature, followed by a short post-annealing process. The diameter and the crystal structure of the resulting CuFe 2O4 (CFO) wires were judiciously tuned by varying the pore size of the template and the post-annealing temperature, respectively. Carbon nanotubes (CNTs) were incorporated to generate CFO-CNT binder-free anodes, and multiple characterization techniques were employed with the goal of delineating the relationships between electrochemical behavior and the properties of both the CFOmore » wires (crystal phase, wire diameter, crystal size) and the electrode architecture (binder-free vs. conventionally prepared approaches). The study reveals several notable findings. First, the crystal phase (cubic or tetragonal) did not influence the electrochemical behavior in this CFO system. Second, regarding crystallite size and wire diameter, CFO wires with larger crystallite sizes exhibit improved cycling stability, while wires possessing smaller diameters exhibiting higher capacities. Finally, the electrochemical behavior is strongly influenced by the electrode architecture, with CFO-CNT binder-free electrodes demonstrating significantly higher capacities and cycling stability compared to conventionally prepared coatings. The mechanism(s) associated with the high capacities under low current density but limited electrochemical reversibility of CFO electrodes under high current density were probed via x-ray absorption spectroscopy (XAS) mapping with sub-micron spatial resolution for the first time. Results suggest that the capacity of the binder-free electrodes under high rate is limited by the irreversible formation of Cu 0, as well as limited reduction of Fe 3+, to Fe 2+ not Fe 0. The results (1) shed fundamental insight into the reversibility of CuFe 2O 4 materials cycled at high current density and (2) demonstrate that a synergistic effort to control both active material morphology and electrode architecture is an effective strategy for optimizing electrochemical behavior.« less

  13. Synthesis and Characterization of CuFe 2O 4 Nano/Submicron Wire–Carbon Nanotube Composites as Binder-free Anodes for Li-Ion Batteries

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wang, Lei; Bock, David C.; Li, Jing

    Here, a series of one-dimensional CuFe 2O 4 nano/sub-micron wires possessing different diameters, crystal phases, and crystal sizes have been successfully generated using a facile template-assisted co precipitation reaction at room temperature, followed by a short post-annealing process. The diameter and the crystal structure of the resulting CuFe 2O4 (CFO) wires were judiciously tuned by varying the pore size of the template and the post-annealing temperature, respectively. Carbon nanotubes (CNTs) were incorporated to generate CFO-CNT binder-free anodes, and multiple characterization techniques were employed with the goal of delineating the relationships between electrochemical behavior and the properties of both the CFOmore » wires (crystal phase, wire diameter, crystal size) and the electrode architecture (binder-free vs. conventionally prepared approaches). The study reveals several notable findings. First, the crystal phase (cubic or tetragonal) did not influence the electrochemical behavior in this CFO system. Second, regarding crystallite size and wire diameter, CFO wires with larger crystallite sizes exhibit improved cycling stability, while wires possessing smaller diameters exhibiting higher capacities. Finally, the electrochemical behavior is strongly influenced by the electrode architecture, with CFO-CNT binder-free electrodes demonstrating significantly higher capacities and cycling stability compared to conventionally prepared coatings. The mechanism(s) associated with the high capacities under low current density but limited electrochemical reversibility of CFO electrodes under high current density were probed via x-ray absorption spectroscopy (XAS) mapping with sub-micron spatial resolution for the first time. Results suggest that the capacity of the binder-free electrodes under high rate is limited by the irreversible formation of Cu 0, as well as limited reduction of Fe 3+, to Fe 2+ not Fe 0. The results (1) shed fundamental insight into the reversibility of CuFe 2O 4 materials cycled at high current density and (2) demonstrate that a synergistic effort to control both active material morphology and electrode architecture is an effective strategy for optimizing electrochemical behavior.« less

  14. Sonocatalytic performance of magnetically separable CuS/CoFe2O4 nanohybrid for efficient degradation of organic dyes.

    PubMed

    Siadatnasab, Firouzeh; Farhadi, Saeed; Khataee, Alireza

    2018-06-01

    The sonocatalytic activity of the magnetic CuS/CoFe 2 O 4 (CuS/CFO) nanohybrid was studied through the H 2 O 2 -assisted system for degradation of water soluble organic pollutants such as methylene blue (MB), rhodamine B (RhB) and methyl orange (MO). The CuS/CFO nanohybrid was fabricated at 200 °C by hydrothermal method. X-ray diffraction (XRD) and field emission scanning electron microscopy (FE-SEM) equipped with energy dispersive X-ray microanalysis (EDX), Fourier-transform infrared spectroscopy (FT-IR), UV-Vis spectroscopy, magnetic measurements, and Brunauere-Emmette-Teller (BET) were employed for the characterizing the structure and morphology of the so-synthesized nanohybrid. Compared with sonolysis/H 2 O 2 , the higher degradation of MB (25 mg/L) was achieved via sonocatalytic process. The degradation efficiency of sonolysis/H 2 O 2 , sonocatalysis using CuS/H 2 O 2 , CFO/H 2 O 2 and CuS/CFO/H 2 O 2 systems was 6%, 62%, 23% and 100% within reaction time of 30 min for MB, respectively. The integration of H 2 O 2 and catalyst dosage intensified the sonocatalytic degradation of MB. On the other hand, adding a hydroxyl radical (OH) scavenger (tert-butyl alcohol) and a hole scavenger (disodium ethylenediaminetetraacetate) decreased the degradation efficiency from 100% to 35% and 72% within 30 min, indicating the OH radicals as prominent oxidizing agent of this process. Furthermore, the magnetic property of the sample helped for easier separation of the nanohybrid, made it recyclable with a negligible decline in the performance even after four consecutive runs. Copyright © 2018 Elsevier B.V. All rights reserved.

  15. Observation of longitudinal spin-Seebeck effect in cobalt-ferrite epitaxial thin films

    NASA Astrophysics Data System (ADS)

    Niizeki, Tomohiko; Kikkawa, Takashi; Uchida, Ken-ichi; Oka, Mineto; Suzuki, Kazuya Z.; Yanagihara, Hideto; Kita, Eiji; Saitoh, Eiji

    2015-05-01

    The longitudinal spin-Seebeck effect (LSSE) has been investigated in cobalt ferrite (CFO), an exceptionally hard magnetic spinel ferrite. A bilayer of a polycrystalline Pt and an epitaxially-strained CFO(110) exhibiting an in-plane uniaxial anisotropy was prepared by reactive rf sputtering technique. Thermally generated spin voltage in the CFO layer was measured via the inverse spin-Hall effect in the Pt layer. External-magnetic-field (H) dependence of the LSSE voltage (VLSSE) in the Pt/CFO(110) sample with H ∥ [001] was found to exhibit a hysteresis loop with a high squareness ratio and high coercivity, while that with H ∥ [ 1 1 ¯ 0 ] shows a nearly closed loop, reflecting the different anisotropies induced by the epitaxial strain. The magnitude of VLSSE has a linear relationship with the temperature difference (ΔT), giving the relatively large VLSSE /ΔT of about 3 μV/K for CFO(110) which was kept even at zero external field.

  16. Multimedia transmission in MC-CDMA using adaptive subcarrier power allocation and CFO compensation

    NASA Astrophysics Data System (ADS)

    Chitra, S.; Kumaratharan, N.

    2018-02-01

    Multicarrier code division multiple access (MC-CDMA) system is one of the most effective techniques in fourth-generation (4G) wireless technology, due to its high data rate, high spectral efficiency and resistance to multipath fading. However, MC-CDMA systems are greatly deteriorated by carrier frequency offset (CFO) which is due to Doppler shift and oscillator instabilities. It leads to loss of orthogonality among the subcarriers and causes intercarrier interference (ICI). Water filling algorithm (WFA) is an efficient resource allocation algorithm to solve the power utilisation problems among the subcarriers in time-dispersive channels. The conventional WFA fails to consider the effect of CFO. To perform subcarrier power allocation with reduced CFO and to improve the capacity of MC-CDMA system, residual CFO compensated adaptive subcarrier power allocation algorithm is proposed in this paper. The proposed technique allocates power only to subcarriers with high channel to noise power ratio. The performance of the proposed method is evaluated using random binary data and image as source inputs. Simulation results depict that the bit error rate performance and ICI reduction capability of the proposed modified WFA offered superior performance in both power allocation and image compression for high-quality multimedia transmission in the presence of CFO and imperfect channel state information conditions.

  17. Magnetic anomalies in self-assembled SrRuO3 -CoFe2O4 nanostructures studied by Raman spectroscopy

    NASA Astrophysics Data System (ADS)

    Chen, Yi-Chun; Huang, Yen-Chin; Chien, Chia-Hsien; Liu, Heng-Jui; Chu, Ying-Hao

    2015-03-01

    Self-assembled nanostructures with high interface-to-volume ratio usually possess interesting physical properties through the coupling between neighboring materials. In complex-oxide nanocomposites, the interplay of spin, charge, orbital, and lattice degrees of freedom especially provides various functionalities. Our recent study had shown photo-induced magnetization switching in a self-assembled system, CoFe2O4 (CFO)- SrRuO3(SRO), where the CFO nanopillars were embedded in the SRO matrix. Moreover, this system also has significant magnetoresistance behaviors. In this study, we used Raman spectroscopy to investigate the magnetic coupling mechanisms in CFO-SRO nanostructures. Compared to the pure CFO films, the CFO nano-pillars under out-of-plane compressive strain show a slightly increase of A1g(Co)/A1g(Fe) intensity ratio, which corresponds to a migration of Co ions from O-site (oxygen octahedron) to T-site (oxygen tetrahedron). This behavior can be further tuned by external stimulus, such as magnetic fields and temperatures. A strong increase of A1g(Co)/A1g(Fe) ratio together with a discontinuous A1g frequency shift occur at the SRO magnetic transition temperature. This result indicated that the spin-orbital interaction in CFO can be modulated by the SRO magnetic orderings.

  18. Collagen Fiber Orientation in Primate Long Bones.

    PubMed

    Warshaw, Johanna; Bromage, Timothy G; Terranova, Carl J; Enlow, Donald H

    2017-07-01

    Studies of variation in orientation of collagen fibers within bone have lead to the proposition that these are preferentially aligned to accommodate different kinds of load, with tension best resisted by fibers aligned longitudinally relative to the load, and compression best resisted by transversely aligned fibers. However, previous studies have often neglected to consider the effect of developmental processes, including constraints on collagen fiber orientation (CFO), particularly in primary bone. Here we use circularly polarized light microscopy to examine patterns of CFO in cross-sections from the midshaft femur, humerus, tibia, radius, and ulna in a range of living primate taxa with varied body sizes, phylogenetic relationships and positional behaviors. We find that a preponderance of longitudinally oriented collagen is characteristic of both periosteal primary and intracortically remodeled bone. Where variation does occur among groups, it is not simply understood via interpretations of mechanical loads, although prioritized adaptations to tension and/or shear are considered. While there is some suggestion that CFO may correlate with body size, this relationship is neither consistent nor easily explicable through consideration of size-related changes in mechanical adaptation. The results of our study indicate that there is no clear relationship between CFO and phylogenetic status. One of the principle factors accounting for the range of variation that does exist is primary tissue type, where slower depositing bone is more likely to comprise a larger proportion of oblique to transverse collagen fibers. Anat Rec, 300:1189-1207, 2017. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  19. Annealing pressure induced ions transfer in Cobalt-Ferrite thin films on amorphous SiO2/Si substrates

    NASA Astrophysics Data System (ADS)

    Huang, Shun-Yu; Chong, Cheong-Wei; Chen, Pin-Hui; Li, Hong-Lin; Li, Min-Kai; Huang, J. C. Andrew

    2017-11-01

    In this work, Cobalt-Ferrite (CFO) films were grown on silicon substrates with 300 nm amorphous silicon dioxide by Pulsed Laser Deposition (PLD) with different annealing conditions. The results of structural analysis prove that the CFO films have high crystalline quality with (1 1 1) preferred orientation. The Raman spectra and X-ray absorption spectra (XAS) indicate that the Co ions can transfer from tetrahedral sites to octahedral sites with increasing the annealing pressure. The site exchange of Co and Fe ions leads to the change of saturation magnetization in the CFO films. Our experiments provide not only a way to control the magnetism of CFO films, but also a suitable magnetic layer to develop silicon and semiconductor based spintronic devices.

  20. Optimization of locations of diffusion spots in indoor optical wireless local area networks

    NASA Astrophysics Data System (ADS)

    Eltokhey, Mahmoud W.; Mahmoud, K. R.; Ghassemlooy, Zabih; Obayya, Salah S. A.

    2018-03-01

    In this paper, we present a novel optimization of the locations of the diffusion spots in indoor optical wireless local area networks, based on the central force optimization (CFO) scheme. The users' performance uniformity is addressed by using the CFO algorithm, and adopting different objective function's configurations, while considering maximization and minimization of the signal to noise ratio and the delay spread, respectively. We also investigate the effect of varying the objective function's weights on the system and the users' performance as part of the adaptation process. The results show that the proposed objective function configuration-based optimization procedure offers an improvement of 65% in the standard deviation of individual receivers' performance.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chitralekha, C. S.; Rasi, Mohammed; Nair, Swapna S., E-mail: swapna.s.nair@gmail.com

    A modified sol-gel method was introduced by employing a cost effective novel template to synthesize coaxial one dimensional (1-D) composite nanostructures based on CoFe{sub 2}O{sub 4} (CFO) - K{sub 0.5}Na{sub 0.5}NbO{sub 3} (KNN) and magnetic nanostructures based on CoFe{sub 2}O{sub 4} (CFO). The studies with scanning electron microscopy (SEM) and atomic force microscopy (AFM) revealed that the composite material is characterized by the 1-D tubular structure. The absorption edge is blue shifted for both KNN and CFO nanotubes due to the lattice strain effect.

  2. Flexible Heteroepitaxy of CoFe 2 O 4 /Muscovite Bimorph with Large Magnetostriction

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liu, Heng-Jui; Wang, Chih-Kuo; Su, Dong

    Van der Waals epitaxy was used to fabricate a bimorph composed of ferrimagnetic cobalt ferrite (CoFe 2O 4, CFO) and flexible muscovite. The combination of X-ray diffraction and transmission electron microscopy was conducted to reveal the heteroepitaxy of the CFO/muscovite system. The robust magnetic behaviors against mechanical bending were characterized by hysteresis measurements and magnetic force microscopy, which maintain a saturation magnetization (Ms) of ~120–150 emu/cm 3 under different bending states. The large magnetostrictive response of the CFO film was then determined by digital holographic microscopy, where the difference of magnetostrction coefficient (Δλ) is -104 ppm. We attribute the superiormore » performance of this bimorph to the nature of weak interaction between film and substrate. Such a flexible CFO/muscovite bimorph provides a new platform to develop next-generation flexible magnetic devices.« less

  3. Flexible Heteroepitaxy of CoFe 2 O 4 /Muscovite Bimorph with Large Magnetostriction

    DOE PAGES

    Liu, Heng-Jui; Wang, Chih-Kuo; Su, Dong; ...

    2017-02-03

    Van der Waals epitaxy was used to fabricate a bimorph composed of ferrimagnetic cobalt ferrite (CoFe 2O 4, CFO) and flexible muscovite. The combination of X-ray diffraction and transmission electron microscopy was conducted to reveal the heteroepitaxy of the CFO/muscovite system. The robust magnetic behaviors against mechanical bending were characterized by hysteresis measurements and magnetic force microscopy, which maintain a saturation magnetization (Ms) of ~120–150 emu/cm 3 under different bending states. The large magnetostrictive response of the CFO film was then determined by digital holographic microscopy, where the difference of magnetostrction coefficient (Δλ) is -104 ppm. We attribute the superiormore » performance of this bimorph to the nature of weak interaction between film and substrate. Such a flexible CFO/muscovite bimorph provides a new platform to develop next-generation flexible magnetic devices.« less

  4. Effects of ordered mesoporous structure and La-doping on the microwave absorbing properties of CoFe2O4

    NASA Astrophysics Data System (ADS)

    Shang, Tao; Lu, Qingshan; Chao, Luomeng; Qin, Yanli; Yun, Yuehou; Yun, Guohong

    2018-03-01

    Low-density ordered mesoporous CoFe2O4 (Osbnd CFO) and CoLa0.12Fe1.88O4 (Osbnd CLFO) are prepared by nanocasting method using mesoporous silica SBA-15 as a hard-template. The crystal structure, surface chemical state, magnetic properties and electromagnetic parameters are characterized by X-ray diffraction, transmission electron microscopy, N2 adsorption-desorption measurement, X-ray photoelectron spectroscopy, physical property measurement system and vector network analyzer. The results show that all the samples formed a single phase with cubic spinel structure. Meanwhile Osbnd CFO and Osbnd CLFO possess a highly ordered mesostructure. Comparing with particle CoFe2O4 (P-CFO), Osbnd CFO with high specific surface area exhibits lower magnetic saturation (Ms), higher imaginary part of complex permittivity (ε‧‧) and imaginary part of the complex permeability (μ‧‧). The minimum reflection loss (RL) of Osbnd CFO reaches -27.36 dB with a matching thickness of 3.0 mm. The enhancement of the microwave absorbing performances of Osbnd CFO can be mainly attributed to the good impedance matching, high electromagnetic wave attenuation and multiple reflections of electromagnetic wave originated from the ordered mesoporous structure. The Ms of Osbnd CLFO decreases after La3+ doping, while the specific surface area, coercivity value, ε‧‧ and μ‧‧ of Osbnd CLFO increase. The minimum RL of Osbnd CLFO reaches -46.47 dB with a thickness of 3.0 mm, and the effective absorption frequency bandwidth reaches 4.9 GHz.

  5. The Chief Financial Officer and Government Relations.

    ERIC Educational Resources Information Center

    Lasher, William F.; Grigsby, Gwen; Sullivan, Charlotte

    1999-01-01

    Examines the work of the college or university chief financial officer (CFO) in government relations, focusing on the CFO's responsibilities, methods of working with state legislatures, pitfalls in legislative relations, and special problems faced by institutions in capital cities. (Author/MSE)

  6. A CFO's Perspective on the Quality Revolution.

    ERIC Educational Resources Information Center

    Norton, Alan J.

    1994-01-01

    The chief financial officer (CFO) of St. John Fisher College (New York) analyzes the costs associated with the implementation of quality management at St. John Fisher and outlines one way to determine whether the investment is yielding an acceptable internal rate of return. (DB)

  7. Joint Symbol Timing and CFO Estimation for OFDM/OQAM Systems in Multipath Channels

    NASA Astrophysics Data System (ADS)

    Fusco, Tilde; Petrella, Angelo; Tanda, Mario

    2009-12-01

    The problem of data-aided synchronization for orthogonal frequency division multiplexing (OFDM) systems based on offset quadrature amplitude modulation (OQAM) in multipath channels is considered. In particular, the joint maximum-likelihood (ML) estimator for carrier-frequency offset (CFO), amplitudes, phases, and delays, exploiting a short known preamble, is derived. The ML estimators for phases and amplitudes are in closed form. Moreover, under the assumption that the CFO is sufficiently small, a closed form approximate ML (AML) CFO estimator is obtained. By exploiting the obtained closed form solutions a cost function whose peaks provide an estimate of the delays is derived. In particular, the symbol timing (i.e., the delay of the first multipath component) is obtained by considering the smallest estimated delay. The performance of the proposed joint AML estimator is assessed via computer simulations and compared with that achieved by the joint AML estimator designed for AWGN channel and that achieved by a previously derived joint estimator for OFDM systems.

  8. 76 FR 44330 - Ocean Transportation Intermediary License Applicants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-25

    ... Logistics (NVO & OFF), 249 W. Fernfield Drive, Monterey Park, CA 91754, Officer: Tony Chen, President/VP..., Cypress, CA 90630, Officers: Cindy J. Lee, Secretary/CFO, (Qualifying Individual), Kathlyn Park, CEO.... Nguyen, Secretary/CFO, Application Type: New NVO & OFF License. Atlas Logistics LLC (NVO & OFF), 2801 NW...

  9. Switchable 3-0 magnetoelectric nanocomposite thin film with high coupling.

    PubMed

    McDannald, Austin; Ye, Linghan; Cantoni, Claudia; Gollapudi, Sreenivasulu; Srinivasan, Gopalan; Huey, Bryan D; Jain, Menka

    2017-03-02

    A mixed precursor solution method was used to deposit 3-0 nanocomposite thin films of PbZr 0.52 Ti 0.48 O 3 (PZT) and CoFe 2 O 4 (CFO). The piezoelectric behavior of PZT and magnetostrictive behavior of CFO allow for magnetoelectric (ME) coupling through strain transfer between the respective phases. High ME coupling is desired for many applications including memory devices, magnetic field sensors, and energy harvesters. The spontaneous phase separation in the 3-0 nanocomposite film was observed, with 25 nm CFO particle or nanophases distributed in discrete layers through the thickness of the PZT matrix. Magnetic-force microscopy images of the nanocomposite thin film under opposite magnetic poling conditions revealed in-plane pancake-like regions of higher concentration of the CFO nanoparticles. The constraints on the size and distribution of the CFO nanoparticles created a unique distribution in a PZT matrix and achieved values of ME coupling of 3.07 V cm -1 Oe -1 at a DC bias of 250 Oe and 1 kHz, increasing up to 25.0 V cm -1 Oe -1 at 90 kHz. Piezo-force microscopy was used to investigate the ferroelectric domain structure before and after opposite magnetic poling directions. It was found that in this nanocomposite, the polarization of the ferroelectric domains switched direction as a result of switching the direction of the magnetization by magnetic fields.

  10. Comparison of structural and electric properties of PbZr0.2Ti0.8O3 and CoFe2O4/PbZr0.2Ti0.8O3 films on (100)LaAlO3

    NASA Astrophysics Data System (ADS)

    Zhang, X. D.; Dho, Joonghoe; Park, Sungmin; Kwon, Hyosang; Hwang, Jihwan; Park, Gwangseo; Kwon, Daeyoung; Kim, Bongju; Jin, Yeryeong; Kim, Bog. G.; Karpinsky, D.; Kholkin, A. L.

    2011-09-01

    In this work, we investigated structural, electrical, and magnetic properties of ferroelectric PbZr0.2Ti0.8O3 (PZT) and ferrimagnetic/ferroelectric [CoFe2O4(CFO)/PZT] bilayers grown on (100)LaAlO3 (LAO) substrates supplied with bottom 50 nm thick LaNiO3 electrodes. Interestingly, structural and electrical properties of the PZT layer exhibited remarkable changes after the top-layer CFO deposition. X-ray diffraction data suggested that both the c- and a-domains exist in the PZT layer and the tetragonality of the PZT decreases upon the top-layer deposition. A variation in the electrical properties of the PZT layer upon the CFO deposition was investigated by polarization versus voltage (P-V), capacitance versus voltage (C-V), and capacitance versus frequency (C-f) measurements. The CFO deposition induced a slight decrease of the remnant polarization and more symmetric behavior of P-V loops as well as led to the improvement of fatigue behavior. The tentative origin of enhanced fatigue endurance is discussed based on the measurement results. These results were corroborated by local piezoelectric measurements. Ferrimagnetic property of the CFO/PZT bilayer was confirmed by magnetic measurement at room temperature.

  11. Investigation on magnetoelectric behavior of (80Bi0.5Na0.5TiO3-20Bi0.5K0.5TiO3)-CoFe2O4 particulate composites

    NASA Astrophysics Data System (ADS)

    Liu, Sheng; Yan, Shuoqing; Yao, Lingling; He, Jun; He, Longhui; Hu, Zhaowen; Huang, Shengxiang; Deng, Lianwen

    2017-12-01

    Particulate magnetoelectric (ME) ceramics constituted by (1-x)(80Bi0.5Na0.5TiO3-20Bi0.5K0.5TiO3)-xCoFe2O4 [(1-x)BNKT-xCFO] (x = 0, 0.1, 0.2, 0.3, 0.4 and 1.0) were synthesized by an powder-in-sol precursor hybrid processing method and their structure, magnetic, ferroelectric, magnetodielectric (MD) and ME properties have been investigated. Results showed that the ceramics consisted of only two chemically separated phases and had homogeneous microstructure. The introduction of CFO into BNKT matrix led to the weakening of ferroelectric and dielectric properties whereas the strengthening magnetic and MD properties. The observation of the MD effect revealed the evidence of the strain-induced ME coupling and the MD value is well scaled with M2. A maximum value of ME output of 25.07 mV/cm·Oe was achieved for the 0.7BNKT-0.3CFO composite. The improved ME response together with the linear MD effect makes the ceramics promise for use in magnetic field controllable devices or magneto-electric transducers.

  12. 49 CFR 1.33 - Assistant Secretary for Budget and Programs and Chief Financial Officer.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Programs and CFO, in consultation with the Chief Information Officer, may designate any information technology system as a financial management system under the CFO's policy and oversight area of... oversight and policy guidance for all budget, financial management, program performance, and internal...

  13. 49 CFR 1.33 - Assistant Secretary for Budget and Programs and Chief Financial Officer.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Programs and CFO, in consultation with the Chief Information Officer, may designate any information technology system as a financial management system under the CFO's policy and oversight area of... oversight and policy guidance for all budget, financial management, program performance, and internal...

  14. 49 CFR 1.33 - Assistant Secretary for Budget and Programs and Chief Financial Officer.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Programs and CFO, in consultation with the Chief Information Officer, may designate any information technology system as a financial management system under the CFO's policy and oversight area of... oversight and policy guidance for all budget, financial management, program performance, and internal...

  15. What You Need To Know About Enrollment Management.

    ERIC Educational Resources Information Center

    Lapovsky, Lucie

    1999-01-01

    Provides basic information that a college or university chief financial officer (CFO) must know about enrollment management in order to understand how to work effectively with admissions and financial aid professionals to maximize tuition revenue and enroll the optimal class. Specific suggestions for CFO involvement are outlined. (Author/MSE)

  16. The New Education CFO: From Scorekeeper to Strategic Leader

    ERIC Educational Resources Information Center

    Hovey, Don; Boser, Ulrich

    2014-01-01

    Traditionally, district and corporate leaders regarded chief financial officers, or CFOs, as chief accountants. They were the individuals tasked with ensuring financial compliance, settling the books, creating reports, and cutting costs. The CFO was inherently risk averse and internally focused; he or she was there to backstop the ambitious plans…

  17. 7 CFR 1468.5 - General provisions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... with part 1412 of this chapter, on the farm enrolling in CFO and who are eligible for either CRP (7 CFR... payment under CRP, EQIP, or cost-share agreements under WRP are eligible for CFO payment. The provisions... those specified for the eligible conservation practices under CRP, EQIP, or cost-share agreements under...

  18. Switching of magnetic easy-axis using crystal orientation for large perpendicular coercivity in CoFe2O4 thin film

    PubMed Central

    Shirsath, Sagar E.; Liu, Xiaoxi; Yasukawa, Yukiko; Li, Sean; Morisako, Akimitsu

    2016-01-01

    Perpendicular magnetization and precise control over the magnetic easy axis in magnetic thin film is necessary for a variety of applications, particularly in magnetic recording media. A strong (111) orientation is successfully achieved in the CoFe2O4 (CFO) thin film at relatively low substrate temperature of 100 °C, whereas the (311)-preferred randomly oriented CFO is prepared at room temperature by the DC magnetron sputtering technique. The oxygen-deficient porous CFO film after post-annealing gives rise to compressive strain perpendicular to the film surface, which induces large perpendicular coercivity. We observe the coercivity of 11.3 kOe in the 40-nm CFO thin film, which is the highest perpendicular coercivity ever achieved on an amorphous SiO2/Si substrate. The present approach can guide the systematic tuning of the magnetic easy axis and coercivity in the desired direction with respect to crystal orientation in the nanoscale regime. Importantly, this can be achieved on virtually any type of substrate. PMID:27435010

  19. Research Update: Facile synthesis of CoFe2O4 nano-hollow spheres for efficient bilirubin adsorption

    NASA Astrophysics Data System (ADS)

    Rakshit, Rupali; Pal, Monalisa; Chaudhuri, Arka; Mandal, Madhuri; Mandal, Kalyan

    2015-11-01

    Herein, we report an unprecedented bilirubin (BR) adsorption efficiency of CoFe2O4 (CFO) nanostructures in contrast to the commercially available activated carbon and resin which are generally used for haemoperfusion and haemodialysis. We have synthesized CFO nanoparticles of diameter 100 nm and a series of nano-hollow spheres of diameter 100, 160, 250, and 350 nm using a simple template free solvothermal technique through proper variation of reaction time and capping agent, oleylamine (OLA), respectively, and carried out SiO2 coating by employing Stöber method. The comparative BR adsorption study of CFO and SiO2 coated CFO nanostructures indicates that apart from porosity and hollow configuration of nanostructures, the electrostatic affinity between anionic carboxyl group of BR and cationic amine group of OLA plays a significant role in adsorbing BR. Finally, we demonstrate that the BR adsorption capacity of the nanostructures can be tailored by varying the morphology as well as size of the nanostructures. We believe that our developed magnetic nanostructures could be considered as a potential material towards therapeutic applications against hyperbilirubinemia.

  20. The Leadership Orientations of Public College and University Chief Financial Officers: A Frame Analysis

    ERIC Educational Resources Information Center

    Hannah, Charles Russell

    2013-01-01

    The role of the chief financial officer (CFO) is critical to the effective leadership of U.S. four-year public colleges and universities. Self-awareness and the capacity to view situations simultaneously in multiple ways and from different perspectives are essential elements of CFO effectiveness and success in the higher education environment. The…

  1. Building a world-class A/P function: how UPMC went paperless.

    PubMed

    DeLuca, Michael; Smith, Corey

    2010-03-01

    UPMC engaged people, processes, and technology to move its A/P function from a highly manual, paper-based operation to a completely automated process. UPMC's CFO hired a chief supply chain officer to develop a strategic plan, and UPMC named a value analysis team to gain clinician buy-in. UPMC automated A/P by enabling receipt of electronic invoices. UPMC streamlined its processes for invoices.

  2. Study of structural and magnetic properties of cobalt ferrite nanoparticles sintered at different temperature

    NASA Astrophysics Data System (ADS)

    Kumari, Mukesh; Bhatnagar, Mukesh Chander

    2018-05-01

    Cobalt ferrite (CFO) has been synthesized in the form of nanoparticles (NPs) through sol-gel auto-combustion method. The prepared NPs of CFO were sintered for four hours at various temperatures from 300°C to 900°C. The physical properties of the sintered samples have been optimized using X-ray diffraction (XRD), Raman spectroscopy and physical properties measurement system (PPMS). The XRD and Raman studies have confirmed the cubic spinel phase formation of CFO NPs. XRD results showed that as we increase the sintering temperature the crystallite size of particles increases. Whereas the magnetic studies revealed that the saturation magnetization (MS) increases while the coercivity (HC) of nanoparticles decreases with increase of sintering temperature.

  3. The value-adding CFO: an interview with Disney's Gary Wilson. Interview by Geraldine E. Willigan.

    PubMed

    Wilson, G

    1990-01-01

    Financing a company is more complex than ever-and more important to its economic success. The demands on a CFO are tremendous. Optimizing capital costs requires an unprecedented level of technical sophistication. Yet the best CFOs today are not mere technicians. They are also strategists and innovators. Gary Wilson exemplifies the new CFO. In his 5 years as executive vice president and CFO of the Walt Disney Company and his 12 years at Marriott Corporation, he has shown how the finance function can add value-not just account for it. How does a CFO create value for shareholders? "Just like all the great marketing and operating executives," Wilson says, "by being creative." To Wilson, being creative means rethinking assumptions and finding clever ways to achieve financial and strategic goals. Some of Wilson's innovative deal making-like the off-balance-sheet financing he used at Marriott-is well known. At Marriott, he discovered the power of separating the ownership of an asset from its control. Marriott's strength was in operations, yet the company had a great deal of money tied up in real estate. Growth would require even more investment in real estate. Wilson's solution was to sell the hotels-in effect, removing them and the debt used to finance them from the balance sheet-and contract to operate them. In this interview, Wilson gives his view of the role of finance in today's corporation and explains the thinking behind some of the successful deals he has engineered-including Disney's Silver Screen movie-making partnerships and Euro Disneyland.

  4. Braking and Entering: A New CFO's Transition into A K-12 Urban School District

    ERIC Educational Resources Information Center

    Trautenberg, David Herbert

    2016-01-01

    In this autoethnography, I examine the challenges I faced as a private-to-public-sector novice CFO entering a resource-constrained 41-thousand-student K-12 urban school district in Colorado. This study chronicles how I deliberately slowed down my interactions within a complex adaptive system (CAS) through ethnographic interviewing to identify the…

  5. Acting Administrator Welcomes New CFO

    NASA Image and Video Library

    2018-04-03

    Acting NASA Administrator Robert Lightfoot, left, and newly appointed NASA Chief Financial Officer Jeff DeWit, meet on DeWit's first day in office, Tuesday, April 3, 2018 at NASA Headquarters in Washington. As NASA CFO, DeWit ensures the financial health of the agency, which includes effectively employing agency resources toward the achievement of NASA's strategic plan. Photo Credit: (NASA/Bill Ingalls)

  6. Modification of structure and magnetic anisotropy of epitaxial CoFe₂O₄ films by hydrogen reduction

    DOE PAGES

    Chen, Aiping; Poudyal, Narayan; Xiong, Jie; ...

    2015-03-16

    Heteroepitaxial CoFe₂O₄ (CFO) thin films with different thicknesses were deposited on MgO (001) substrates. The as-deposited CFO films show a clear switching of magnetic anisotropy with increasing film thickness. The thinner films (<100 nm) show a perpendicular magnetic anisotropy due to the out-of-plane compressive strain. The thicker films exhibit an in-plane easy axis owing to the dominating shape anisotropy effect. The magnetostriction coefficient of CFO films is estimated to be λ[001] =-188 × 10⁻⁶. Metallic CoFe₂ films were obtained by annealing the as-deposited CFO films in forming gas (Ar 93% + H₂ 7%) at 450 °C. XRD shows that CoFe₂more » films are textured out-of-plane and aligned in-plane, owing to lattice matching between CoFe₂ and MgO substrate. TEM results indicate that as-deposited films are continuous while the annealed films exhibit a nanopore mushroom structure. The magnetic anisotropy of CoFe₂ films is dominated by the shape effect. The results demonstrate that hydrogen reduction can be effectively used to modify microstructures and physical properties of complex metal oxide materials.« less

  7. Field emission properties of nano-structured cobalt ferrite (CoFe2O4) synthesized by low-temperature chemical method

    NASA Astrophysics Data System (ADS)

    Ansari, S. M.; Suryawanshi, S. R.; More, M. A.; Sen, Debasis; Kolekar, Y. D.; Ramana, C. V.

    2018-06-01

    We report on the field-emission properties of structure-morphology controlled nano-CoFe2O4 (CFO) synthesized via a simple and low-temperature chemical method. Structural analyses indicate that the spongy-CFO (approximately, 2.96 nm) is nano-structured, spherical, uniformly-distributed, cubic-structured and porous. Field emission studies reveal that CFO exhibit low turn-on field (4.27 V/μm) and high emission current-density (775 μA/cm2) at a lower applied electric field of 6.80 V/μm. In addition, extremely good emission current stability is obtained at a pre-set value of 1 μA and high emission spot-density over large area (2 × 2 cm2) suggesting the applicability of these materials for practical applications in vacuum micro-/nano-electronics.

  8. Nelson: management is a team effort.

    PubMed

    Nelson, S I

    2001-11-01

    Sally I. Nelson, CPA, is executive vice president, chief financial officer, and chief information officer for Texas Children's Hospital in Houston, the largest freestanding pediatric hospital in the United States. It is a part of Texas Children's Hospital and Integrated Delivery System (TCH IDS). Before joining the organization in 1986, Nelson served as a senior manager in the computer services consulting practice of KPMG Peat Marwick-Houston. Nelson recently was named a finalist in CFO magazine's national 2001 CFO Excellence Awards, the first CFO of a not-for-profit organization to be named a finalist since not-for-profits became eligible for the awards. She was cited for her accomplishments in managing expectations and relationships with the community and its leaders, government officials, Baylor College of Medicine, physicians, patients' families, hospital personnel, trustees of the hospital, and investors.

  9. Setting up a CFO Trust Fund: Forging a Bond with Your Director of Finance Will Reap Rewards for Your Institution--And Your Department

    ERIC Educational Resources Information Center

    Schaffhauser, Dian

    2011-01-01

    While it would be naive to think that every CIO can achieve a rapport with his CFO, understanding the importance of a solid relationship with the head of finance is critical to success, both for the IT department and the institution as a whole. Never has this been truer than in today's bleak economy, as CFOs become increasingly cautious about…

  10. Strategic financial analysis: the CFO's role in strategic planning.

    PubMed

    Litos, D M

    1985-03-01

    Strategic financial analysis, the financial information support system for the strategic planning process, provides information vital to maintaining a healthy bottom line. This article, the third in HCSM's series on the organizational components of strategic planning, reviews the role of the chief financial officer in determining which programs and services will best meet the future needs of the institution.

  11. Directed Self-Assembly of Epitaxial CoFe2O4-BiFeO3 Multiferroic Nanocomposites

    DTIC Science & Technology

    2012-04-09

    has been limited. One method to produce patterned magneto- electric composites is to use a porous anodic aluminum oxide ( AAO ) film as a liftoff mask...control found in the BFO−CFO 1-3 epitaxial nanocomposites.6,8 Additionally, the AAO and membrane masks are not practical for the formation of a square...during deposition, which produces a hexagonal array pattern.12,13 In one approach, a BTO−CFO multilayer is deposited onto the AAO film on a STO substrate

  12. An Upgrade of the Aeroheating Software ''MINIVER''

    NASA Technical Reports Server (NTRS)

    Louderback, Pierce

    2013-01-01

    Detailed computational modeling: CFO often used to create and execute computational domains. Increasing complexity when moving from 20 to 30 geometries. Computational time increased as finer grids are used (accuracy). Strong tool, but takes time to set up and run. MINIVER: Uses theoretical and empirical correlations. Orders of magnitude faster to set up and run. Not as accurate as CFO, but gives reasonable estimations. MINIVER's Drawbacks: Rigid command-line interface. Lackluster, unorganized documentation. No central control; multiple versions exist and have diverged.

  13. Career path to CFO: selection, training, and placement.

    PubMed

    Sieveking, N; Wood, D L

    1994-06-01

    Not long ago, chief financial officers (CFOs) in hospitals could focus almost exclusively on financial accounting. Today, however, financial managers must tend diverse tasks of coordination, education, and professional specialization. The authors suggest that those who desire the position of CFO would do well to couple accounting expertise with a capacity to understand ethics and mores, economics, descriptive and predictive statistics, people from diverse socioeconomic and cultural backgrounds, as well as features of disease, its prevention, and course of treatment.

  14. Molecular discrimination of lactobacilli used as starter and probiotic cultures by amplified ribosomal DNA restriction analysis.

    PubMed

    Roy, D; Sirois, S; Vincent, D

    2001-04-01

    Lactic acid bacteria such as Lactobacillus helveticus, L. delbrueckii subsp. delbrueckii, L. delbrueckii subsp. lactis, L. delbrueckii subsp. bulgaricus, L. acidophilus, and L. casei related taxa which are widely used as starter or probiotic cultures can be identified by amplified ribosomal DNA restriction analysis (ARDRA). The genetic discrimination of the related species belonging to these groups was first obtained by PCR amplifications by using group-specific or species-specific 16S rDNA primers. The numerical analysis of the ARDRA patterns obtained by using CfoI, HinfI, Tru9I, and ScrFI was an efficient typing tool for identification of species of the L. acidophilus and L. casei complex. ARDRA by using CfoI was a reliable method for differentiation of L. delbrueckii subsp. bulgaricus and L. delbrueckii subsp. lactis. Finally, strains ATCC 393 and ATCC 15820 exhibited unique ARDRA patterns with CfoI and Tru9I restriction enzymes as compared with the other strains of L. casei, L. paracasei, and L. rhamnosus.

  15. Probing optical band gaps at the nanoscale in NiFe₂O₄ and CoFe₂O₄ epitaxial films by high resolution electron energy loss spectroscopy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dileep, K.; Loukya, B.; Datta, R., E-mail: ranjan@jncasr.ac.in

    2014-09-14

    Nanoscale optical band gap variations in epitaxial thin films of two different spinel ferrites, i.e., NiFe₂O₄ (NFO) and CoFe₂O₄ (CFO), have been investigated by spatially resolved high resolution electron energy loss spectroscopy. Experimentally, both NFO and CFO show indirect/direct band gaps around 1.52 eV/2.74 and 2.3 eV, and 1.3 eV/2.31 eV, respectively, for the ideal inverse spinel configuration with considerable standard deviation in the band gap values for CFO due to various levels of deviation from the ideal inverse spinel structure. Direct probing of the regions in both the systems with tetrahedral A site cation vacancy, which is distinct frommore » the ideal inverse spinel configuration, shows significantly smaller band gap values. The experimental results are supported by the density functional theory based modified Becke-Johnson exchange correlation potential calculated band gap values for the different cation configurations.« less

  16. MAI-free performance of PMU-OFDM transceiver in time-variant environment

    NASA Astrophysics Data System (ADS)

    Tadjpour, Layla; Tsai, Shang-Ho; Kuo, C.-C. J.

    2005-06-01

    An approximately multi-user OFDM transceiver was introduced to reduce the multi-access interference (MAI ) due to the carrier frequency offset (CFO) to a negligible amount via precoding by Tsai, Lin and Kuo. In this work, we investigate the performance of this precoded multi-user (PMU) OFDM system in a time-variant channel environment. We analyze and compare the MAI effect caused by time-variant channels in the PMU-OFDM and the OFDMA systems. Generally speaking, the MAI effect consists of two parts. The first part is due to the loss of orthogonality among subchannels for all users while the second part is due to the CFO effect caused by the Doppler shift. Simulation results show that, although OFDMA outperforms the PMU-OFDM transceiver in a fast time-variant environment without CFO, PMU-OFDM outperforms OFDMA in a slow time-variant channel via the use of M/2 symmetric or anti-symmetric codewords of M Hadamard-Walsh codes.

  17. Independent Auditor’s Report on the Examination of DoD Execution of North Atlantic Treaty Organization-Contributing Countries’ Donations to Afghan National Army Trust Fund

    DTIC Science & Technology

    2014-03-24

    ASFF) as of March 31, 2013.  We identified material internal control weaknesses related to the financial reporting processes and noncompliance with...controls to achieve the objectives of effective and efficient operations, reliable financial reporting , and compliance with applicable laws and...internal control deficiencies in other financial reporting processes. Inadequate Controls OUSD(C)/CFO and NTM-A/CSTC-A did not have adequate internal

  18. Carrier-interleaved orthogonal multi-electrode multi-carrier resistivity-measurement tool

    NASA Astrophysics Data System (ADS)

    Cai, Yu; Sha, Shuang

    2016-09-01

    This paper proposes a new carrier-interleaved orthogonal multi-electrode multi-carrier resistivity-measurement tool used in a cylindrical borehole environment during oil-based mud drilling processes. The new tool is an orthogonal frequency division multiplexing access-based contactless multi-measurand detection tool. The tool can measure formation resistivity in different azimuthal angles and elevational depths. It can measure many more measurands simultaneously in a specified bandwidth than the legacy frequency division multiplexing multi-measurand tool without a channel-select filter while avoiding inter-carrier interference. The paper also shows that formation resistivity is not sensitive to frequency in certain frequency bands. The average resistivity collected from N subcarriers can increase the measurement of the signal-to-noise ratio (SNR) by N times given no amplitude clipping in the current-injection electrode. If the clipping limit is taken into account, with the phase rotation of each single carrier, the amplitude peak-to-average ratio can be reduced by 3 times, and the SNR can achieve a 9/N times gain over the single-carrier system. The carrier-interleaving technique is also introduced to counter the carrier frequency offset (CFO) effect, where the CFO will cause inter-pad interference. A qualitative analysis and simulations demonstrate that block-interleaving performs better than tone-interleaving when coping with a large CFO. The theoretical analysis also suggests that increasing the subcarrier number can increase the measurement speed or enhance elevational resolution without sacrificing receiver performance. The complex orthogonal multi-pad multi-carrier resistivity logging tool, in which all subcarriers are complex signals, can provide a larger available subcarrier pool than other types of transceivers.

  19. A decade of change: the emerging role of the CFO.

    PubMed

    Gauss, J W

    1991-05-01

    The average senior financial executive today in a hospital or corporate healthcare setting is a 42-year-old male who has a master's degree or at least some postgraduate education and who has been in his position for six years, according to a 1991 national survey of healthcare chief financial officers (CFOs). The individual has the title of CFO, earns $82,100, and last year received incentive compensation amounting to 12.3 percent of base salary. He aspires to a higher position, although not necessarily the job of chief executive officer.

  20. Giant room temperature magnetoelectric response in strain controlled nanocomposites

    NASA Astrophysics Data System (ADS)

    Rafique, Mohsin; Herklotz, Andreas; Dörr, Kathrin; Manzoor, Sadia

    2017-05-01

    We report giant magnetoelectric coupling at room temperature in a self-assembled nanocomposite of BiFeO3-CoFe2O4 (BFO-CFO) grown on a BaTiO3 (BTO) crystal. The nanocomposite consisting of CFO nanopillars embedded in a BFO matrix exhibits weak perpendicular magnetic anisotropy due to a small out-of-plane compression (˜0.3%) of the magnetostrictive (CFO) phase, enabling magnetization rotation under moderate in-plane compression. Temperature dependent magnetization measurements demonstrate strong magnetoelastic coupling between the BaTiO3 substrate and the nanocomposite film, which has been exploited to produce a large magnetoelectric response in the sample. The reorientation of ferroelectric domains in the BTO crystal upon the application of an electric field (E) alters the strain state of the nanocomposite film, thus enabling control of its magnetic anisotropy. The strain mediated magnetoelectric coupling coefficient α = μ o d M / d E calculated from remnant magnetization at room temperature is 2.6 × 10-7 s m-1 and 1.5 × 10-7 s m-1 for the out-of-plane and in-plane orientations, respectively.

  1. Dynamic Magnetostriction of CoFe2 O4 and Its Role in Magnetoelectric Composites

    NASA Astrophysics Data System (ADS)

    Aubert, A.; Loyau, V.; Pascal, Y.; Mazaleyrat, F.; LoBue, M.

    2018-04-01

    Applications of magnetostrictive materials commonly involve the use of the dynamic deformation, i.e., the piezomagnetic effect. Usually, this effect is described by the strain derivative ∂λ /∂H , which is deduced from the quasistatic magnetostrictive curve. However, the strain derivative might not be accurate to describe dynamic deformation in semihard materials as cobalt ferrite (CFO). To highlight this issue, dynamic magnetostriction measurements of cobalt ferrite are performed and compared with the strain derivative. The experiment shows that measured piezomagnetic coefficients are much lower than the strain derivative. To point out the direct application of this effect, low-frequency magnetoelectric (ME) measurements are also conducted on bilayers CFO /Pb (Zr ,Ti )O3 . The experimental data are compared with calculated magnetoelectric coefficients which include a measured dynamic coefficient and result in very low relative error (<5 %), highlighting the relevance of using a piezomagnetic coefficient derived from dynamic magnetostriction instead of a strain derivative coefficient to model ME composites. The magnetoelectric effect is then measured for several amplitudes of the alternating field Hac, and a nonlinear response is revealed. Based on these results, a trilayer CFO/Pb (Zr ,Ti )O3 /CFO is made exhibiting a high magnetoelectric coefficient of 578 mV /A (approximately 460 mV /cm Oe ) in an ac field of 38.2 kA /m (about 48 mT) at low frequency, which is 3 times higher than the measured value at 0.8 kA /m (approximately 1 mT). We discuss the viability of using semihard materials like cobalt ferrite for dynamic magnetostrictive applications such as the magnetoelectric effect.

  2. Design, Fabrication, Characterization and Modeling of Integrated Functional Materials

    DTIC Science & Technology

    2010-10-19

    ribbons: A relationship between the soft magnetic properties and GMI effect has been established in Co69Fe4.5R1.5Si10B15 (R = Ni, Al , Cr) amorphous... deposition . A strain compression-relaxation mechanism has been proposed in order to explain the structure- property relationships in the CFO-PZT bilayer...being pursued. The new Laser Assisted Spray process chamber for co- deposition of QDs and polymer films is shown in Fig. 55. Fig. 55

  3. Spin and Charge Transport in 2D Materials and Magnetic Insulator/Metal Heterostructures

    NASA Astrophysics Data System (ADS)

    Amamou, Walid

    Spintronic devices are very promising for future information storage, logic operations and computation and have the potential to replace current CMOS technology approaching the scaling limit. In particular, the generation and manipulation of spin current enables the integration of storage and logic within the same circuit for more powerful computing architectures. In this thesis, we examine the manipulation of spins in 2D materials such as graphene and metal/magnetic insulator heterostructures. In particular, we investigate the feasibility for achieving magnetization switching of a nanomagnet using graphene as a nonmagnetic channel material for All Spin Logic Device applications. Using in-situ MBE deposition of nanomagnet on graphene spin valve, we demonstrate the presence of an interfacial spin dephasing at the interface between the graphene and the nanomagnet. By introducing a Cu spacer between the nanomagnet and graphene, we demonstrate that this interfacial effect is related to an exchange interaction between the spin current and the disordered magnetic moment of the nanomagnet in the first monolayer. In addition to the newly discovered interfacial spin relaxation effect, the extracted contact resistance area product of the nanomagnet/graphene interface is relatively high on the order of 1Omicrom2. In practice, reducing the contact resistance will be as important as eliminating the interfacial relaxation in order to achieve magnetization switching. Furthermore, we examine spin manipulation in a nonmagnetic Pt using an internal magnetic exchange field produced by the adjacent magnetic insulator CoFe2O4 grown by MBE. Here, we report the observation of a strong magnetic proximity effect of Pt deposited on top of a perpendicular magnetic anisotropy (PMA) inverse spinel material Cobalt Ferrite (CFO, CoFe 2O4). The CFO was grown by MBE and its magnetization was characterized by Vibrating Sample Magnetometry (VSM) demonstrating the strong out of plane magnetic anisotropy of this material. The anomalous Hall measurement on a Pt/CFO Hall bar exhibits a strong non-linear background around the saturation of the out of plane CFO magnetization. After subtraction of the Ordinary Hall Effect (OHE), we extract a strongly hysteretic anomalous Hall voltage that indicates that Pt acquired the magnetization properties of the CFO and has become ferromagnetic due to the proximity effects.

  4. Tuning the photovoltaic effect of multiferroic CoFe2O4/Pb(Zr, Ti)O3 composite films by magnetic fields

    NASA Astrophysics Data System (ADS)

    Pan, Dan-Feng; Chen, Guang-Yi; Bi, Gui-Feng; Zhang, Hao; Liu, Jun-Ming; Wang, Guang-Hou; Wan, Jian-Guo

    2016-05-01

    The 0-3 type CoFe2O4-Pb(Zr,Ti)O3 (CFO-PZT) multiferroic composite films have been prepared by a sol-gel process and spin-coating technique. A confirmable photovoltaic effect is observed under ultraviolet light irradiation. Moreover, this photovoltaic effect can be tuned by external magnetic fields. The maximum magnetic modulation ratios of short-circuit current density and open-circuit voltage can reach as high as 13.7% and 12.8% upon the application of 6 kOe DC magnetic field. Through remnant polarization measurements under various magnetic fields and detailed analysis of the energy band structures, we elucidate the mechanism of tuning photovoltaic effect by magnetic fields and attribute it to the combination of two factors. One is the decreased ferroelectric-polarization-induced depolarization electric field and another is the band structure reconstruction at CFO-PZT interfaces, both of which are dominated by the magnetoelectric coupling via interfacial stress transferring at nanoscale. This work makes some attempts of coupling photo-induced effects with magnetoelectric effect in multiferroic materials and will widen the practical ranges of multiferroic-based applications.

  5. A new electrochemical sensor for highly sensitive and selective detection of nitrite in food samples based on sonochemical synthesized Calcium Ferrite (CaFe2O4) clusters modified screen printed carbon electrode.

    PubMed

    Balasubramanian, Paramasivam; Settu, Ramki; Chen, Shen-Ming; Chen, Tse-Wei; Sharmila, Ganapathi

    2018-08-15

    Herein, we report a novel, disposable electrochemical sensor for the detection of nitrite ions in food samples based on the sonochemical synthesized orthorhombic CaFe 2 O 4 (CFO) clusters modified screen printed electrode. As synthesized CFO clusters were characterized by scanning electron microscopy (SEM), X-ray diffraction (XRD), Fourier transformer infrared spectroscopy (FT-IR), Thermogravimetric analysis (TGA), X-ray photoelectron spectroscopy (XPS), electrochemical impedance spectroscopy (EIS), cyclic voltammetry (CV) and amperometry (i-t). Under optimal condition, the CFO modified electrode displayed a rapid current response to nitrite, a linear response range from 0.016 to 1921 µM associated with a low detection limit 6.6 nM. The suggested sensor also showed the excellent sensitivity of 3.712 μA μM -1  cm -2 . Furthermore, a good reproducibility, long-term stability and excellent selectivity were also attained on the proposed sensor. In addition, the practical applicability of the sensor was investigated via meat samples, tap water and drinking water, and showed desirable recovery rate, representing its possibilities for practical application. Copyright © 2018 Elsevier Inc. All rights reserved.

  6. Corticotomy-facilitated orthodontics using piezosurgery versus rotary instruments: an experimental study.

    PubMed

    Farid, Karim A; Mostafa, Yehya A; Kaddah, Mohammed A; El-Sharaby, Fouad Aly

    2014-10-01

    The aim of this study was to evaluate corticotomy-facilitated orthodontics (CFO) using piezosurgery versus conventional rotary instruments. Ten healthy adult male mongrel dogs of comparable age with a complete set of permanent dentition with average weights between 13-17 kilograms were used. CFO using conventional rotary instruments versus piezosurgery was performed on each dog in a split mouth design. For every dog, mandibular 2nd premolar retraction on each side was attempted after extracting 3rd premolars followed by corticotomy-facilitated orthodontics using conventional rotary surgical burs on the left side and an ultrasonic piezosurgery system on the right side of the same animal. Intraoral measurements of the rate of tooth movement were taken with a sliding caliper. Measurements were performed by the same operator at the time of surgery (appliance delivery) and every month for six months. The dogs were sacrificed after six months from initiation of tooth movement to evaluate the amount of tooth movement for both conventional rotary and piezosurgery corticotomy techniques. A statistically significantly higher mean amount of tooth movement for conventional rotary instrument versus the piezosurgery corticotomy technique was observed at all time intervals. Tooth movement was 1.6 times faster when CFO was done using conventional rotary instruments as compared to a piezosurgery device.

  7. Oxygen flux and dielectric response study of Mixed Ionic-Electronic Conducting (MIEC) heterogeneous functional materials

    NASA Astrophysics Data System (ADS)

    Rabbi, Fazle

    Dense mixed ionic-electronic conducting (MIEC) membranes consisting of ionic conductive perovskite-type and/or fluorite-type oxides and high electronic conductive spinel type oxides, at elevated temperature can play a useful role in a number of energy conversion related systems including the solid oxide fuel cell (SOFC), oxygen separation and permeation membranes, partial oxidization membrane reactors for natural gas processing, high temperature electrolysis cells, and others. This study will investigate the impact of different heterogeneous characteristics of dual phase ionic and electronic conductive oxygen separation membranes on their transport mechanisms, in an attempt to develop a foundation for the rational design of such membranes. The dielectric behavior of a material can be an indicator for MIEC performance and can be incorporated into computational models of MIEC membranes in order to optimize the composition, microstructure, and ultimately predict long term membrane performance. The dielectric behavior of the MIECs can also be an indicator of the transport mechanisms and the parameters they are dependent upon. For this study we chose a dual phase MIEC oxygen separation membrane consisting of an ionic conducting phase: gadolinium doped ceria-Ce0.8 Gd0.2O2 (GDC) and an electronic conductive phase: cobalt ferrite-CoFe2O4 (CFO). The membranes were fabricated from mixtures of Nano-powder of each of the phases for different volume percentages, sintered with various temperatures and sintering time to form systematic micro-structural variations, and characterized by structural analysis (XRD), and micro-structural analysis (SEM-EDS). Performance of the membranes was tested for variable partial pressures of oxygen across the membrane at temperatures from 850°C-1060°C using a Gas Chromatography (GC) system. Permeated oxygen did not directly correlate with change in percent mixture. An intermediate mixture 60%GDC-40%CFO had the highest flux compared to the 50%GDC-50%CFO and 80%GDC-20%CFO mixtures. Material characterization suggests the emergence of a third phase contributing to the behavior. Microstructural studies suggested changes in micro-structure of a given volume fraction for different sintering temperature and sintering time. Flux variation was observed for membranes with the same constituent volume fraction but different micro-structure indicating the effects of the micro-structure on the overall oxygen permeation. To correlate the experimental flux measurement with a standard Wagner's flux equation, different microstructural characteristics were studied to incorporate them into a modified Wagner's flux equation. In-situ broadband dielectric spectroscopy measurements over a temperature range of 850°C-1060°C and frequency range of (0.1Hz-1MHz) of the operating 60%GDC-40%CFO mixture oxygen separation membranes were measured using a NOVOCONTROL dielectric spectroscopy test system. Dielectric response of the operating membrane was studied to identify the charge transfer process in the membrane. A computational model to study the dielectric impedance response of different microstructure was developed using a COMSOL(TM) Multiphysics qasi-static electromagnetic module. This model was validated using model materials with regular geometric shapes. To measure impedance of real micro/nano-structures of the membrane material, domains required for the COMSOL calculation were obtained from actual micro/nano structures by using 3D scans from X-ray nano and micro tomography. Simpleware(TM) software was used to generate 3D domains from image slices obtained from the 3D x-ray scans. Initial voltage distributions on the original microstructure were obtained from the computational model. Similarly, development of a primary model for simulating ionic/electronic species flow inside of an MIEC was also begun. The possibility of using broadband dielectric spectroscopy methods to understand and anticipate the flux capabilities of MIECs to reduce the cost and time of development of such material systems was explored.

  8. Competing magnetic interactions and low temperature magnetic phase transitions in composite multiferroics

    NASA Astrophysics Data System (ADS)

    Borkar, Hitesh; Choudhary, R. J.; Singh, V. N.; Tomar, M.; Gupta, Vinay; Kumar, Ashok

    2015-08-01

    Novel magnetic properties and magnetic interactions in composite multiferroic oxides Pb[(Zr0.52Ti0.48)0.60(Fe0.67W0.33).40]O3]0.80-[CoFe2O4]0.20 (PZTFW-CFO) have been studied from 50 to 1000 Oe field cooled (FC) and zero field cooled (ZFC) probing conditions, and over a wide range of temperatures (4-350 K). Crystal structure analysis, surface morphology, and high resolution transmission electron microscopy images revealed the presence of two distinct phases, where micro- and nano-size spinel CFO were embedded in tetragonal PZTFW matrix and applied a significant built-in compressive strain (˜0.4-0.8%). Three distinct magnetic phase transitions were observed with the subtle effect of CFO magnetic phase on PZTFW magnetic phase transitions below the blocking temperature (TB). Temperature dependence magnetic property m(T) shows a clear evidence of spin freezing in magnetic order with lowering in thermal vibration. Chemical inhomogeneity and confinement of nanoscale ferrimagnetic phase in paramagnetic/antiferromagnetic matrix restrict the long range interaction of spin which in turn develop a giant spin frustration. A large divergence in the FC and ZFC data and broad hump in ZFC data near 200 (±10) K were observed which suggests that large magnetic anisotropy and short range order magnetic dipoles lead to the development of superparamagnetic states in composite.

  9. Fish oil concentrate delays sensitivity to thermal nociception in mice

    PubMed Central

    Veigas, Jyothi M.; Williams, Paul J.; Halade, Ganesh; Rahman, Mizanur M.; Yoneda, Toshiyuki; Fernandes, Gabriel

    2011-01-01

    Fish oil has been used to alleviate pain associated with inflammatory conditions such as rheumatoid arthritis. The anti-inflammatory property of fish oil is attributed to the n-3 fatty acids docosahexaenoic acid and eicosapentaenoic acid. Contrarily, vegetable oils such as safflower oil are rich in n-6 fatty acids which are considered to be mediators of inflammation. This study investigates the effect of n-3 and n-6 fatty acids rich oils as dietary supplements on the thermally induced pain sensitivity in healthy mice. C57Bl/6J mice were fed diet containing regular fish oil, concentrated fish oil formulation (CFO) and safflower oil (SO) for 6 months. Pain sensitivity was measured by plantar test and was correlated to the expression of acid sensing ion channels (ASICs), transient receptor potential vanilloid 1 (TRPV1) and c-fos in dorsal root ganglion cells. Significant delay in sensitivity to thermal nociception was observed in mice fed CFO compared to mice fed SO (p<0.05). A significant diminution in expression of ion channels such as ASIC1a (64%), ASIC13 (37%) and TRPV1 (56%) coupled with reduced expression of c-fos, a marker of neuronal activation, was observed in the dorsal root ganglion cells of mice fed CFO compared to that fed SO. In conclusion, we describe here the potential of fish oil supplement in reducing sensitivity to thermal nociception in normal mice. PMID:21345372

  10. Co-Prime Frequency and Aperture Design for HF Surveillance, Wideband Radar Imaging, and Nonstationary Array Processing

    DTIC Science & Technology

    2018-03-01

    offset designs . Particularly, the proposed CA-CFO is compared with uniform linear array and uniform frequency offset (ULA-UFO). Uniform linear array...and Aperture Design for HF Surveillance, Wideband Radar Imaging, and Nonstationary Array Processing (Grant No. N00014-13-1-0061) Submitted to...Contents 1. Executive Summary …………………………………………………………………………. 1 1.1. Generalized Co-Prime Array Design ………………………………………………… 1 1.2. Wideband

  11. 7 CFR 1468.20 - Application for CFO program participation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... program payments allowed, offering to apply more conservation practices to the land in order to increase... benefits; (4) Soil productivity; (5) Conservation compliance considerations; (6) Likelihood to remain in...

  12. 76 FR 67188 - Ocean Transportation Intermediary License Applicants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-31

    ... Liability Company, dba GlobalForwarding.com dba Forwardingservices.com dba Containerquote.com dba Global.../CEO/CFO, Application Type: QI Change. Unicorn Shipping, Inc. (NVO & OFF), 1225 W. 190th Street, Suite...

  13. 77 FR 1936 - Ocean Transportation Intermediary License; Applicants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-12

    ...), 9333 Elm Vista Drive, 9, Downey, CA 90242, Officer: Cynthia Choi, CEO/CFO/Secretary, (Qualifying.... Steele Logistics, LLC (NVO), 10722 La Cienega Blvd., Inglewood, CA 90304, Officer: Rene N. Steele, Member...

  14. 7 CFR 1468.4 - Establishing Conservation Farm Option (CFO) pilot project areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) Conservation of soil, water, and related natural resources, (ii) Water quality protection or improvement, (iii... that can be geographically described and has specific environmental sensitivities or significant soil...

  15. Thermal spin current generation and spin transport in Pt/magnetic-insulator/Py heterostructures

    NASA Astrophysics Data System (ADS)

    Chen, Ching-Tzu; Safranski, Christopher; Krivorotov, Ilya; Sun, Jonathan

    Magnetic insulators can transmit spin current via magnon propagation while blocking charge current. Furthermore, under Joule heating, magnon flow as a result of the spin Seeback effect can generate additional spin current. Incorporating magnetic insulators in a spin-orbit torque magnetoresistive memory device can potentially yield high switching efficiencies. Here we report the DC magneto-transport studies of these two effects in Pt/magnetic-insulator/Py heterostructures, using ferrimagnetic CoFexOy (CFO) and antiferromagnet NiO as the model magnetic insulators. We observe the presence and absence of the inverse spin-Hall signals from the thermal spin current in Pt/CFO/Py and Pt/NiO/Py structures. These results are consistent with our spin-torque FMR linewidths in comparison. We will also report investigations into the magnetic field-angle dependence of these observations.

  16. Flexible Multiferroic Bulk Heterojunction with Giant Magnetoelectric Coupling via van der Waals Epitaxy

    DOE PAGES

    Amrillah, Tahta; Bitla, Yugandhar; Shin, Kwangwoo; ...

    2017-05-22

    Magnetoelectric nanocomposites have been a topic of intense research due to their profound potential in the applications of electronic devices based on spintronic technology. Nevertheless, in spite of significant progress made in the growth of high-quality nanocomposite thin films, the substrate clamping effect still remains a major hurdle in realizing the ultimate magnetoelectric coupling. To overcome this obstacle, an alternative strategy of fabricating a self-assembled ferroelectric–ferrimagnetic bulk heterojunction on a flexible muscovite via van der Waals epitaxy is adopted. In this paper, we investigated the magnetoelectric coupling in a self-assembled BiFeO 3 (BFO)–CoFe 2O 4 (CFO) bulk heterojunction epitaxially grownmore » on a flexible muscovite substrate. The obtained heterojunction is composed of vertically aligned multiferroic BFO nanopillars embedded in a ferrimagnetic CFO matrix. Moreover, due to the weak interaction between the flexible substrate and bulk heterojunction, the interface is incoherent and, hence, the substrate clamping effect is greatly reduced. The phase-field simulation model also complements our results. The magnetic and electrical characterizations highlight the improvement in magnetoelectric coupling of the BFO–CFO bulk heterojunction. A magnetoelectric coupling coefficient of 74 mV/cm·Oe of this bulk heterojunction is larger than the magnetoelectric coefficient reported earlier on flexible substrates. Finally and therefore, this study delivers a viable route of fabricating a remarkable magnetoelectric heterojunction and yet flexible electronic devices that are robust against extreme conditions with optimized performance.« less

  17. Flexible Multiferroic Bulk Heterojunction with Giant Magnetoelectric Coupling via van der Waals Epitaxy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Amrillah, Tahta; Bitla, Yugandhar; Shin, Kwangwoo

    Magnetoelectric nanocomposites have been a topic of intense research due to their profound potential in the applications of electronic devices based on spintronic technology. Nevertheless, in spite of significant progress made in the growth of high-quality nanocomposite thin films, the substrate clamping effect still remains a major hurdle in realizing the ultimate magnetoelectric coupling. To overcome this obstacle, an alternative strategy of fabricating a self-assembled ferroelectric–ferrimagnetic bulk heterojunction on a flexible muscovite via van der Waals epitaxy is adopted. In this paper, we investigated the magnetoelectric coupling in a self-assembled BiFeO 3 (BFO)–CoFe 2O 4 (CFO) bulk heterojunction epitaxially grownmore » on a flexible muscovite substrate. The obtained heterojunction is composed of vertically aligned multiferroic BFO nanopillars embedded in a ferrimagnetic CFO matrix. Moreover, due to the weak interaction between the flexible substrate and bulk heterojunction, the interface is incoherent and, hence, the substrate clamping effect is greatly reduced. The phase-field simulation model also complements our results. The magnetic and electrical characterizations highlight the improvement in magnetoelectric coupling of the BFO–CFO bulk heterojunction. A magnetoelectric coupling coefficient of 74 mV/cm·Oe of this bulk heterojunction is larger than the magnetoelectric coefficient reported earlier on flexible substrates. Finally and therefore, this study delivers a viable route of fabricating a remarkable magnetoelectric heterojunction and yet flexible electronic devices that are robust against extreme conditions with optimized performance.« less

  18. The changing role of the hospital chief financial officer.

    PubMed

    Freitag, T R; Freitag, W

    1980-01-01

    Things are changing. That statement is obviously true of things political, economic and scientific. Not surprisingly, therefore, the statement applies to the activities, responsibilities, qualifications and, ultimately, status of the hospital chief financial officer (CFO).

  19. 7 CFR 1468.8 - Land eligibility provisions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... eligible wetland restoration or protection practice similar to WRP in accordance with § 1468.6(b); or (c) 7... Marketing Transition Act of 1996 and if the land upon which the CFO conservation practice, will be applied...

  20. 7 CFR 1468.8 - Land eligibility provisions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... eligible wetland restoration or protection practice similar to WRP in accordance with § 1468.6(b); or (c) 7... Marketing Transition Act of 1996 and if the land upon which the CFO conservation practice, will be applied...

  1. 7 CFR 1468.8 - Land eligibility provisions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... eligible wetland restoration or protection practice similar to WRP in accordance with § 1468.6(b); or (c) 7... Marketing Transition Act of 1996 and if the land upon which the CFO conservation practice, will be applied...

  2. 7 CFR 1468.8 - Land eligibility provisions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... eligible wetland restoration or protection practice similar to WRP in accordance with § 1468.6(b); or (c) 7... Marketing Transition Act of 1996 and if the land upon which the CFO conservation practice, will be applied...

  3. 76 FR 78265 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-16

    ... Officers (CFO) Act of 1990, as amended by the Government Management Reform Act (GMRA) of 1994, requires... Medicaid payable and receivable accounting data from the States. Form Number: CMS-R-199 (OMB : 0938-0697...

  4. 7 CFR 1468.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION FARM OPTION General Provisions § 1468.1 Purpose. (a) Through the Conservation Farm Option (CFO), the Commodity Credit Corporation (CCC) provides... concerns, water quality protection or improvement; wetland restoration and protection; wildlife habitat...

  5. Thermal generation of spin current in epitaxial CoFe{sub 2}O{sub 4} thin films

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Guo, Er-Jia, E-mail: ejguophysics@gmail.com, E-mail: klaeui@uni-mainz.de; Quantum Condensed Matter Division, Oak Ridge National Laboratory, Oak Ridge, Tennessee 37830; Herklotz, Andreas

    2016-01-11

    The longitudinal spin Seebeck effect (LSSE) has been investigated in high-quality epitaxial CoFe{sub 2}O{sub 4} (CFO) thin films. The thermally excited spin currents in the CFO films are electrically detected in adjacent Pt layers due to the inverse spin Hall effect. The LSSE signal exhibits a linear increase with increasing temperature gradient, yielding a LSSE coefficient of ∼100 nV/K at room temperature. The temperature dependence of the LSSE is investigated from room temperature down to 30 K, showing a significant reduction at low temperatures, revealing that the total amount of thermally generated magnons decreases. Furthermore, we demonstrate that the spin Seebeck effectmore » is an effective tool to study the magnetic anisotropy induced by epitaxial strain, especially in ultrathin films with low magnetic moments.« less

  6. Analysis of OFDMA receiver with carrier frequency offset and common carrier frequency offset (CCFO)

    NASA Astrophysics Data System (ADS)

    Gauni, Sabitha; Kumar, R.

    2013-01-01

    The technique of Orthogonal frequency multiplexing (OFDM) is used to mitigate the multipath effects and to achieve better data rate. When these systems are extended to enable multiple access wireless multimedia communications they are more beneficial. The performance of the OFDM systems degrades with frequency offset and phase offset. The OFDM multiple access (OFDMA) technology allots groups of the OFDM subcarriers allocated to different users for transmission. In this paper we study the interference effects of the individual subcarriers with the neighbouring subcarriers which also plays a role in the system degradation is termed as Multiuser Interference (MUI). The effect of Carrier frequency offset (CFO) on these systems is also taken in account. There are conventional CFO compensation methods for OFDMA systems the CFOs are usually compensated by directly eliminating the intercarrier interference (ICI) caused by the residual CFOs for individual users.

  7. How can push-off be preserved during use of an ankle foot orthosis in children with hemiplegia? A prospective controlled study.

    PubMed

    Desloovere, Kaat; Molenaers, Guy; Van Gestel, Leen; Huenaerts, Catherine; Van Campenhout, Anja; Callewaert, Barbara; Van de Walle, Patricia; Seyler, J

    2006-10-01

    Several studies indicated that walking with an ankle foot orthosis (AFO) impaired third rocker. The purpose of this study was to evaluate the effects of two types of orthoses, with similar goal settings, on gait, in a homogeneous group of children, using both barefoot and shoe walking as control conditions. Fifteen children with hemiplegia, aged between 4 and 10 years, received two types of individually tuned AFOs: common posterior leaf-spring (PLS) and Dual Carbon Fiber Spring AFO (CFO) (with carbon fibre at the dorsal part of the orthosis). Both orthoses were expected to prevent plantar flexion, thus improving first rocker, allowing dorsiflexion to improve second rocker, absorbing energy during second rocker, and returning it during the third rocker. The effect of the AFOs was studied using objective gait analysis, including 3D kinematics, and kinetics in four conditions: barefoot, shoes without AFO, and PLS and CFO combined with shoes. Several gait parameters significantly changed in shoe walking compared to barefoot walking (cadence, ankle ROM and velocity, knee shock absorption, and knee angle in swing). The CFO produced a significantly larger ankle ROM and ankle velocity during push-off, and an increased plantar flexion moment and power generation at pre-swing compared to the PLS (<0.01). The results of this study further support the findings of previous studies indicating that orthoses improve specific gait parameters compared to barefoot walking (velocity, step length, first and second ankle rocker, sagittal knee and hip ROM). However, compared to shoes, not all improvements were statistically significant.

  8. 76 FR 60836 - Applicants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-30

    ... at (202) 523-5843 or by e-mail at [email protected] . A & D International Logistics, Corp. (NVO), 248 NW... & General Manager (Qualifying Individual), Application Type: QI Change. American Royal International, Inc.../ General Manager (Qualifying Individual), Beverly Franklin, CFO/ Secretary (Qualifying Individual...

  9. Senate Confirmation Hearing CFO

    NASA Image and Video Library

    2009-10-14

    Dr. Elizabeth M. Robinson, nominee for Chief Financial Officer for NASA, answers questions during her confirmation hearing in front of the Senate Committee on Commerce, Science and Transportation, Thursday, Oct. 15, 2009, on Capitol Hill in Washington. Photo Credit: (NASA/Paul E. Alers)

  10. The case of the combative CFO.

    PubMed

    Nichols, N A; Bagley, C E; Beard, E; Dworkin, D; Millstein, I M

    1992-01-01

    Minute Publishing Chairman and CEO Neil Harcum has a right to be proud of his new national newspaper, America Today. It has won three Pulitzer Prizes and attracted one million readers in just three years of publication. But, as CFO Peter Rawson points out, it's also losing $100 million a year and has broken Minute's 20-year string of earnings gains. In the process, the company has been split between two warring factions: one is backing Harcum and favors continuing the paper. The other agrees with Rawson that the project must be stopped. The board of directors has been assembled to decide the newspaper's fate. In his speech to the board, Rawson says it's time to cut Minute's losses and put an end to America Today. And Wall Street agrees. Several brokerage houses have taken Minute off their buy lists, and rating agencies are about to down-grade the company's debt. "America Today is not a good investment," Rawson argues. "Certainly, it isn't in keeping with our commitment to deliver maximum value to our shareholders." But Harcum thinks Rawson is way out of line. "We cannot allow our bean-counters to set policy," he claims. Harcum sees the newspaper as a product of the future that has created its own market. It's only a matter of time before America Today attracts enough advertising to put it in the black. He has a successful track record, and he doesn't want the board to lose faith in him now.(ABSTRACT TRUNCATED AT 250 WORDS)

  11. 75 FR 57798 - Ocean Transportation Intermediary License Applicants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-22

    ... FEDERAL MARITIME COMMISSION Ocean Transportation Intermediary License Applicants Notice is hereby... license as a Non-Vessel-Operating Common Carrier (NVO) and/or Ocean Freight Forwarder (OFF)--Ocean.../ Treasurer/CFO, (Qualifying Individual). Application Type: New NVO License. World Class Solutions LLC (NVO...

  12. 48 CFR 532.7002 - Solicitation requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Use of the Credit Card for Purchases (CFO 4200.1)). (d) Consider requesting offerors to designate... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Authorizing Payment by Government Charge Card 532.7002..., request offerors to indicate if they will accept payment by Governmentwide commercial purchase card...

  13. The materiel manager-chief financial officer alliance.

    PubMed

    Henning, W K

    1987-08-01

    There is a gold mine of potential inventory reductions, expense reductions, and revenue increases in most hospitals that can be tapped by more intensive materiel management. The first step is incorporating the necessary ingredients for a strong materiel management effort--the right people and a state-of-the-art computer program. Reorganization may be necessary to establish a more unified, consolidated approach to materiel management. Second, conduct an audit of the entire hospital to identify opportunities for improvement and to establish baseline management data. Finally, push forward the process of system changes (which also establishes necessary controls) until results are accomplished--a process that usually requires one to three years. The alliance between the materiel manager and the CFO is definitely beneficial to the hospital and to the individuals involved.

  14. 7 CFR 1468.20 - Application for CFO program participation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... take into consideration the following factors: (1) Soil erosion; (2) Water quality; (3) Wildlife... water quality priority areas; (8) The environmental benefits per dollar expended; and (9) The degree to... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION FARM OPTION...

  15. 7 CFR 1468.7 - Participant eligibility provisions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION FARM OPTION General... farm enrolling in CFO. (b) Agree to forgo earning future payments under the Conservation Reserve... compliance with the highly erodible land and wetland conservation provisions found at part 12 of this title...

  16. Evaluation of SiO{sub 2}@CoFe{sub 2}O{sub 4} nano-hollow spheres through THz pulses

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rakshit, Rupali, E-mail: rupali12@bose.res.in; Pal, Monalisa; Chaudhuri, Arka

    2016-05-06

    We have synthesized cobalt ferrite (CFO) nanoparticles (NPs) of diameter 100 nm and nano-hollow spheres (NHSs) of diameter 100, 160, 250, and 350 nm by a facile one step template free solvothermal technique and carried out SiO{sub 2} coating on their surface following Stöber method. The phase and morphology of the nanostructures were confirmed by X-ray diffraction and transmission electron microscope. The magnetic measurements were carried out by vibrating sample magnetometer in order to study the influence of SiO{sub 2} coating on the magnetic properties of bare CFO nanostructures. Furthermore, we have applied THz time domain spectroscopy to investigate the THz absorptionmore » property of these nanostructures in the frequency range 1.0–2.5 THz. Detailed morphology and size dependent THz absorption study unfolds that the absorption property of these nanostructures sensitively carries the unique signature of its dielectric property.« less

  17. The best-laid incentive plans.

    PubMed

    Kerr, Steve

    2003-01-01

    Hiram Phillips couldn't have been in better spirits. The CFO and chief administrative officer of Rainbarrel Products, a diversified consumer-durables manufacturer, Phillips felt he'd single-handedly turned the company's performance around. He'd only been at Rainbarrel a year, but the company's numbers had, according to his measures, already improved by leaps and bounds. Now the day had come for Hiram to share the positive results of his new performance management system with his colleagues. The corporate executive council was meeting, and even CEO Keith Randall was applauding the CFO's work: "Hiram's going to give us some very good news about cost reductions and operating efficiencies, all due to the changes he's designed and implemented this year." Everything looked positively rosy--until some questionable information began to trickle in from other meeting participants. It came to light, for instance, that R&D had developed a breakthrough product that was not being brought to market as quickly as it should have been--thanks to Hiram's inflexible budgeting process. Then, too, an employee survey showed that workers were demoralized. And customers were complaining about Rainbarrel's service. The general message? The new performance metrics and incentives had indeed been affecting overall performance--but not for the better. Should Rainbarrel revisit its approach to performance management? Commentators Stephen Kaufman, a senior lecturer at Harvard Business School; compensation consultant Steven Gross; retired U.S. Navy vice admiral and management consultant Diego Hernandez; and Barry Leskin, a consultant and former chief learning officer for Chevron Texaco, offer their advice in this fictional case study.

  18. 32 CFR 183.5 - Responsibilities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE CIVIL DEFENSE DEFENSE SUPPORT OF SPECIAL... special events with the General Counsel of the Department of Defense (GC, DoD) and the Under Secretary of Defense (Comptroller)/Chief Financial Officer, Department of Defense (USD(C)/CFO). (8) Coordinate with the...

  19. 32 CFR 183.5 - Responsibilities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE CIVIL DEFENSE DEFENSE SUPPORT OF SPECIAL... special events with the General Counsel of the Department of Defense (GC, DoD) and the Under Secretary of Defense (Comptroller)/Chief Financial Officer, Department of Defense (USD(C)/CFO). (8) Coordinate with the...

  20. 77 FR 50545 - Members of Senior Executive Service Performance Review Boards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-21

    ... Strategy (SB/SE) Gregory E. Kane, Deputy Chief Financial Officer, Chief Financial Office (CFO) Sheldon M.... Krieg, IRS Human Capital Officer, Human Capital Office (HCO) Pamela J. LaRue, Chief Financial Officer...) Lauren Buschor, Associate Chief Information Officer (CIO), Enterprise Operations, Information Technology...

  1. 77 FR 19666 - Office of Financial Resources; Statement of Organization, Functions, and Delegations of Authority

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-02

    ... Departmental Chief Financial Officer (CFO), Chief Acquisition Officer (CAO) and Performance Improvement Officer... their policy role in resource allocation and decisions affecting financial, grants and procurement... DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of the Secretary Office of Financial Resources...

  2. 32 CFR 183.5 - Responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE CIVIL DEFENSE DEFENSE SUPPORT OF SPECIAL... special events with the General Counsel of the Department of Defense (GC, DoD) and the Under Secretary of Defense (Comptroller)/Chief Financial Officer, Department of Defense (USD(C)/CFO). (8) Coordinate with the...

  3. 76 FR 19097 - Ocean Transportation Intermediary License Applicants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-06

    ...: New NVO. Landstar Global Logistics, Inc. (NVO & OFF), 13410 Sutton Park Drive South, Jacksonville, FL... at (202) 523-5843 or by e-mail at [email protected] . Agility Logistics Corp. (OFF), 240 Commerce, Irvine... Sachs, Partner/Logistics Manager (Qualifying Individual), Ali Ismailzada, Partner/CFO, Application Type...

  4. 77 FR 37044 - Ocean Transportation Intermediary License; Applicants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-20

    ... Logistics (NVO & OFF), 10550 Deerwood Park Blvd., 509, Jacksonville, FL 32256, Officers: Ronald M. Doyle... (Qualifying Individual), Margaret Kong, CFO/Secretary, Application Type: New NVO & OFF License. FSG Logistics (USA), Inc. dba FSG Logistics, Inc. (NVO & OFF), 27013 Pacific Highway South, PMB386, Des Moines, WA...

  5. 75 FR 61757 - Ocean Transportation Intermediary License Applicants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Cargo Corp. (NVO & OFF), 8430 N.W. 66th Street, Miami, FL 33166. Officers: Karime Zawady, Vice President...), Jinho Um, CFO. Application Type: New NVO & OFF License. Junction Int'l Logistics, Inc. (NVO), 17870 Castleton Street, Suite 107, City of Industry, CA 91748. Officers: Charles Kuo, Secretary (Qualifying...

  6. 76 FR 53487 - Agency Information Collection Activities: Proposed Collection, Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-26

    ... paperwork requirements in the regulations under the Chief Financial Officers Act of 1990 (CFO). DATES... appropriately paid. Companies submit financial information monthly to ONRR on Form ONRR-2014, Report of Sales... Inspector General, or its agent (agent), audits the Department's financial statements. The Department's goal...

  7. 77 FR 12612 - Agency Information Collection Activities: Submitted for Office of Management and Budget Review...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    ... paperwork requirements in the regulations under the Chief Financial Officers Act of 1990 (CFO). This notice... Regulatory Affairs, OMB, Attention: Desk Officer for the Department of the Interior (OMB Control Number 1012... accurately value production and appropriately pay royalties. Companies submit financial information monthly...

  8. 75 FR 1001 - U.S. Chief Financial Officer Council; Grants Policy Committee (GPC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-07

    ... NATIONAL SCIENCE FOUNDATION U.S. Chief Financial Officer Council; Grants Policy Committee (GPC... committee of the U.S. Chief Financial Officers (CFO) Council. The Office of Management and Budget (OMB... Government. The GPC is charged with improving the management of federal financial assistance government-wide...

  9. 22 CFR 309.24 - Bankruptcy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 2 2014-04-01 2014-04-01 false Bankruptcy. 309.24 Section 309.24 Foreign Relations PEACE CORPS DEBT COLLECTION Salary Offset § 309.24 Bankruptcy. Peace Corps generally terminates... bankruptcy law. The CFO will seek legal advice by the General Counsel's office if there is the belief that...

  10. 7 CFR 1468.4 - Establishing Conservation Farm Option (CFO) pilot project areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) Conservation of soil, water, and related natural resources, (ii) Water quality protection or improvement, (iii) Wetland restoration and protection, and (iv) Wildlife habitat development and protection, (v) Or other... production flexibility contract, which is authorized by the Agricultural Marketing and Transition Act of 1996...

  11. 7 CFR 1468.4 - Establishing Conservation Farm Option (CFO) pilot project areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) Conservation of soil, water, and related natural resources, (ii) Water quality protection or improvement, (iii) Wetland restoration and protection, and (iv) Wildlife habitat development and protection, (v) Or other... production flexibility contract, which is authorized by the Agricultural Marketing and Transition Act of 1996...

  12. 7 CFR 1468.4 - Establishing Conservation Farm Option (CFO) pilot project areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) Conservation of soil, water, and related natural resources, (ii) Water quality protection or improvement, (iii) Wetland restoration and protection, and (iv) Wildlife habitat development and protection, (v) Or other... production flexibility contract, which is authorized by the Agricultural Marketing and Transition Act of 1996...

  13. 78 FR 55698 - Ocean Transportation Intermediary License Applicants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ...), Karla Costilla, Member/Manager, Application Type: New NVO & OFF License. ICAT Logistics, Inc. (OFF..., Washington, DC 20573, by telephone at (202) 523-5843 or by email at [email protected] . Abaco Logistics Corporation..., CFO, Application Type: QI Change & Add OFF Service. American General Logistics, Inc. (NVO), 626 N...

  14. 7 CFR 1468.8 - Land eligibility provisions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION FARM OPTION General Provisions... Marketing Transition Act of 1996 and if the land upon which the CFO conservation practice, will be applied... eligible wetland restoration or protection practice similar to WRP in accordance with § 1468.6(b); or (c) 7...

  15. Balancing risk and performance.

    PubMed

    Cocozza, Thomas

    2008-10-01

    IBM, together with the Wharton School and the Economist Intelligence Unit, recently completed its third Global CFO study, surveying more than 1,200 CFOs and senior-level finance professionals in five major sectors, 79 countries, and organizations of varying size. Among the CFOs surveyed were 42 healthcare CFOs, whose insights help to inform this article.

  16. 77 FR 61752 - Ocean Transportation Intermediary License Applicants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-11

    ..., Application Type: New OFF License. Korchina Logistics USA, Inc. (NVO & OFF), 18120 S. Broadway Street, Unit A, Gardena, CA 90248, Officers: Jong (A.K.A. Jake) K. Park, CFO (QI), Eric Sun, President, Application Type... License. Ocean Line Logistics Inc. (NVO & OFF), 630 W. Duarte Road, 205, Arcadia, CA 91007, Officer...

  17. 76 FR 76411 - Ocean Transportation Intermediary License; Applicants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-07

    ... at (202) 523-5843 or by email at [email protected] . Bluesea Logistics Corporation (NVO), 327 Elizabeth Avenue, Apt. A, Monterey Park, CA 91755-2044, Officers: Li Lin, General Manager/Sec/CFO, (Qualifying..., Application Type: Name Change. Didi Logistics Inc (NVO & OFF), 2380 SW 80th Court, Miami, FL 33155, Officers...

  18. 78 FR 5441 - Ocean Transportation Intermediary License Applicants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-25

    ... Trade Name Blu Logistics. Brutos International Corp. (NVO & OFF), 428 S. Atlantic Blvd., Suite 203, Monterey Park, CA 91754, Officers: Janet Li, Secretary (QI), Jesse Wu, CEO/CFO, Application Type: New NVO..., President (QI), Olen D. Woods, Director, Application Type: New NVO License. Global Logistics New Jersey, LLC...

  19. Setting up a CFO Trust Fund

    ERIC Educational Resources Information Center

    Schaffhauser, Dian

    2011-01-01

    Understanding the importance of a solid relationship with the head of finance is critical to success, both for the IT department and the institution as a whole. Never has this been truer than in today's bleak economy, as CFOs become increasingly cautious about initiatives that involve significant expense, yet information technology can help…

  20. Senate Confirmation Hearing CFO

    NASA Image and Video Library

    2009-10-14

    U.S. Sen. Jay Rockefeller, D-W.Va., Chairman of the of the Senate Committee on Commerce, Science and Transportation, makes a point during the nomination hearing for Dr. Elizabeth M. Robinson, nominee for Chief Financial Officer for NASA, Thursday, Oct. 15, 2009, on Capitol Hill in Washington. Photo Credit: (NASA/Paul E. Alers)

  1. Senate Confirmation Hearing CFO

    NASA Image and Video Library

    2009-10-14

    U.S. Sen. Maria Cantwell, D-Wash., left, talks about Dr. Elizabeth M. Robinson, nominee for Chief Financial Officer for NASA, right, prior to her confirmation hearing in front of the Senate Committee on Commerce, Science and Transportation, Thursday, Oct. 15, 2009, on Capitol Hill in Washington. Photo Credit: (NASA/Paul E. Alers)

  2. 76 FR 53935 - Delegation Authority for the Office of the Chief Financial Officer

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-30

    ... Office of the Chief Financial Officer AGENCY: Office of the Secretary, HUD. ACTION: Notice of delegation of authority. SUMMARY: In this notice, the Secretary of HUD, pursuant to the Chief Financial Officers Act of 1990 (CFO Act), which established the position of the Chief Financial Officer within HUD, is...

  3. 76 FR 24876 - Notice of Public Information Collection(s) Being Submitted for Review and Approval to the Office...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... reporting requirements, third party disclosure requirements, and recordkeeping requirement. Obligation To... reporting, recordkeeping and/or third party disclosure requirements. The Commission is reducing its previous... a quarterly report and must also submit an attestation by the chief financial officer (CFO) that the...

  4. 7 CFR 1468.21 - Contract requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... provisions of § 1468.24 of this part; (iv) Agree to forego participation in CRP, EQIP, and the cost-share... those practices transferred from terminated CRP and EQIP contracts and WRP cost-share agreements. For persons wishing to transfer from CRP, EQIP, or WRP to CFO, practices included in CRP or EQIP contracts or...

  5. 7 CFR 1468.22 - Conservation practice operation and maintenance.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... operation and maintenance is occurring. (b) For those persons who are signatories to existing CRP or EQIP contracts, or WRP cost-share agreements, practices will be transferred from EQIP and CRP contracts or WRP... rights and obligations under CRP, EQIP, or WRP will be incorporated into the new CFO contract. Practices...

  6. 7 CFR 1468.23 - Annual payments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... practice which would have qualified for payment under CRP in accordance with § 1468.6(a); (2) Part 1467 of... accordance with CRP payment limitation provisions set forth in part 1410 of this chapter. (2) The payment... the cost of the practice. (e) A landowner or producer that enrolls in CFO and terminates a CRP or EQIP...

  7. 75 FR 56507 - Extension of Award Period for FY 2007 Coastal and Estuarine Land Conservation Program Grants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-16

    ... Assistant Administrator for Management and CFO/CAO, Ocean Services and Coastal Zone Management. [FR Doc...-01] RIN 0648-ZC21 Extension of Award Period for FY 2007 Coastal and Estuarine Land Conservation....gov . SUPPLEMENTARY INFORMATION: The Coastal and Estuarine Land Conservation Program was established...

  8. DeWit Sworn In As NASA CFO

    NASA Image and Video Library

    2018-04-23

    Jeff DeWit, left, is seen during a ceremonial swearing in as the NASA Chief Financial Officer by Vice President Mike Pence as DeWit's wive Marina holds the bible and their children, Delaney, left, Katie, and Jamie look on, Monday, April 23, 2018 at NASA Headquarters in Washington. Photo Credit: (NASA/Bill Ingalls)

  9. 22 CFR 213.19 - Installment payments.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... single payment. However, where the CFO determines that a debtor is financially unable to pay the... establishing that it is financially unable to pay the debt in a single payment or that an alternative payment... payments will bear a reasonable relation to the size of the debt and the debtor's ability to pay. The...

  10. 22 CFR 213.19 - Installment payments.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... single payment. However, where the CFO determines that a debtor is financially unable to pay the... establishing that it is financially unable to pay the debt in a single payment or that an alternative payment... payments will bear a reasonable relation to the size of the debt and the debtor's ability to pay. The...

  11. 22 CFR 213.19 - Installment payments.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... single payment. However, where the CFO determines that a debtor is financially unable to pay the... establishing that it is financially unable to pay the debt in a single payment or that an alternative payment... payments will bear a reasonable relation to the size of the debt and the debtor's ability to pay. The...

  12. 22 CFR 213.19 - Installment payments.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... single payment. However, where the CFO determines that a debtor is financially unable to pay the... establishing that it is financially unable to pay the debt in a single payment or that an alternative payment... payments will bear a reasonable relation to the size of the debt and the debtor's ability to pay. The...

  13. Business Education and Gender Bias at the "C-Level"

    ERIC Educational Resources Information Center

    Miller, Gina L.; Sisk, Faye A.

    2012-01-01

    Women in business are perceived to have been successful; however, the numbers of women in "C-level" positions (e.g., CEO, CFO, CIO, etc.) provide evidence to the contrary. This paper examines obstacles to women rising to "C-level" positions and how business education contributes to, but may ultimately help resolve these…

  14. FBMC receiver for multi-user asynchronous transmission on fragmented spectrum

    NASA Astrophysics Data System (ADS)

    Doré, Jean-Baptiste; Berg, Vincent; Cassiau, Nicolas; Kténas, Dimitri

    2014-12-01

    Relaxed synchronization and access to fragmented spectrum are considered for future generations of wireless networks. Frequency division multiple access for filter bank multicarrier (FBMC) modulation provides promising performance without strict synchronization requirements contrary to conventional orthogonal frequency division multiplexing (OFDM). The architecture of a FBMC receiver suitable for this scenario is considered. Carrier frequency offset (CFO) compensation is combined with intercarrier interference (ICI) cancellation and performs well under very large frequency offsets. Channel estimation and interpolation had to be adapted and proved effective even for heavily fragmented spectrum usage. Channel equalization can sustain large delay spread. Because all the receiver baseband signal processing functionalities are proposed in the frequency domain, the overall architecture is suitable for multiuser asynchronous transmission on fragmented spectrum.

  15. Electrical spin injection from CoFe2O4 into p-Si semiconductor across MgO tunnel barrier for spin electronics

    NASA Astrophysics Data System (ADS)

    Panda, J.; Maji, Nilay; Nath, T. K.

    2017-05-01

    The room temperature spin injection and detection in non magnetic p-Si semiconductor have been studied in details in our CoFe2O4 (CFO)/MgO/p-Si heterojunction. The 3-terminal tunnel contacts have been made on the device for transport measurements. The electrical transport properties have been investigated at different isothermal conditions in the temperature range of 10-300 K. The spin accumulation in non magnetic p-Si semiconductor has been observed at different bias current under the applied magnetic field parallel to the film plane in the temperature range of 40-300 K. We have observed a giant spin accumulation in p-Si semiconductor using MgO/CFO tunnel contact. The Hanley effect is used to control the reduction of spin accumulation by applying magnetic field perpendicular to the carrier spin in the p-Si. The accumulated spin signal decays as a function of applied magnetic field for fixed bias current. These results will enable utilization of the spin degree of freedom in complementary Si devices and its further development.

  16. Demonstration that Australian Pasteurella multocida isolates from sporadic outbreaks of porcine pneumonia are non-toxigenic (toxA-) and display heterogeneous DNA restriction endonuclease profiles compared with toxigenic isolates from herds with progressive atrophic rhinitis.

    PubMed

    Djordjevic, S P; Eamens, G J; Ha, H; Walker, M J; Chin, J C

    1998-08-01

    Capsular types A and D of Pasteurella multocida cause economic losses in swine because of their association with progressive atrophic rhinitis (PAR) and enzootic pneumonia. There have been no studies comparing whole-cell DNA profiles of isolates associated with these two porcine respiratory diseases. Twenty-two isolates of P. multocida from diseased pigs in different geographic localities within Australia were characterised genotypically by restriction endonuclease analysis (REA) with the enzyme CfoI. Seven of 12 P. multocida isolates from nasal swabs from pigs in herds where PAR was either present or suspected displayed a capsular type D phenotype. These were shown to possess the toxA gene by polymerase chain reaction (PCR) and Southern hybridisation, and further substantiated by production of cytotoxin in vitro. The CfoI profile of one of these seven isolates, which was from the initial outbreak of PAR in Australia (in Western Australia, WA), was identical with profiles of all six other toxigenic isolates from sporadic episodes in New South Wales (NSW). The evidence suggests that the strain involved in the initial outbreak was responsible for the spread of PAR to the eastern states of Australia. Another 10 isolates, representing both capsular types A and D, were isolated exclusively from porcine lung lesions after sporadic outbreaks of enzootic pneumonia in NSW and WA. CfoI restriction endonuclease profiles of these isolates revealed considerable genomic heterogeneity. Furthermore, none of these possessed the toxA gene. This suggests that P. multocida strains with the toxA gene do not have a competitive survival advantage in the lower respiratory tract or that toxin production does not play a role in the pathology of pneumonic lesions, or both. REA with polyacrylamide gel electrophoresis and silver staining was found to be a practical and discriminatory tool for epidemiological tracing of P. multocida outbreaks associated with PAR or pneumonia in pigs.

  17. 77 FR 61468 - Delegation by the Chief Financial Officer to the Comptroller of Certain Authorities Under the CFO...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-09

    ... DEPARTMENT OF STATE [Delegation of Authority No. 345] Delegation by the Chief Financial Officer to... the Chief Financial Officer Act, 31 U.S.C. 901 et seq., and by the designation from the President... time. Notwithstanding this delegation of authority, the Chief Financial Officer may at any time...

  18. Leadership Styles of Chief Financial Officers in Higher Education in the Mid-Atlantic Region

    ERIC Educational Resources Information Center

    Benson, Patricia

    2017-01-01

    The purpose of this research was to explore the factors that contribute to a chief financial officer's (CFO) success and demise within a higher education setting. Relatively little attention has been given to the study of leadership in educational institutions (Vroom, 1983). Leadership defines what the future should look like, aligns people with…

  19. Aligning Human Resource Development with the Strategic Priorities of Healthcare Organizations: The CFO Perspective

    ERIC Educational Resources Information Center

    Smith, Carla Breedlove

    2013-01-01

    The purpose of this qualitative study was to gain an understanding of how human resource development (HRD) can align more closely with the healthcare system's strategic priorities from the perspective of chief financial officers (CFOs). Five common themes emerged: (a) training is well aligned to the strategic priority to optimize clinical…

  20. 77 FR 43127 - Further Amendment to Memorandum Describing Authority and Assigned Responsibilities of the General...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-23

    ... functions. The revisions are being adopted in order to establish an Office of the Chief Financial Officer... Chief Financial Officer (``CFO''), who will jointly report to the General Counsel and the Chairman of..., the Chief Information Officer and the Chief Financial Officer. Authority: Sections 3, 4, 6, and 10 of...

  1. Health care capital market and product market constraints and the role of the chief financial officer.

    PubMed

    Wheeler, J R; Smith, D G

    2001-01-01

    To understand better the financial management practices and strategies of modern health care organizations, we conducted interviews with chief financial officers (CFOs) of several leading health care systems. The constraints imposed on health care systems by both capital and product markets has made the role of the CFO a challenge.

  2. Moving from CFO to COO.

    PubMed

    Williams, Jeni

    2012-08-01

    Strategies for positioning yourself for the role of COO or chief administrative officer include the following: Learn more than just the financial aspects of running a hospital or health system. Cultivate deep self awareness of your attributes as a leader. Find ways to accelerate innovation in your organization. Take a fresh look at issues that are continuing challenges for your organization.

  3. Incorporating Sarbanes-Oxley into a College Accounting Curriculum: Lessons Learned

    ERIC Educational Resources Information Center

    Ragan, Joseph M.; Rizman, Brian J.; Gregory, Jonathan T.

    2007-01-01

    This paper attempts to identify the ways and give examples of how Sarbanes-Oxley compliance can be taught in real time using the SAP R/3 system and the many lessons derived from the experience. The Sarbanes-Oxley Act significantly impacts CEO's, CFO's and public accountants. It also applies to all levels of management. Organizations and their…

  4. 49 CFR 1.34 - Delegations to the Assistant Secretary for Budget and Programs and Chief Financial Officer.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... (ESC) regarding all financial management activities conducted by ESC and financial systems operated by... day-to-day operating management responsibility over the Office of Budget and Program Performance, the Office of Financial Management, and the Office of the CFO for the Office of the Secretary. (c) Direct and...

  5. 49 CFR 1.34 - Delegations to the Assistant Secretary for Budget and Programs and Chief Financial Officer.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... (ESC) regarding all financial management activities conducted by ESC and financial systems operated by... day-to-day operating management responsibility over the Office of Budget and Program Performance, the Office of Financial Management, and the Office of the CFO for the Office of the Secretary. (c) Direct and...

  6. 49 CFR 1.34 - Delegations to the Assistant Secretary for Budget and Programs and Chief Financial Officer.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... (ESC) regarding all financial management activities conducted by ESC and financial systems operated by... day-to-day operating management responsibility over the Office of Budget and Program Performance, the Office of Financial Management, and the Office of the CFO for the Office of the Secretary. (c) Direct and...

  7. The CFO: a better paid, better prepared executive.

    PubMed

    Gauss, J W

    1989-07-01

    The average senior financial executive in a healthcare organization is a 41-year-old man who has been in his position for 6.1 years. The executive, who usually has the title chief financial officer, earns $62,600 a year and desires to advance to a higher position of responsibility. A new national survey provides a detailed profile of the position.

  8. College CFO's Outpace Other Leaders in Pay Raises: Business Leaders Got 13.8% Median Increase at Private Institutions

    ERIC Educational Resources Information Center

    June, Audrey Williams

    2007-01-01

    Chief financial officers at the nation's private colleges have bigger workloads than ever before, and in return, many are taking home much larger paychecks. A "Chronicle" survey of 103 private doctoral institutions shows that between 2003 and 2005, the median compensation package for the top financial position, which includes such titles as vice…

  9. Clipped Random Wave Morphologies and the Analysis of the SAXS of an Ionomer Formed by Copolymerization of Tetrafluoroethylene and CF[subscript 2]=CFO(CF[subscript 2])[subscript 4]SO[subscript 3]H

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aieta, Niccolo V.; Stanis, Ronald J.; Horan, James L.

    Using SAXS data, the microstructure of the ionomer formed by copolymerization of tetrafluoroethylene and CF{sub 2}=CFO(CF{sub 2}){sub 4}SO{sub 3}H films has been approached by two methods: a numerical method (the unified fit approach) utilizing a simple model of spherical scattering objects to determine the radius of gyration of different scattering features of the ionomer films and by a graphical method, the clipped random wave approach (CRW), using the scattering data and a porosity parameter to generate a random wave which is clipped to produce a real-space image of the microstructure. We studied films with EW of 733, 825, 900, andmore » 1082 in both the as-cast and annealed 'dry' and boiled 'wet' states. The results of the two data analysis techniques are in good size agreement with each other. In addition, the CRW model show striking similarities to the structure proposed in a recent dissipative particle dynamic models. This has been the first time to our knowledge that the CRW technique has been applied to a PFSA type ionomer.« less

  10. Electroforming free controlled bipolar resistive switching in Al/CoFe2O4/FTO device with self-compliance effect

    NASA Astrophysics Data System (ADS)

    Munjal, Sandeep; Khare, Neeraj

    2018-02-01

    Controlled bipolar resistive switching (BRS) has been observed in nanostructured CoFe2O4 (CFO) films using an Al (aluminum)/CoFe2O4/FTO (fluorine-doped tin oxide) device. The fabricated device shows electroforming-free uniform BRS with two clearly distinguished and stable resistance states without any application of compliance current, with a resistance ratio of the high resistance state (HRS) and the low resistance state (LRS) of >102. Small switching voltage (<1 volt) and lower current in both the resistance states confirm the fabrication of a low power consumption device. In the LRS, the conduction mechanism was found to be Ohmic in nature, while the high-resistance state (HRS/OFF state) was governed by the space charge-limited conduction mechanism, which indicates the presence of an interfacial layer with an imperfect microstructure near the top Al/CFO interface. The device shows nonvolatile behavior with good endurance properties, an acceptable resistance ratio, uniform resistive switching due to stable, less random filament formation/rupture, and a control over the resistive switching properties by choosing different stop voltages, which makes the device suitable for its application in future nonvolatile resistive random access memory.

  11. Magnetoelectric coupling in multiferroic BaTiO3-CoFe2O4 composite nanofibers via electrospinning

    NASA Astrophysics Data System (ADS)

    Fu, Bi; Lu, Ruie; Gao, Kun; Yang, Yaodong; Wang, Yaping

    2015-07-01

    Magnetoelectric (ME) coupling in Pb-based multiferroic composites has been widely investigated due to the excellent piezoelectric property of lead zirconate titanate (PZT). In this letter, we report a strategy to create a hybrid Pb-free ferroelectric and ferromagnetic material and detect its ME coupling at the nanoscale. Hybrid Pb-free multiferroic BaTiO3-CoFe2O4 (BTO-CFO) composite nanofibers (NFs) were generated by sol-gel electrospinning. The perovskite structure of BTO and the spinel structure of CFO nanograins were homogenously distributed in the composite NFs and verified by bright-field transmission electron microscopy observations along the perovskite [111] zone axis. Multiferroicity was confirmed by amplitude-voltage butterfly curves and magnetic hysteresis loops. ME coupling was observed in terms of a singularity on a dM/dT curve at the ferroelectric Curie temperature (TC) of BaTiO3. The lateral ME coefficient was investigated by the evolution of the piezoresponse under an external magnetic field of 1000 Oe and was estimated to be α31 =0.78× 104 \\text{mV cm}-1 \\text{Oe}-1 . These findings could enable the creation of nanoscale Pb-free multiferroic composite devices.

  12. Crosslinking reactions of 4-amino-6-oxo-2-vinylpyrimidine with guanine derivatives and structural analysis of the adducts

    PubMed Central

    Kusano, Shuhei; Ishiyama, Shogo; Lam, Sik Lok; Mashima, Tsukasa; Katahira, Masato; Miyamoto, Kengo; Aida, Misako; Nagatsugi, Fumi

    2015-01-01

    DNA interstrand crosslinks (ICLs) are the primary mechanism for the cytotoxic activity of many clinical anticancer drugs, and numerous strategies for forming ICLs have been developed. One such method is using crosslink-forming oligonucleotides (CFOs). In this study, we designed a 4-amino-6-oxo-2-vinylpyrimidine (AOVP) derivative with an acyclic spacer to react selectively with guanine. The AOVP CFO exhibited selective crosslinking reactivity with guanine and thymine in DNA, and with guanine in RNA. These crosslinking reactions with guanine were accelerated in the presence of CoCl2, NiCl2, ZnCl2 and MnCl2. In addition, we demonstrated that the AOVP CFO was reactive toward 8-oxoguanine opposite AOVP in the duplex DNA. The structural analysis of each guanine and 8-oxoguanine adduct in the duplex DNA was investigated by high-resolution NMR. The results suggested that AOVP reacts at the N2 amine in guanine and at the N1 or N2 amines in 8-oxoguanine in the duplex DNA. This study demonstrated the first direct determination of the adduct structure in duplex DNA without enzyme digestion. PMID:26245348

  13. Investigations on structural and multiferroic properties of artificially engineered lead zirconate titanate-cobalt iron oxide layered nanostructures

    NASA Astrophysics Data System (ADS)

    Ortega Achury, Nora Patricia

    Mutiferroics are a novel class of next generation multifunctional materials, which display simultaneous magnetic, electric, and ferroelastic ordering, have drawn increasing interest due to their multi-functionality for a variety of device applications. Since, very rare single phase materials exist in nature this kind of properties, an intensive research activity is being pursued towards the development of new engineered materials with strong magneto-electric (ME) coupling. In the present investigation, we have fabricated polycrystalline and highly oriented PbZr0.53,Ti0.47O3--CoFe 2O4 (PZT/CFO) artificially multilayers (MLs) engineered nanostructures thin films which were grown on Pt/TiO2/SiO2/Si and La 0.5Sr0.5CoO3 (LSCO) coated (001) MgO substrates respectively, using the pulsed laser deposition technique. The effect of various PZT/CFO sandwich configurations having 3, 5, and 9 layers, while maintaining similar total PZT and CFO thickness, has been systematically investigated. The first part of this thesis is devoted to the analysis of structural and microstructure properties of the PZT/CFO MLs. X-ray diffraction (XRD) and micro Raman analysis revealed that PZT and CFO were in the perovskite and spinel phases respectively in the all layered nanostructure, without any intermediate phase. The TEM and STEM line scan of the ML thin films showed that the layered structure was maintained with little inter-diffusion near the interfaces at nano-metric scale without any impurity phase, however better interface was observed in highly oriented films. Second part of this dissertation was dedicated to study of the dielectric, impedance, modulus, and conductivity spectroscopies. These measurements were carried out over a wide range of temperatures (100 K to 600 K) and frequencies (100 Hz to 1 MHz) to investigate the grain and grain boundary effects on electrical properties of MLs. The temperature dependent dielectric and loss tangent illustrated step-like behavior and relaxation peaks near the step-up characteristic respectively. The Cole-Cole plots indicate that the most of the dielectric response came from the bulk (grains) MLs below 300 K, whereas grain boundaries and electrode-MLs effects prominent at elevated temperature. The dielectric loss relaxation peaks shifted to higher frequency side with increase in temperature, finally above 300 K, it went out experimental frequency window. Our Cole-Cole fitting of dielectric loss spectra indicated marked deviation from the ideal Debye type of relaxation which is more prominent at elevated temperature. Master modulus spectra support the observation from impedance spectra, it also indicate that the difference between C g and Cgb are higher compared to polycrystalline MLs indicating less effects of grain boundary in highly oriented MLs. We have explained these electrical properties of MLs by Maxwell-Wagner type contributions arising from the interfacial charge at the interface of the MLs structure. Three different types of frequency dependent conduction process were observed at elevated temperature (>300 K), which well fitted with the double power law, sigma(o) = sigma(0) + A 1on1 + A 2on2, it indicates conduction at: Low frequency (<1 kHz) may be due to long range ordering (frequency independent), mid frequency (<10 kHz) may be due to short range hopping, and high frequency (<1 MHz) due to the localized relaxation hopping mechanism. The last part of the thesis is devoted to the study of the multiferroic and magnetoelectric properties of the ML thin films. Both polycrystalline and highly oriented films showed well saturated ferroelectric and ferromagnetic hysteresis loops at room temperature. Temperature dependence of ferroelectric properties showed that polarization slowly decreases from 300 K to 200 K, with complete collapse of polarization at ˜ 100 K, but there was complete recovery of the polarization during heating, which was repeatable over many different experiments. At the same time, in the same temperature interval the remanent magnetization of the MLs showed slow enhancement in the magnitude till 200 K with three fold increase at 100 K compared to room temperature. This enhancement in remanent magnetization and decrease in remanent ferroelectric polarization on lowering the temperature indicate temperature dependent dynamic switching of ferroelectric polarization. Frequencies and temperatures dependence of the ferroelectric hysteresis loop showed weak frequency dependence for highly oriented MLs, while significant dependence was observed for polycrystalline MLs. The fatigue test showed almost 0-20% deterioration in polarization. The fatigue and strong temperature and frequency dependent magneto-electric coupling suggest the utility of MLs for Dynamic Magneto-Electric Random Access Memory (DMERAM) and magnetic field sensor devices.

  14. Reactive oxygen species' role in endothelial dysfunction by electron paramagnetic resonance

    NASA Astrophysics Data System (ADS)

    Wassall, Cynthia D.

    The endothelium is a single layer of cells lining the arteries and is involved in many physiological reactions which are responsible for vascular tone. Free radicals are important participants in these chemical reactions in the endothelium. Here we quantify free radicals, ex vivo, in biological tissue with continuous wave electron paramagnetic resonance (EPR). In all of the experiments in this thesis, we use a novel EPR spin trapping technique that has been developed for tissue segments. EPR spin trapping is often considered the 'gold standard' in reactive oxygen species (ROS) detection because of its sensitivity and non-invasive nature. In all experiments, tissue was placed in physiological saline solution with 190-mM PBN (N-tert -butyl-α-phenylnitrone), 10% by volume dimethyl-sulphoxide (DMSO) for cryopreservation, and incubated in the dark for between 30 minutes up to 2 hours at 37°C while gently being stirred. Tissue and supernatant were then loaded into a syringe and frozen at -80°C until EPR analysis. In our experiments, the EPR spectra were normalized with respect to tissue volume. Conducting experiments at liquid nitrogen temperature leads to some experimental advantages. The freezing of the spin adducts renders them stable over a longer period, which allows ample time to analyze tissue samples for ROS. The dielectric constant of ice is greatly reduced over its liquid counterpart; this property of water enables larger sample volumes to be inserted into the EPR cavity without overloading it and leads to enhanced signal detection. Due to Maxwell-Boltzmann statistics, the population difference goes up as the temperature goes down, so this phenomenon enhances the signal intensity as well. With the 'gold standard' assertion in mind, we investigated whether slicing tissue to assay ROS that is commonly used in fluorescence experiments will show more free radical generation than tissue of a similar volume that remains unsliced. Sliced tissue exhibited a 76% increase in ROS generation; this implies that higher ROS concentrations in sliced tissue indicate extraneous ROS generation not associated with the ROS stimulus of interest. We also investigated the role of ROS in chronic flow overload (CFO). Elevation of shear stress that increases production of vascular ROS has not been well investigated. We hypothesize that CFO increases ROS production mediated in part by NADPH oxidase, which leads to endothelial dysfunction. ROS production increased threefold in response to CFO. The endothelium dependent vasorelaxation was compromised in the CFO group. Treatment with apocynin significantly reduced ROS production in the vessel wall, preserved endothelial function, and inhibited expressions of p22/p47phox and NOX2/NOX4. The present data implicate NADPH oxidase produced ROS and eNOS uncoupling in endothelial dysfunction at 1 wk of CFO. In further work, a swine right ventricular hypertrophy (RVH) model induced by pulmonary artery (PA) banding was used to study right coronary artery (RCA) endothelial function and ROS level. Endothelial function was compromised in RCA of RVH as attributed to insufficient endothelial nitric oxide synthase cofactor tetrahydrobiopterin. In conclusion, stretch due to outward remodeling of RCA during RVH (at constant wall shear stress), similar to vessel stretch in hypertension, appears to induce ROS elevation, endothelial dysfunction, and an increase in basal tone. Finally, although hypertension-induced vascular stiffness and dysfunction are well established in patients and animal models, we hypothesize that stretch or distension due to hypertension and outward expansion is the cause of endothelial dysfunction mediated by angiotensin II type 1 (AT1) receptor in coronary arteries. The expression and activation of AT1 receptor and the production of ROS were up regulated and endothelial function deteriorated in the RCA. The acute inhibition of AT1 receptor and NADPH oxidase partially restored the endothelial function. Stretch or distension activates the AT1 receptor which mediates ROS production; this collectively leads to endothelial dysfunction in coronary arteries.

  15. Funding innovation: Moving the business forward.

    PubMed

    Henry, Gary F

    2016-11-01

    Gary F. Henry is the Principal Consultant of G F Henry and Associates, a management consulting firm based in Charlottesville, Virginia. Mr. Henry has more than 30 years of distinguished experience, including CEO, CFO and COO roles in both established and start-up companies. Gary was named an Ernst & Young Virginia Entrepreneur of the Year in 2001. Copyright © 2016 Elsevier Inc. All rights reserved.

  16. 77 FR 27443 - Quick Path Information Disclosure Statement (QPIDS) Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-10

    ... associated with this pilot program must be filed via the USPTO's Electronic Filing System-Web (EFS-Web), and... forth in 37 CFR 1.97(e), with the IDS fee set forth in 37 CFR 1.17(p); (3) a Web-based ePetition to... at http://www.uspto.gov/about/offices/cfo/finance/Dep_Account_Rules_and_Info.jsp . 3. Web-Based e...

  17. Predictive Flow Control to Minimize Convective Time Delays

    DTIC Science & Technology

    2013-08-19

    simulation. The CFO solver used is Cobalt, an unstructured finite-volume code developed for the solution of the compress- ible Navier-Stokes...cell-centered fin ite volume approach applicable to arbitrary cell topologies (e.g, hexahedra, prisms, tetrahedra). The spatial operator uses a Riemann ... solver , least squares gradient calculations using QR factorizati on to provide second order accuracy in space. A point implicit method using

  18. Genetic and Biochemical Diversity among Isolates of Paenibacillus alvei Cultured from Australian Honeybee (Apis mellifera) Colonies

    PubMed Central

    Djordjevic, Steven P.; Forbes, Wendy A.; Smith, Lisa A.; Hornitzky, Michael A.

    2000-01-01

    Twenty-five unique CfoI-generated whole-cell DNA profiles were identified in a study of 30 Paenibacillus alvei isolates cultured from honey and diseased larvae collected from honeybee (Apis mellifera) colonies in geographically diverse areas in Australia. The fingerprint patterns were highly variable and readily discernible from one another, which highlighted the potential of this method for tracing the movement of isolates in epidemiological studies. 16S rRNA gene fragments (length, 1,416 bp) for all 30 isolates were enzymatically amplified by PCR and subjected to restriction analysis with DraI, HinfI, CfoI, AluI, FokI, and RsaI. With each enzyme the restriction profiles of the 16S rRNA genes from all 30 isolates were identical (one restriction fragment length polymorphism [RFLP] was observed in the HinfI profile of the 16S rRNA gene from isolate 17), which confirmed that the isolates belonged to the same species. The restriction profiles generated by using DraI, FokI, and HinfI differentiated P. alvei from the phylogenetically closely related species Paenibacillus macerans and Paenibacillus macquariensis. Alveolysin gene fragments (length, 1,555 bp) were enzymatically amplified from some of the P. alvei isolates (19 of 30 isolates), and RFLP were detected by using the enzymes CfoI, Sau3AI, and RsaI. Extrachromosomal DNA ranging in size from 1 to 10 kb was detected in 17 of 30 (57%) P. alvei whole-cell DNA profiles. Extensive biochemical heterogeneity was observed among the 28 P. alvei isolates examined with the API 50CHB system. All of these isolates were catalase, oxidase, and Voges-Proskauer positive and nitrate negative, and all produced acid when glycerol, esculin, and maltose were added. The isolates produced variable results for 16 of the 49 biochemical tests; negative reactions were recorded in the remaining 30 assays. The genetic and biochemical heterogeneity in P. alvei isolates may be a reflection of adaptation to the special habitats in which they originated. PMID:10698777

  19. Effect of Molybdenum Incorporation on the Structure and Magnetic Properties of Cobalt Ferrite

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orozco, C.; Melendez, A.; Manadhar, S.

    Here, we report on the effect of molybdenum (Mo) incorporation on the crystal structure, surface morphology, Mo chemical valence state, and magnetic properties of cobalt ferrite (CoFe 2O 4, referred to CFO). Molybdenum incorporated cobalt ferrite (CoFe 2–xMo xO 4, referred to CFMO) ceramics were prepared by the conventional solid-state reaction method by varying the Mo concentration in the range of x = 0.0–0.3. X-ray diffraction studies indicate that the CFMO materials crystallize in inverse spinel cubic phase. Molybdenum incorporation induced lattice parameter increase from 8.322 to 8.343 Å coupled with a significant increase in density from 5.4 to 5.7more » g/cm 3 was evident in structural analyses. Scanning electron microscopy imaging analyses indicate that the Mo incorporation induces agglomeration of particles leading to larger particle size with increasing x(Mo) values. Detailed X-ray photoelectron spectroscopic (XPS) analyses indicate the increasing Mo content with increasing x from 0.0 to 0.3. XPS confirms that the chemistry of Mo is complex in these CFMO compounds; Mo ions exist in the lower oxidation state (Mo 4+) for higher x while in a mixed chemical valence state (Mo 4+, Mo 5+, Mo 6+) for lower x values. From the temperature-dependent magnetization, the samples show ferrimagnetic behavior including the pristine CFO. From the isothermal magnetization measurements, we find almost 2-fold decrease in coercive field ( H c) from 2143 to 1145 Oe with the increase in Mo doping up to 30%. This doping-dependent H c is consistently observed at all the temperatures measured (4, 100, 200, and 300 K). Furthermore, the saturation magnetization estimated at 4 K and at 1.5 T (from M–H loops) goes through a peak at 92 emu/g (at 15% Mo doping) from 81 emu/g (pristine CFO), and starts decreasing to 79 emu/g (at 30% Mo doping). The results demonstrate that the crystal structure, microstructure, and magnetic properties can be tuned by controlling the Mo-content in the CFMO materials.« less

  20. Effect of Molybdenum Incorporation on the Structure and Magnetic Properties of Cobalt Ferrite

    DOE PAGES

    Orozco, C.; Melendez, A.; Manadhar, S.; ...

    2017-09-26

    Here, we report on the effect of molybdenum (Mo) incorporation on the crystal structure, surface morphology, Mo chemical valence state, and magnetic properties of cobalt ferrite (CoFe 2O 4, referred to CFO). Molybdenum incorporated cobalt ferrite (CoFe 2–xMo xO 4, referred to CFMO) ceramics were prepared by the conventional solid-state reaction method by varying the Mo concentration in the range of x = 0.0–0.3. X-ray diffraction studies indicate that the CFMO materials crystallize in inverse spinel cubic phase. Molybdenum incorporation induced lattice parameter increase from 8.322 to 8.343 Å coupled with a significant increase in density from 5.4 to 5.7more » g/cm 3 was evident in structural analyses. Scanning electron microscopy imaging analyses indicate that the Mo incorporation induces agglomeration of particles leading to larger particle size with increasing x(Mo) values. Detailed X-ray photoelectron spectroscopic (XPS) analyses indicate the increasing Mo content with increasing x from 0.0 to 0.3. XPS confirms that the chemistry of Mo is complex in these CFMO compounds; Mo ions exist in the lower oxidation state (Mo 4+) for higher x while in a mixed chemical valence state (Mo 4+, Mo 5+, Mo 6+) for lower x values. From the temperature-dependent magnetization, the samples show ferrimagnetic behavior including the pristine CFO. From the isothermal magnetization measurements, we find almost 2-fold decrease in coercive field ( H c) from 2143 to 1145 Oe with the increase in Mo doping up to 30%. This doping-dependent H c is consistently observed at all the temperatures measured (4, 100, 200, and 300 K). Furthermore, the saturation magnetization estimated at 4 K and at 1.5 T (from M–H loops) goes through a peak at 92 emu/g (at 15% Mo doping) from 81 emu/g (pristine CFO), and starts decreasing to 79 emu/g (at 30% Mo doping). The results demonstrate that the crystal structure, microstructure, and magnetic properties can be tuned by controlling the Mo-content in the CFMO materials.« less

  1. Genetic and biochemical diversity among isolates of Paenibacillus alvei cultured from Australian honeybee (Apis mellifera) colonies.

    PubMed

    Djordjevic, S P; Forbes, W A; Smith, L A; Hornitzky, M A

    2000-03-01

    Twenty-five unique CfoI-generated whole-cell DNA profiles were identified in a study of 30 Paenibacillus alvei isolates cultured from honey and diseased larvae collected from honeybee (Apis mellifera) colonies in geographically diverse areas in Australia. The fingerprint patterns were highly variable and readily discernible from one another, which highlighted the potential of this method for tracing the movement of isolates in epidemiological studies. 16S rRNA gene fragments (length, 1,416 bp) for all 30 isolates were enzymatically amplified by PCR and subjected to restriction analysis with DraI, HinfI, CfoI, AluI, FokI, and RsaI. With each enzyme the restriction profiles of the 16S rRNA genes from all 30 isolates were identical (one restriction fragment length polymorphism [RFLP] was observed in the HinfI profile of the 16S rRNA gene from isolate 17), which confirmed that the isolates belonged to the same species. The restriction profiles generated by using DraI, FokI, and HinfI differentiated P. alvei from the phylogenetically closely related species Paenibacillus macerans and Paenibacillus macquariensis. Alveolysin gene fragments (length, 1, 555 bp) were enzymatically amplified from some of the P. alvei isolates (19 of 30 isolates), and RFLP were detected by using the enzymes CfoI, Sau3AI, and RsaI. Extrachromosomal DNA ranging in size from 1 to 10 kb was detected in 17 of 30 (57%) P. alvei whole-cell DNA profiles. Extensive biochemical heterogeneity was observed among the 28 P. alvei isolates examined with the API 50CHB system. All of these isolates were catalase, oxidase, and Voges-Proskauer positive and nitrate negative, and all produced acid when glycerol, esculin, and maltose were added. The isolates produced variable results for 16 of the 49 biochemical tests; negative reactions were recorded in the remaining 30 assays. The genetic and biochemical heterogeneity in P. alvei isolates may be a reflection of adaptation to the special habitats in which they originated.

  2. The fallacy of financial heuristics.

    PubMed

    Langabeer, James

    2007-01-01

    In turbulent times, the financial policies and decisions about cash and debt make or break hospitals' financial condition. Decisions about whether to continue saving cash or reduce debt burdens are probably the most vital policy decision for the hospital CFO. Unfortunately, my research shows that most administrators are relying on judgment, or best-guess heuristics to address these policy issues. This article explores one of the most common heuristics in health finance-ratios gauging debt and cash on hand. The subject is explored through the research and analysis of over 40 hospitals in a very competitive marketplace-the boroughs of New York City. Analyses of financial strength, through various statistical models, were conducted to explore the linkages between traditional heuristics and long-term economic results. Data were collected for 30 operational and financial indicators. Findings suggest that organizations require different cash-debt positions based on their overall financial health, and that a one-number heuristic does not fit all. Extremely financially constrained hospitals (those approaching bankruptcy conditions) should be building free cash flow and minimizing debt service, while financially secure hospitals need to minimize cash on hand while reducing debt. If all hospitals continue to try to meet an arbitrary days of cash heuristic, this simplification could cripple an organization. A much more effective metric requires each organization to model decisions more comprehensively.

  3. Stem revenue losses with effective CDM management.

    PubMed

    Alwell, Michael

    2003-09-01

    Effective CDM management not only minimizes revenue losses due to denied claims, but also helps eliminate administrative costs associated with correcting coding errors. Accountability for CDM management should be assigned to a single individual, who ideally reports to the CFO or high-level finance director. If your organization is prone to making billing errors due to CDM deficiencies, you should consider purchasing CDM software to help you manage your CDM.

  4. Creating a market strategy for 'brand loyalty'.

    PubMed

    Hutter, G M

    1991-10-01

    A healthcare organization's financial well-being stems from sound strategic planning, which increasingly requires the merger of marketing intelligence and financial management expertise. As a participant in strategic planning, a hospital's chief financial officer (CFO) ensures that plans achieve organizational goals for growth and return on investment. CFOs can apply their analytical and measurement skills to help determine areas of strength and potential growth, then match those services to market segments.

  5. Advancing Underwater Acoustic Communication for Autonomous Distributed Networks via Sparse Channel Sensing, Coding, and Navigation Support

    DTIC Science & Technology

    2011-09-30

    channel interference mitigation for underwater acoustic MIMO - OFDM . 3) Turbo equalization for OFDM modulated physical layer network coding. 4) Blind CFO...Underwater Acoustic MIMO - OFDM . MIMO - OFDM has been actively studied for high data rate communications over the bandwidthlimited underwater acoustic...with the cochannel interference (CCI) due to parallel transmissions in MIMO - OFDM . Our proposed receiver has the following components: 1

  6. Access to capital: implications for hospital consolidation.

    PubMed

    Grauman, Daniel M; Harris, John M; Martin, Christine

    2010-04-01

    Recent economic challenges have left many independent hospitals and their boards concerned about long-term viability of their organizations as stand-alone facilities. The CFO's role should be to facilitate a candid, objective assessment of the organization's ability to continue to go it alone. Key indicators that should be considered in such an assessment include patient volume, degree of physician alignment, profitability, current debt burden, cash, available capital versus capital requirements, and credit rating changes.

  7. Bottom-up multiferroic nanostructures

    NASA Astrophysics Data System (ADS)

    Ren, Shenqiang

    Multiferroic and especially magnetoelectric (ME) nanocomposites have received extensive attention due to their potential applications in spintronics, information storage and logic devices. The extrinsic ME coupling in composites is strain mediated via the interface between the piezoelectric and magnetostrictive components. However, the design and synthesis of controlled nanostructures with engineering enhanced coupling remain a significant challenge. The purpose of this thesis is to create nanostructures with very large interface densities and unique connectivities of the two phases in a controlled manner. Using inorganic solid state phase transformations and organic block copolymer self assembly methodologies, we present novel self assembly "bottom-up" techniques as a general protocol for the nanofabrication of multifunctional devices. First, Lead-Zirconium-Titanate/Nickel-Ferrite (PZT/NFO) vertical multilamellar nanostructures have been produced by crystallizing and decomposing a gel in a magnetic field below the Curie temperature of NFO. The ensuing microstructure is nanoscopically periodic and anisotropic. The wavelength of the PZT/NFO alternation, 25 nm, agrees within a factor of two with the theoretically estimated value. The macroscopic ferromagnetic and magnetoelectric responses correspond qualitatively and semi-quantitatively to the features of the nanostructure. The maximum of the field dependent magnetoelectric susceptibility equals 1.8 V/cm Oe. Second, a magnetoelectric composite with controlled nanostructures is synthesized using co-assembly of two inorganic precursors with a block copolymer. This solution processed material consists of hexagonally arranged ferromagnetic cobalt ferrite (CFO) nano-cylinders within a matrix of ferroelectric Lead-Zirconium-Titanate (PZT). The initial magnetic permeability of the self-assembled CFO/PZT nanocomposite changes by a factor of 5 through the application of 2.5 V. This work may have significant impact on the development of novel memory or logic devices through self assembly techniques. It also demonstrates a universal two-phase hard template application. Last, solid-state self assembly had been used recently to form pseudoperiodic chessboard-like nanoscale morphologies in a series of chemically homogeneous complex oxide systems. We improved on this approach by synthesizing a spontaneously phase separated nanolamellar BaTiO3-CoFe2O4 bi-crystal. The superlattice is magnetoelectric with a frequency dependent coupling. The BaTiO3 component is a ferroelectric relaxor with a Vogel-Fulcher temperature of 311 K. Since the material can be produced by standard ceramic processing methods, the discovery represents great potential for magnetoelectric devices.

  8. Financial Management: Extending the Financial Statements Audit Requirement of the CFO Act to Additional Federal Agencies

    DTIC Science & Technology

    2002-05-14

    Defense Nuclear Facilities Safety Board has balance-sheet-only audits every 3 to 5 years, most recently for fiscal year 1997. It did not prepare fiscal...associated with the agency’s operations were the most important factors to Have had financial statements audits Defense Nuclear Facilities Safety...audits, the International Trade Commission and the Defense Nuclear Facilities Safety Board, did not have financial statements audits for fiscal year

  9. Nanoscale Engineering of Multiferroic Hybrid Composites for Micro- and Nano-scale Devices

    DTIC Science & Technology

    2012-09-14

    saturation field of the nickel ferrite layer [7]. The ME coupling dE coefficient is conventionally defined as am =— (5), where E and H denote the electric...of Co- ferrite in granular composites measured at different electric fields Voltage(V) 0 To realize the first objective a series of NBT-CFO...sample with intermediate (30%) content of Co- ferrite [publications 3,5]. The effect of the electric field on ferromagnetic resonance curves is

  10. Distinct differentiation of closely related species of Bacillus subtilis group with industrial importance.

    PubMed

    Jeyaram, Kumaraswamy; Romi, Wahengbam; Singh, Thangjam Anand; Adewumi, Gbenga Adedeji; Basanti, Khundrakpam; Oguntoyinbo, Folarin Anthony

    2011-11-01

    PCR amplification of 16S rRNA gene by universal primers followed by restriction fragment length polymorphism analysis using RsaI, CfoI and HinfI endonucleases, distinctly differentiated closely related Bacillus amyloliquefaciens, Bacillus licheniformis and Bacillus pumilus from Bacillus subtilis sensu stricto. This simple, economical, rapid and reliable protocol could be an alternative to misleading phenotype-based grouping of these closely related species. Copyright © 2011 Elsevier B.V. All rights reserved.

  11. Where Hospital Boards Often Fail: Auditing Leadership Performance.

    PubMed

    Friedman, Susan Y; Rabkin, Mitchell T

    2018-03-06

    Hospital boards address quality of care and patient safety as well as financial performance through long-accepted practices. By contrast, a hospital's administrative operations and institutional culture are not usually subject to such detailed scrutiny. Yet, despite a healthy bottom line and patient commendations, hospital personnel can be underperforming, burdened with poor morale, and suffering from less than optimal leadership, unwarranted inefficiency, and ethically questionable management practices. The resulting employee dissatisfaction or disengagement can affect productivity, quality, turnover, innovation, patient and donor attraction and retention, public image, etc., and can be missed by an unsuspecting board. While boards do not scrutinize most administrative operations, they do examine financial performance, through review of the independent auditor's Management Letter. Designed to help the chief financial officer (CFO) improve the efficiency and integrity of the hospital's financial systems and to recommend improvements to the board for implementation (rather than to assess the CFO's performance), the Management Letter has no equal with respect to a comparable evaluation of the hospital's administrative performance and workplace culture. When, as is often the case, there is only superficial review of the chief executive officer, the board has no source of analysis or recommendations to improve the hospital's institutional environment. In this Invited Commentary, the authors suggest a methodology to provide such a review, leading to a Leadership Letter, and discuss its utility for both non-profit and for-profit organizations.

  12. Remarkably High Stability of Late Actinide Dioxide Cations: Extending Chemistry to Pentavalent Berkelium and Californium.

    PubMed

    Dau, Phuong D; Vasiliu, Monica; Peterson, Kirk A; Dixon, David A; Gibson, John K

    2017-12-06

    Actinyl chemistry is extended beyond Cm to BkO 2 + and CfO 2 + through transfer of an O atom from NO 2 to BkO + or CfO + , establishing a surprisingly high lower limit of 73 kcal mol -1 for the dissociation energies, D[O-(BkO + )] and D[O-(CfO + )]. CCSD(T) computations are in accord with the observed reactions, and characterize the newly observed dioxide ions as linear pentavalent actinyls; these being the first Bk and Cf species with oxidation states above IV. Computations of actinide dioxide cations AnO 2 + for An=Pa to Lr reveal an unexpected minimum for D[O-(CmO + )]. For CmO 2 + , and AnO 2 + beyond EsO 2 + , the most stable structure has side-on bonded η 2 -(O 2 ), as An III peroxides for An=Cm and Lr, and as An II superoxides for An=Fm, Md, and No. It is predicted that the most stable structure of EsO 2 + is linear [O=Es V =O] + , einsteinyl, and that FmO 2 + and MdO 2 + , like CmO 2 + , also have actinyl(V) structures as local energy minima. The results expand actinide oxidation state chemistry, the realm of the distinctive actinyl moiety, and the non-periodic character towards the end of the periodic table. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. Association of polymorphisms in nicotinic acetylcholine receptor alpha 4 subunit gene (CHRNA4), mu-opioid receptor gene (OPRM1), and ethanol-metabolizing enzyme genes with alcoholism in Korean patients.

    PubMed

    Kim, Soon Ae; Kim, Jong-Woo; Song, Ji-Young; Park, Sunny; Lee, Hee Jae; Chung, Joo-Ho

    2004-01-01

    Findings obtained from several studies indicate that ethanol enhances the activity of alpha4beta2 neuronal nicotinic acetylcholine receptor and support the possibility that a polymorphism of the nicotinic acetylcholine receptor alpha4 subunit gene (CHRNA4) modulates enhancement of nicotinic receptor function by ethanol. To identify the association between the CfoI polymorphism of the CHRNA4 and alcoholism, we examined distribution of genotypes and allele frequencies in Korean patients diagnosed with alcoholism (n = 127) and Korean control subjects without alcoholism (n = 185) with polymerase chain reaction-restriction fragment length polymorphism methods. We were able to detect the association between the CfoI polymorphism of the CHRNA4 and alcoholism in Korean patients (genotype P = .023; allele frequency P = .047). The genotypes and allele frequencies of known polymorphisms in other alcoholism candidate genes, such as alcohol metabolism-related genes [alcohol dehydrogenase 2 (ADH2), aldehyde dehydrogenase 2 (ALDH2), alcohol dehydrogenase 3 (ADH3), and cytochrome P450 2E1 (CYP2E1)] and mu-opioid receptor gene (OPRM1), were studied. The polymorphisms of ADH2, ALDH2, and CYP2E1 were significantly different in Korean patients with alcoholism and Korean control subjects without alcoholism, but ADH3 and OPRM1 did not differ between the two groups.

  14. Stockholder expectations should temper aggressive strategic planning.

    PubMed

    Lowell, W

    1995-04-14

    Too often, healthcare organizations make strategic plans with performance targets that don't justify the company's stock price. The result: They never really know if those plans will create value--even if they are fully achieved. In the race to provide superior returns to shareholders, companies must instead keep one eye on the competitive marketplace and the other on equity market expectations. In this article, Wayne Lowell, CFO of PacifiCare Health System, explains how his organization learned to do just that.

  15. U.S. Government Financial Statements: FY 2000 Reporting Underscores the Need to Accelerate Federal Financial Management Reform

    DTIC Science & Technology

    2001-03-30

    I am pleased to be here today to discuss our report on the U.S. government’s consolidated financial statements for fiscal year 2000. Both the... consolidated financial statements and our report are included in the Fiscal Year 2000 Financial Report of the United States Government (Financial Report...CFO Act agencies), beginning with fiscal year 1996, and consolidated financial statements for the U.S. government, beginning with fiscal year 1997.

  16. 2014 Summer Series - Lewis Braxton III - Lessons Learned Enroute to Becoming Deputy Center Director

    NASA Image and Video Library

    2014-07-01

    This talk will take you on a journey of Mr. Lewis Braxton's successful career through the lens of an African American. You will gain insights to his success as he shares the wisdom he gained through personal and professional experiences. He will walk you through his early childhood, education, NASA internship at Dryden Flight Research Center (DFRC), and his transition to Ames as he developed and matured into a senior leader. Mr. Braxton will also provide a special focus on his CFO and Deputy Director roles at NASA Ames.

  17. Financial Audit Guide: Auditing the Statement of Budgetary Resources

    DTIC Science & Technology

    2001-12-01

    financial reporting should assist in fulfilling the government’s duty to be publicly accountable for moneys raised from the public and for their expenditure in accordance with applicable laws that establish the budget and other related laws and regulations. As a means to help achieve this objective, beginning with fiscal year 1998, executive agencies subject to the Chief Financial Officers (CFO) Act of 1990, as expanded by the Government Management Reform Act of 1994, were each required to prepare and submit for audit a Statement of Budgetary Resources (SBR) in

  18. Engineering Nanoscale Multiferroic Composites for Memory Applications with Atomic Layer Deposition of Pb(ZrxTi1-x)O3 Thin Films

    NASA Astrophysics Data System (ADS)

    Chien, Diana

    This work focuses on the development of atomic layer deposition (ALD) for lead zirconate titanate, Pb(ZrxTi1-x)O 3 (PZT). Leveraging the surface-reaction controlled process based on alternating self-limiting surface reactions, PZT can be synthesized not only with elemental precision to realize the desired composition (Zr/Ti = 52/48) but also with outstanding conformality. The latter enables the integration of PZT with a ferromagnetic phase to realize multiferroism (MF) and magnetoelectric (ME) effect. Since PZT is one of the best known ferroelectric and piezoelectric materials due the large displacements of the Pb ions at the morphotropic phase boundary, PZT based MF composites could lead to stronger ME coupling through strain coupling at the interface. Specifically, ALD PZT thin films were synthesized by using beta-diketonate metalorganic precursors Pb(TMHD)2, Zr(TMHD)4, and Ti(O.i-Pr) 2(TMHD)2 and H2O. The number of local cycles and global cycles were regulated to achieve the desired stoichiometry and thickness, respectively. ALD of PZT was studied to obtain (100) textured PZT on Pt (111) oriented platinized silicon substrates. In order to attain a highly oriented PZT thin film, a (100) textured PbTiO3 seed layer was required because PZT orientation is governed by nucleation. MF nanocomposites were engineered using ALD PZT thin films to achieve controlled complex nanoscale structures, enabling porosity to be studied as a new additional parameter for nanocomposite architectures to enhance ME effect. Specifically, 3--6 nm-thick ALD PZT thin films were deposited to uniformly coat the walls of mesoporous cobalt ferrite (CFO) template. The PZT/CFO nanocomposites were electrically poled ex-situ and the change in magnetic moment was measured. The inverse magnetoelectric coupling coefficient, a, was determined to be 85.6 Oe-cm/mV. The in-plane results show no significant change in magnetization (1--4%) as a function of electric field, which was expected due to the effect of substrate clamping. The out-of-plane magnetization showed that the mesoporous CFO coated with 3-nm-thick PZT film had a greater saturation magnetization change of 15% compared to 10% for the 6-nm-thick PZT film. This indicates that the flexibility in the partially filled pores enhances the ME coupling. Additionally, ALD PZT films were integrated between MgO and CoFeB layers to fabricate magnetic tunnel junctions (MTJ), which was the first work to demonstrate increased voltage controlled magnetic anisotropy (VCMA) effect in a complete MTJ stack using a high dielectric material within the tunnel barrier and exhibit sizeable tunneling magnetoresistance (TMR) at room temperature. The fabricated PZT MTJs with the MgO/PZT/MgO barrier demonstrated a VCMA coefficient which is ˜40% higher (20 fJ/V-m) than MgO MTJs (14 fJ/V-m) and TMR of more than 50% at room temperature, comparable to that of the MgO MTJs. The enhanced VCMA coefficient and sizeable TMR makes PZT MTJs potential candidates for future voltage-controlled, ultralow-power magnetic random access memory devices. ALD enables the growth of conformal ultra-thin PZT films, which can then be integrated to engineer nanoscale multiferroic composites for various applications.

  19. Carrier frequency offset estimation for an acoustic-electric channel using 16 QAM modulation

    NASA Astrophysics Data System (ADS)

    Cunningham, Michael T.; Anderson, Leonard A.; Wilt, Kyle R.; Chakraborty, Soumya; Saulnier, Gary J.; Scarton, Henry A.

    2016-05-01

    Acoustic-electric channels can be used to send data through metallic barriers, enabling communications where electromagnetic signals are ineffective. This paper considers an acoustic-electric channel that is formed by mounting piezoelectric transducers on metallic barriers that are separated by a thin water layer. The transducers are coupled to the barriers using epoxy and the barriers are positioned to axially-align the PZTs, maximizing energy transfer efficiency. The electrical signals are converted by the transmitting transducers into acoustic waves, which propagate through the elastic walls and water medium to the receiving transducers. The reverberation of the acoustic signals in these channels can produce multipath distortion with a significant delay spread that introduces inter-symbol interference (ISI) into the received signal. While the multipath effects can be severe, the channel does not change rapidly which makes equalization easier. Here we implement a 16-QAM system on this channel, including a method for obtaining accurate carrier frequency offset (CFO) estimates in the presence of the quasi-static multipath propagation. A raised-power approach is considered but found to suffer from excessive data noise resulting from the ISI. An alternative approach that utilizes a pilot tone burst at the start of a data packet is used for CFO estimation and found to be effective. The autocorrelation method is used to estimate the frequency of the received burst. A real-time prototype of the 16 QAM system that uses a Texas Instruments MSP430 microcontroller-based transmitter and a personal computer-based receiver is presented along with performance results.

  20. Characterization of 3D interconnected microstructural network in mixed ionic and electronic conducting ceramic composites

    NASA Astrophysics Data System (ADS)

    Harris, William M.; Brinkman, Kyle S.; Lin, Ye; Su, Dong; Cocco, Alex P.; Nakajo, Arata; Degostin, Matthew B.; Chen-Wiegart, Yu-Chen Karen; Wang, Jun; Chen, Fanglin; Chu, Yong S.; Chiu, Wilson K. S.

    2014-04-01

    The microstructure and connectivity of the ionic and electronic conductive phases in composite ceramic membranes are directly related to device performance. Transmission electron microscopy (TEM) including chemical mapping combined with X-ray nanotomography (XNT) have been used to characterize the composition and 3-D microstructure of a MIEC composite model system consisting of a Ce0.8Gd0.2O2 (GDC) oxygen ion conductive phase and a CoFe2O4 (CFO) electronic conductive phase. The microstructural data is discussed, including the composition and distribution of an emergent phase which takes the form of isolated and distinct regions. Performance implications are considered with regards to the design of new material systems which evolve under non-equilibrium operating conditions.The microstructure and connectivity of the ionic and electronic conductive phases in composite ceramic membranes are directly related to device performance. Transmission electron microscopy (TEM) including chemical mapping combined with X-ray nanotomography (XNT) have been used to characterize the composition and 3-D microstructure of a MIEC composite model system consisting of a Ce0.8Gd0.2O2 (GDC) oxygen ion conductive phase and a CoFe2O4 (CFO) electronic conductive phase. The microstructural data is discussed, including the composition and distribution of an emergent phase which takes the form of isolated and distinct regions. Performance implications are considered with regards to the design of new material systems which evolve under non-equilibrium operating conditions. Electronic supplementary information (ESI) available. See DOI: 10.1039/c3nr06684c

  1. Alaska Power Administration combined financial statements, schedules and supplemental reports, September 30, 1995 and 1994

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1995-12-31

    This report presents the results of the independent certified public accountant`s audit of the Department of Energy`s Alaska Power Administration`s (Alaska) financial statements as of September 30, 1995. The auditors have expressed an unqualified opinion on the 1995 statements. Their reports on Alaska`s internal control structure and on compliance with laws and regulations are also provided. The Alaska Power Administration operates and maintains two hydroelectric projects that include five generator units, three power tunnels and penstocks, and over 88 miles of transmission line. Additional information about Alaska Power Administration is provided in the notes to the financial statements. The 1995more » financial statement audit was made under the provisions of the Inspector General Act (5 U.S.C. App.), as amended, the Chief Financial Officers (CFO) Act (31 U.S.C. 1500), and Office of Management and Budget implementing guidance to the CFO Act. The auditor`s work was conducted in accordance with generally accepted government auditing standards. To fulfill the audit responsibilities, the authors contracted with the independent public accounting firm of KPMG Peat Marwick (KPMG) to conduct the audit for us, subject to review. The auditor`s report on Alaska`s internal control structure disclosed no reportable conditions that could have a material effect on the financial statements. The auditor also considered the overview and performance measure data for completeness and material consistency with the basic financial statements, as noted in the internal control report. The auditor`s report on compliance with laws and regulations disclosed no instances of noncompliance by Alaska.« less

  2. Two-Photon Absorption Characterization of HgCdTe

    DTIC Science & Technology

    1990-07-30

    r17 L3 _ , 952L2 9521- 240 L 976 , 210 979 LU ’~-~’ ~180~ - Eg=136.0 _-0.5 m eV Z-150 T 7K W FIG. 2. Wavelength depend- 0120[0 0 12 > ence of the...8217 / Army Center for Night Vision and Electro-Optics, Contract 0 i No. DAAB07-87-C-FO94. j W 9.329 FIG. 12. Wavelength depend- w ence of the...pres- presented in Fig. I. The two-photon magnetoabsorption ence of impurities and defects in samples of MCT with (TPMA) transitions are indicated by

  3. Local Probing of Magnetoelectric Coupling and Magnetoelastic Control of Switching in BiFeO3-CoFe2O4 Thin-Film Nanocomposite

    DTIC Science & Technology

    2013-07-25

    at remanent state (Fig. 4(d)). The obtained ME coefficient (the highest value we measure is 102 mV/ cm/Oe) and is comparable to that of bulk PZT -CFO...For a large field (H > Hc), a mag- netostrictive strain (k) must be already saturated and the ME coefficient estimated (Fig. 4) should be nearly...zero at high field (as a function of piezomagnetic coefficient (dk=dH), leading to a maximum in the ME response near Hc. That this is not observed can be

  4. Preparation of new crosslinking agents and additives for use in polymer electrolyte membranes (PEMs) for fuel cell applications

    NASA Astrophysics Data System (ADS)

    Zhou, Yangliu

    The most commonly used proton conductive membrane in polymer electrolyte membrane fuel cells (PEMFC) and direct methanol fuel cells (DMFC) studies to date is DuPont's NafionRTM, which is a perfluorinated copolymer of tetrafluoroethylene (TFE) and perfluorovinyl ether with a pendant sulfonic acid group. A focus of this work is to find ways to improve the performance of NafionRTM membranes. Crosslinking the TFE chains of fluorinated ionomeric copolymers to improve their thermal and mechanical stability is a proven route to this goal. A straightforward synthetic route to perfluorinated divinyl ethers of the formula CF2=CFO(CF 2)3[OCF(CF3)CF2]mOCF=CF 2 (m = 0-1) has been demonstrated. The compounds CF2=CFO(CF 2)3OCF=CF2 and CF2=CFO(CF2) 3OCF(CF3)CF2OCF=CF2 were prepared and characterized by GC-MS, 13C and 19F NMR, and gas-IR spectroscopy. Synthetic routes to fluorosulfato-tetrafluoropropionyl fluoride [FSO3CF2CF2C(O)F] and difluoromalonyl difluoride [F(O)CCF2C(O)F] with improved yields were found. The second focus of the dissertation was the development of fluorous triarylphosphines for use as new doping materials for the modification of NafionRTM membranes and for use as ligands in catalysts for biphasic catalysis. The synthesis and characterization of a series of new polyhexafluoropropylene oxide derivatives for preparation of fluorous triarylphosphines and phosphonium salts was studied, such as F[CF(CF3)CF2O] 4CF(CF3)CH2CH2I, F[CF(CF3)CF 2O]4CF(CF3)CH=CH2, F[CF(CF3)CF 2O]4CF(CF3) CH2CH2C6H5, and F[CF(CF 3)CF2O]4CF(CF3)CH2CH 2C6H4Br. In a separate study, the photochlorination of 2,2,3,3-tetrafluoro-1-propanol (HCF2CF2CH2OH) and 2,2,3,3-tetrafluoropropyl 2,2,3,3-tetrafluoropropionate [HCF2CF2C(O)OCH2 CF2CF2H] with super diazo blue light (lambda max = 420 nm) were investigated. The photochemical products are different from those obtained under mercury light (lambda = 253.7nm). A new compound ClCF2CF2C(O)OC(H)ClCF2CF2Cl was prepared and characterized by GC-MS, elemental analysis, 1H, 13C and 19F NMR, and gas-IR spectroscopy.

  5. Global transcriptome analysis of eukaryotic genes affected by gromwell extract.

    PubMed

    Bang, Soohyun; Lee, Dohyun; Kim, Hanhe; Park, Jiyong; Bahn, Yong-Sun

    2014-02-01

    Gromwell is known to have diverse pharmacological, cosmetic and nutritional benefits for humans. Nevertheless, the biological influence of gromwell extract (GE) on the general physiology of eukaryotic cells remains unknown. In this study a global transcriptome analysis was performed to identify genes affected by the addition of GE with Cryptococcus neoformans as the model system. In response to GE treatment, genes involved in signal transduction were immediately regulated, and the evolutionarily conserved sets of genes involved in the core cellular functions, including DNA replication, RNA transcription/processing and protein translation/processing, were generally up-regulated. In contrast, a number of genes involved in carbohydrate metabolism and transport, inorganic ion transport and metabolism, post-translational modification/protein turnover/chaperone functions and signal transduction were down-regulated. Among the GE-responsive genes that are also evolutionarily conserved in the human genome, the expression patterns of YSA1, TPO2, CFO1 and PZF1 were confirmed by northern blot analysis. Based on the functional characterization of some GE-responsive genes, it was found that GE treatment may promote cellular tolerance against a variety of environmental stresses in eukaryotes. GE treatment affects the expression levels of a significant portion of the Cryptococcus genome, implying that GE significantly affects the general physiology of eukaryotic cells. © 2013 Society of Chemical Industry.

  6. Unified mechanism of alkali and alkaline earth catalyzed gasification reactions of carbon by CO2 and H2O

    USGS Publications Warehouse

    Chen, S.G.; Yang, R.T.

    1997-01-01

    From molecular orbital calculations, a unified mechanism is proposed for the gasification reactions of graphite by CO2 and H2O, both uncatalyzed and catalyzed by alkali and alkaline earth catalysts. In this mechanism, there are two types of oxygen intermediates that are bonded to the active edge carbon atoms: an in-plane semiquinone type, Cf(O), and an off-plane oxygen bonded to two saturated carbon atoms that are adjacent to the semiquinone species, C(O)Cf(O). The rate-limiting step is the decomposition of these intermediates by breaking the C-C bonds that are connected to Cf(O). A new rate equation is derived for the uncatalyzed reactions, and that for the catalyzed reactions is readily available from the proposed mechanism. The proposed mechanism can account for several unresolved experimental observations: TPD and TK (transient kinetics) desorption results of the catalyzed systems, the similar activation energies for the uncatalyzed and catalyzed reactions, and the relative activities of the alkali and alkaline earth elements. The net charge of the edge carbon active site is substantially changed by gaining electron density from the alkali or alkaline earth element (by forming C-O-M, where M stands for metal). The relative catalytic activities of these elements can be correlated with their abilities of donating electrons and changing the net charge of the edge carbon atom. As shown previously (Chen, S. G.; Yang, R. T. J. Catal. 1993, 141, 102), only clusters of the alkali compounds are active. This derives from the ability of the clusters to dissociate CO2 and H2O to form O atoms and the mobility of the dissociated O atoms facilitated by the clusters.

  7. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Secure Printing Processes and Other Secure... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure... printing—a printing process utilized in the production of bank-notes and other security documents whereby...

  8. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 7 2014-10-01 2014-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  9. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 7 2012-10-01 2012-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  10. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 7 2011-10-01 2011-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  11. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 7 2013-10-01 2013-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  12. Process Security in Chemical Engineering Education

    ERIC Educational Resources Information Center

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  13. Financing the future of independent community hospitals.

    PubMed

    Richman, Alan P

    2011-11-01

    Effingham Hospital, a critical access hospital, undertook a modernization initiative to expand the limited scope of its inpatient services to improve financial performance and ability to build liquidity reserves. FHA Section 242 mortgage insurance was the only means for Effingham to credit enhance its debt and obtain a low-interest rate loan. Effingham needed to convince residents and county commissioners to pledge 27 years of additional tax support to offset its annual uncompensated care. The hospital won support from the community and the commissioners, in part because of the educational outreach of the CEO, CFO, and board in articulating the imperative for maintaining local hospital care and the present and future economic benefits for Effingham County.

  14. 20 CFR 423.5 - Process against Social Security Administration officials in their individual capacities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Process against Social Security Administration officials in their individual capacities. 423.5 Section 423.5 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.5 Process against Social Security Administration officials in their...

  15. 20 CFR 423.5 - Process against Social Security Administration officials in their individual capacities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Process against Social Security Administration officials in their individual capacities. 423.5 Section 423.5 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.5 Process against Social Security Administration officials in their...

  16. 20 CFR 423.5 - Process against Social Security Administration officials in their individual capacities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Process against Social Security Administration officials in their individual capacities. 423.5 Section 423.5 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.5 Process against Social Security Administration officials in their...

  17. 20 CFR 423.5 - Process against Social Security Administration officials in their individual capacities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Process against Social Security Administration officials in their individual capacities. 423.5 Section 423.5 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.5 Process against Social Security Administration officials in their...

  18. Evidences of quark-gluon plasma formation in central nuclear collisions

    NASA Astrophysics Data System (ADS)

    Sagun, V. V.; Bugaev, K. A.; Ivanytskyi, A. I.; Oliinychenko, D. R.

    2017-01-01

    Due to the absence of clear and unambiguous theoretical signals of the deconfinement transition from hadron matter to quark-gluon plasma (QGP) the experimental searches of QGP formation are based the analysis of various irregularities in the collision energy dependence of thermodynamic and hydrodynamic quantities. Here we present several remarkable irregularities at chemical freeze-out (CFO) of hadrons which are found using an advanced version of the hadron resonance gas model (HRGM). Among them are the sharp peaks of the trace anomaly and baryonic density which are seen at the center of mass energies √sNN = 4.9 GeV and √sNN = 9.2 GeV, and the two sets of highly correlated quasi-plateaus in the collision energy dependence of the entropy per baryon, total pion number per baryon, and thermal pion number per baryon which we found at the center of mass energies 3.8-4.9 GeV and 7.6-10 GeV. In addition we found a significant change of slope of the hadron yield ratios {Λ \\over p} and {{Λ - \\bar Λ } \\over {p - \\bar p}}, when the center of mass collision energy increases from 4.3 GeV to 4.9 GeV and from 7.6 GeV to 9.2 GeV [1]. The increase of slopes of these ratios at the collision energy interval 4.3-4.9 GeV is accompanied by a dramatic growth of resonance decays at CFO. We argue that such a strong correlation between the previously found irregularities and an enhancement of strangeness production can serve as the quark-gluon plasma formation signature. Hence, we conclude that a dramatic change of the system properties seen in the narrow collision energy range √sNN = 4.3-4.9 GeV may open entirely new possibilities for experimental studies of QGP properties at NICA JINR and FAIR GSI accelerators.

  19. Cobalt ferrite sphere-coated buckhorn-like barium titanate: Fabrication, characterization, its dielectric resonance, and microwave attenuation properties

    NASA Astrophysics Data System (ADS)

    Ji, Renlong; Cao, Chuanbao

    2014-10-01

    Barium titanate (BTO) with different morphology is prepared through hydrothermal method using titania spheres as precursor, then calcined at different temperatures and ultimately coated with cobalt ferrite (BTO/CFO). The dielectric dispersion of the composite containing BTO (75 wt. % ratio in paraffin wax) shows evidence of resonance behaviour in the microwave spectrum, rather than the usually observed relaxation mode. The imaginary part of permittivity (ɛ″) displays a strong peak in the 10-13 GHz frequency region, especially for buckhorn-like BTO (hydrothermally synthesized at 110 °C and calcined at 1100 °C). The dielectric response anomaly of BTO in special morphology is due to the emission of plane acoustic waves caused by electrostrictive and converse piezoelectric effects. An accepted model is adopted to simulate the resonance frequency. The minimum reflection loss of cauliflower-like BTO (hydrothermally synthesized at 110 °C, then calcined at 600 °C for 2 h, 75 wt. % ratio) in paraffin wax reaches -30.831 dB at 10.56 GHz with a matching thickness of 2 mm, lower than all the reported values. When the sintering temperature is changed to 1100 °C (buckhorn-like BTO), the minimum reflection loss value is -24.37 dB at 12.56 GHz under the thickness of 3 mm. After combination with CFO, the value reaches -42.677 dB when the thickness is 5.6 mm. The ginger-like BTO (hydrothermally synthesized at 200 °C and calcined at different temperatures) is inferior in microwave reflection reduction. The electromagnetic interference shielding effectiveness of buckhorn-like BTO composite is calculated to be -12.7 dB (94.6% shielding) at resonance frequency (2 mm, 11.52 GHz). This work clearly shows the potential to tune the dielectric property of ferroelectrics through control of morphology, facilitating new comprehension of the ferroelectrics in microwave regime.

  20. Evaluation of security algorithms used for security processing on DICOM images

    NASA Astrophysics Data System (ADS)

    Chen, Xiaomeng; Shuai, Jie; Zhang, Jianguo; Huang, H. K.

    2005-04-01

    In this paper, we developed security approach to provide security measures and features in PACS image acquisition and Tele-radiology image transmission. The security processing on medical images was based on public key infrastructure (PKI) and including digital signature and data encryption to achieve the security features of confidentiality, privacy, authenticity, integrity, and non-repudiation. There are many algorithms which can be used in PKI for data encryption and digital signature. In this research, we select several algorithms to perform security processing on different DICOM images in PACS environment, evaluate the security processing performance of these algorithms, and find the relationship between performance with image types, sizes and the implementation methods.

  1. 20 CFR 423.3 - Other process directed to the Social Security Administration or the Commissioner.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Other process directed to the Social Security Administration or the Commissioner. 423.3 Section 423.3 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.3 Other process directed to the Social Security Administration or the...

  2. 20 CFR 423.3 - Other process directed to the Social Security Administration or the Commissioner.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Other process directed to the Social Security Administration or the Commissioner. 423.3 Section 423.3 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.3 Other process directed to the Social Security Administration or the...

  3. Optimization of airport security process

    NASA Astrophysics Data System (ADS)

    Wei, Jianan

    2017-05-01

    In order to facilitate passenger travel, on the basis of ensuring public safety, the airport security process and scheduling to optimize. The stochastic Petri net is used to simulate the single channel security process, draw the reachable graph, construct the homogeneous Markov chain to realize the performance analysis of the security process network, and find the bottleneck to limit the passenger throughput. Curve changes in the flow of passengers to open a security channel for the initial state. When the passenger arrives at a rate that exceeds the processing capacity of the security channel, it is queued. The passenger reaches the acceptable threshold of the queuing time as the time to open or close the next channel, simulate the number of dynamic security channel scheduling to reduce the passenger queuing time.

  4. Office of Command Security Total Quality Management Plan

    DTIC Science & Technology

    1989-07-01

    outlines the Office of Command Security instruction for TQM implementation. Keywords: TQM (Total Quality Management ), DLA Office of Command Security, Continuous process improvement, Automatic data processing security.

  5. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...

  6. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...

  7. Coordination and organization of security software process for power information application environment

    NASA Astrophysics Data System (ADS)

    Wang, Qiang

    2017-09-01

    As an important part of software engineering, the software process decides the success or failure of software product. The design and development feature of security software process is discussed, so is the necessity and the present significance of using such process. Coordinating the function software, the process for security software and its testing are deeply discussed. The process includes requirement analysis, design, coding, debug and testing, submission and maintenance. In each process, the paper proposed the subprocesses to support software security. As an example, the paper introduces the above process into the power information platform.

  8. Repair process and a repaired component

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roberts, III, Herbert Chidsey; Simpson, Stanley F.

    Matrix composite component repair processes are disclosed. The matrix composite repair process includes applying a repair material to a matrix composite component, securing the repair material to the matrix composite component with an external securing mechanism and curing the repair material to bond the repair material to the matrix composite component during the securing by the external securing mechanism. The matrix composite component is selected from the group consisting of a ceramic matrix composite, a polymer matrix composite, and a metal matrix composite. In another embodiment, the repair process includes applying a partially-cured repair material to a matrix composite component,more » and curing the repair material to bond the repair material to the matrix composite component, an external securing mechanism securing the repair material throughout a curing period, In another embodiment, the external securing mechanism is consumed or decomposed during the repair process.« less

  9. 10 CFR 95.49 - Security of automatic data processing (ADP) systems.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security of...

  10. Information Security Management (ISM)

    NASA Astrophysics Data System (ADS)

    Šalgovičová, Jarmila; Prajová, Vanessa

    2012-12-01

    Currently, all organizations have to tackle the issue of information security. The paper deals with various aspects of Information Security Management (ISM), including procedures, processes, organizational structures, policies and control processes. Introduction of Information Security Management should be a strategic decision. The concept and implementation of Information Security Management in an organization are determined by the corporate needs and objectives, security requirements, the processes deployed as well as the size and structure of the organization. The implementation of ISM should be carried out to the extent consistent with the needs of the organization.

  11. 17 CFR 240.15Ca2-5 - Consent to service of process to be furnished by non-resident government securities brokers or...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Consent to service of process... Government Securities Dealers § 240.15Ca2-5 Consent to service of process to be furnished by non-resident... government securities dealer by the service of process upon the Commission and the forwarding of a copy...

  12. Airport security inspection process model and optimization based on GSPN

    NASA Astrophysics Data System (ADS)

    Mao, Shuainan

    2018-04-01

    Aiming at the efficiency of airport security inspection process, Generalized Stochastic Petri Net is used to establish the security inspection process model. The model is used to analyze the bottleneck problem of airport security inspection process. The solution to the bottleneck is given, which can significantly improve the efficiency and reduce the waiting time by adding the place for people to remove their clothes and the X-ray detector.

  13. Information security of power enterprises of North-Arctic region

    NASA Astrophysics Data System (ADS)

    Sushko, O. P.

    2018-05-01

    The role of information technologies in providing technological security for energy enterprises is a component of the economic security for the northern Arctic region in general. Applying instruments and methods of information protection modelling of the energy enterprises' business process in the northern Arctic region (such as Arkhenergo and Komienergo), the authors analysed and identified most frequent risks of information security. With the analytic hierarchy process based on weighting factor estimations, information risks of energy enterprises' technological processes were ranked. The economic estimation of the information security within an energy enterprise considers weighting factor-adjusted variables (risks). Investments in information security systems of energy enterprises in the northern Arctic region are related to necessary security elements installation; current operating expenses on business process protection systems become materialized economic damage.

  14. 20 CFR 423.5 - Process against Social Security Administration officials in their individual capacities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... ADMINISTRATION SERVICE OF PROCESS § 423.5 Process against Social Security Administration officials in their... capacities must be served in compliance with the requirements for service of process on individuals who are... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Process against Social Security...

  15. [Bioethical analysis of the Brazilian Dentistry Code of Ethics].

    PubMed

    Pyrrho, Monique; do Prado, Mauro Machado; Cordón, Jorge; Garrafa, Volnei

    2009-01-01

    The Brazilian Dentistry Code of Ethics (DCE), Resolution CFO-71 from May 2006, is an instrument created to guide dentists' behavior in relation to the ethical aspects of professional practice. The purpose of the study is to analyze the above mentioned code comparing the deontological and bioethical focuses. In order to do so, an interpretative analysis of the code and of twelve selected texts was made. Six of the texts were about bioethics and six on deontology, and the analysis was made through the methodological classification of the context units, textual paragraphs and items from the code in the following categories: the referentials of bioethical principlism--autonomy, beneficence, nonmaleficence and justice -, technical aspects and moral virtues related to the profession. Together the four principles represented 22.9%, 39.8% and 54.2% of the content of the DCE, of the deontological texts and of the bioethical texts respectively. In the DCE, 42% of the items referred to virtues, 40.2% were associated to technical aspects and just 22.9% referred to principles. The virtues related to the professionals and the technical aspects together amounted to 70.1% of the code. Instead of focusing on the patient as the subject of the process of oral health care, the DCE focuses on the professional, and it is predominantly turned to legalistic and corporate aspects.

  16. 20 CFR 423.3 - Other process directed to the Social Security Administration or the Commissioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... SERVICE OF PROCESS § 423.3 Other process directed to the Social Security Administration or the Commissioner. Subpoenas and other process (other than summonses and complaints) that are required to be served... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Other process directed to the Social Security...

  17. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE PAGES

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  18. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Williams, Adam D.

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  19. Materials managers earn their grades from hospital execs.

    PubMed

    Kowalski, J

    1994-09-01

    The 1994 Survey on CEO/CFO Satisfaction With and Expectations for Hospital Materials Management provides an inside look at how hospital executives size up their materials management departments. The survey of 143 hospital CEOs and CFOs conducted by Kowalski-Dickow Associates, a materials management consulting firm based in Milwaukee, sheds light on executives' perceptions of the performance, characteristics and future of materials management. Materials managers can use the information to begin--or enhance--communications with senior management. The study was completed in cooperation with the American Society for Healthcare Materials Management and Materials Management in Health Care. Funding for the survey was provided by the American Sterilizer Company (AMSCO), Erie, PA; General Medical Corp., Richmond, VA; Kimberly-Clark, Roswell, GA; Milcare/Herman Miller, Zeeland, MI; and Owens & Minor, Glen Allen, VA.

  20. Rethinking the nature of fibrolamellar bone: an integrative biological revision of sauropod plexiform bone formation.

    PubMed

    Stein, Koen; Prondvai, Edina

    2014-02-01

    We present novel findings on sauropod bone histology that cast doubt on general palaeohistological concepts concerning the true nature of woven bone in primary cortical bone and its role in the rapid growth and giant body sizes of sauropod dinosaurs. By preparing and investigating longitudinal thin sections of sauropod long bones, of which transverse thin sections were published previously, we found that the amount of woven bone in the primary complex has been largely overestimated. Using comparative cellular and light-extinction characteristics in the two section planes, we revealed that the majority of the bony lamina consists of longitudinally organized primary bone, whereas woven bone is usually represented only by a layer a few cells thin in the laminae. Previous arguments on sauropod biology, which have been based on the overestimated amount, misinterpreted formation process and misjudged role of woven bone in the plexiform bone formation of sauropod dinosaurs, are thereby rejected. To explain the observed pattern in fossil bones, we review the most recent advances in bone biology concerning bone formation processes at the cellular and tissue levels. Differentiation between static and dynamic osteogenesis (SO and DO) and the revealed characteristics of SO- versus DO-derived bone tissues shed light on several questions raised by our palaeohistological results and permit identification of these bone tissues in fossils with high confidence. By presenting the methods generally used for investigating fossil bones, we show that the major cause of overestimation of the amount of woven bone in previous palaeohistological studies is the almost exclusive usage of transverse sections. In these sections, cells and crystallites of the longitudinally organized primary bone are cut transversely, thus cells appear rounded and crystallites remain dark under crossed plane polarizers, thereby giving the false impression of woven bone. In order to avoid further confusion in palaeohistological studies, we introduce new osteohistological terms as well as revise widely used but incorrect terminology. To infer the role of woven bone in the bone formation of fast-growing tetrapods, we review some aspects of the interrelationships between the vascularity of bone tissues, basal metabolic rate, body size and growth rate. By putting our findings into the context of osteogenesis, we provide a new model for the diametrical limb bone growth of sauropods and present new implications for the evolution of fast growth in vertebrates. Since biomechanical studies of bone tissues suggest that predominant collagen fibre orientation (CFO) is controlled by endogenous, functional and perhaps phylogenetic factors, the relationship between CFO and bone growth rate as defined by Amprino's rule, which has been the basis for the biological interpretation of several osteohistological features, must be revised. Our findings draw attention to the urgent need for revising widely accepted basic concepts of palaeohistological studies, and for a more integrative approach to bone formation, biomechanics and bone microstructural features of extant and extinct vertebrates to infer life history traits of long extinct, iconic animals like dinosaurs. © 2013 The Authors. Biological Reviews © 2013 Cambridge Philosophical Society.

  1. 10 CFR 1016.9 - Processing security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Processing security facility approval. 1016.9 Section 1016... § 1016.9 Processing security facility approval. The following receipt of an acceptable request for... granted pursuant to § 1016.6 of this part. ...

  2. 10 CFR 1016.9 - Processing security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Processing security facility approval. 1016.9 Section 1016... § 1016.9 Processing security facility approval. The following receipt of an acceptable request for... granted pursuant to § 1016.6 of this part. ...

  3. Application of the JDL data fusion process model for cyber security

    NASA Astrophysics Data System (ADS)

    Giacobe, Nicklaus A.

    2010-04-01

    A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.

  4. Secure ADS-B authentication system and method

    NASA Technical Reports Server (NTRS)

    Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)

    2010-01-01

    A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.

  5. Priming the Secure Attachment Schema Affects the Emotional Face Processing Bias in Attachment Anxiety: An fMRI Research

    PubMed Central

    Tang, Qingting; Chen, Xu; Hu, Jia; Liu, Ying

    2017-01-01

    Our study explored how priming with a secure base schema affects the processing of emotional facial stimuli in individuals with attachment anxiety. We enrolled 42 undergraduate students between 18 and 27 years of age, and divided them into two groups: attachment anxiety and attachment secure. All participants were primed under two conditions, the secure priming using references to the partner, and neutral priming using neutral references. We performed repeated attachment security priming combined with a dual-task paradigm and functional magnetic resonance imaging. Participants’ reaction times in terms of responding to the facial stimuli were also measured. Attachment security priming can facilitate an individual’s processing of positive emotional faces; for instance, the presentation of the partner’s name was associated with stronger activities in a wide range of brain regions and faster reaction times for positive facial expressions in the subjects. The current finding of higher activity in the left-hemisphere regions for secure priming rather than neutral priming is consistent with the prediction that attachment security priming triggers the spread of the activation of a positive emotional state. However, the difference in brain activity during processing of both, positive and negative emotional facial stimuli between the two priming conditions appeared in the attachment anxiety group alone. This study indicates that the effect of attachment secure priming on the processing of emotional facial stimuli could be mediated by chronic attachment anxiety. In addition, it highlights the association between higher-order processes of the attachment system (secure attachment schema priming) and early-stage information processing system (attention), given the increased attention toward the effects of secure base schema on the processing of emotion- and attachment-related information among the insecure population. Thus, the following study has applications in providing directions for clinical treatment of mood disorders in attachment anxiety. PMID:28473796

  6. Priming the Secure Attachment Schema Affects the Emotional Face Processing Bias in Attachment Anxiety: An fMRI Research.

    PubMed

    Tang, Qingting; Chen, Xu; Hu, Jia; Liu, Ying

    2017-01-01

    Our study explored how priming with a secure base schema affects the processing of emotional facial stimuli in individuals with attachment anxiety. We enrolled 42 undergraduate students between 18 and 27 years of age, and divided them into two groups: attachment anxiety and attachment secure. All participants were primed under two conditions, the secure priming using references to the partner, and neutral priming using neutral references. We performed repeated attachment security priming combined with a dual-task paradigm and functional magnetic resonance imaging. Participants' reaction times in terms of responding to the facial stimuli were also measured. Attachment security priming can facilitate an individual's processing of positive emotional faces; for instance, the presentation of the partner's name was associated with stronger activities in a wide range of brain regions and faster reaction times for positive facial expressions in the subjects. The current finding of higher activity in the left-hemisphere regions for secure priming rather than neutral priming is consistent with the prediction that attachment security priming triggers the spread of the activation of a positive emotional state. However, the difference in brain activity during processing of both, positive and negative emotional facial stimuli between the two priming conditions appeared in the attachment anxiety group alone. This study indicates that the effect of attachment secure priming on the processing of emotional facial stimuli could be mediated by chronic attachment anxiety. In addition, it highlights the association between higher-order processes of the attachment system (secure attachment schema priming) and early-stage information processing system (attention), given the increased attention toward the effects of secure base schema on the processing of emotion- and attachment-related information among the insecure population. Thus, the following study has applications in providing directions for clinical treatment of mood disorders in attachment anxiety.

  7. Proposal for a Security Management in Cloud Computing for Health Care

    PubMed Central

    Dzombeta, Srdan; Brandis, Knud

    2014-01-01

    Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources. PMID:24701137

  8. Proposal for a security management in cloud computing for health care.

    PubMed

    Haufe, Knut; Dzombeta, Srdan; Brandis, Knud

    2014-01-01

    Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources.

  9. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  10. Process Improvement Should Link to Security: SEPG 2007 Security Track Recap

    DTIC Science & Technology

    2007-09-01

    the Systems Security Engineering Capability Maturity Model (SSE- CMM / ISO 21827) and its use in system software developments ...software development life cycle ( SDLC )? 6. In what ways should process improvement support security in the SDLC ? 1.2 10BPANEL RESOURCES For each... project management, and support practices through the use of the capability maturity models including the CMMI and the Systems Security

  11. Introducing the CERT (Trademark) Resiliency Engineering Framework: Improving the Security and Sustainability Processes

    DTIC Science & Technology

    2007-05-01

    business processes and services. 4. Security operations management addresses the day-to-day activities that the organization performs to protect the...Management TM – Technology Management Security Operations Management SOM – Security Operations Management 5.7.2 Important Operations Competency...deals with the provision of access rights to informa- tion and technical assets SOM – Security Operations Management , which addresses the fundamental

  12. Guidelines for Automatic Data Processing Physical Security and Risk Management. Federal Information Processing Standards Publication 31.

    ERIC Educational Resources Information Center

    National Bureau of Standards (DOC), Washington, DC.

    These guidelines provide a handbook for use by federal organizations in structuring physical security and risk management programs for their automatic data processing facilities. This publication discusses security analysis, natural disasters, supporting utilities, system reliability, procedural measures and controls, off-site facilities,…

  13. 17 CFR 201.510 - Temporary cease-and-desist orders: Application process.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Temporary cease-and-desist orders: Application process. 201.510 Section 201.510 Commodity and Securities Exchanges SECURITIES AND... § 201.510 Temporary cease-and-desist orders: Application process. (a) Procedure. A request for entry of...

  14. 17 CFR 201.510 - Temporary cease-and-desist orders: Application process.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Temporary cease-and-desist orders: Application process. 201.510 Section 201.510 Commodity and Securities Exchanges SECURITIES AND... § 201.510 Temporary cease-and-desist orders: Application process. (a) Procedure. A request for entry of...

  15. 17 CFR 201.510 - Temporary cease-and-desist orders: Application process.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Temporary cease-and-desist orders: Application process. 201.510 Section 201.510 Commodity and Securities Exchanges SECURITIES AND... § 201.510 Temporary cease-and-desist orders: Application process. (a) Procedure. A request for entry of...

  16. 78 FR 9987 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-12

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias, Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security...

  17. National Security Technology Incubator Evaluation Process

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages ofmore » early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.« less

  18. 48 CFR 1352.237-70 - Security processing requirements-high or moderate risk contracts.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... requirements-high or moderate risk contracts. 1352.237-70 Section 1352.237-70 Federal Acquisition Regulations... Provisions and Clauses 1352.237-70 Security processing requirements—high or moderate risk contracts. As prescribed in 48 CFR 1337.110-70 (b), insert the following clause: Security Processing Requirements—High or...

  19. 31 CFR 375.23 - How does the securities delivery process work?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... the securities delivery process work? If any of the offers you submitted are accepted, you must...

  20. Information technology security system engineering methodology

    NASA Technical Reports Server (NTRS)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  1. The Impact of Migration Processes on the National Security of Kazakhstan

    ERIC Educational Resources Information Center

    Korganova, Saipzhamal S.; Taubayeva, Mirash Y.; Sultanov, Serik A.; Rysbayeva, Saule Zh.; Sultanova, Valida I.; Zhumabekov, Madiyr U.; Raximshikova, Mavluda K.

    2016-01-01

    The purpose of this study is to analyze the impact of migration processes on the national security of Kazakhstan. However, it should be noted that national security is an expression of national interests and it is provided by means of resources and efforts of a particular state. Consequently, social security is an expression of the public…

  2. DOE DISS/ET pilot system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Strait, R.S.; Wagner, E.E.

    1994-07-01

    The US Department of Energy (DOE) Office of Safeguards and Security initiated the DOE Integrated Security System / Electronic Transfer (DISS/ET) for the purpose of reducing the time required to process security clearance requests. DISS/ET will be an integrated system using electronic commerce technologies for the collection and processing of personnel security clearance data, and its transfer between DOE local security clearance offices, DOE Operations Offices, and the Office of Personnel Management. The system will use electronic forms to collect clearance applicant data. The forms data will be combined with electronic fingerprint images and packaged in a secure encrypted electronicmore » mail envelope for transmission across the Internet. Information provided by the applicant will be authenticated using digital signatures. All processing will be done electronically.« less

  3. Securing non-volatile memory regions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Faraboschi, Paolo; Ranganathan, Parthasarathy; Muralimanohar, Naveen

    Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region.

  4. National Dam Inspection Program. Perrins Marsh Dam (NDI I.D. PA-0886, DER I.D. 066-005), Susquehanna River Basin Whitelock Creek, Wyoming County, Pennsylvania. Phase I Inspection Report,

    DTIC Science & Technology

    1981-01-01

    4c sw- 0mr- w <L -- 0 I- 0. .1 I0 W ’- -o’ -3 w XLW 8 0 WW 4CFO .-. .- -4 >(lJ K 0 E-#F-0 c...2 -. 4-; In cnz KW cc 8 0 0 I f4 (z~ 0- 0- 0- -- .10 ’ 4c 0z J It’ 00 it w .C 0 W 040 ~񕋘 LL. i ao0000 11.4 Or. z ZOO 3- LCW J- zw a J Cz 4 WW L...a* o darDf Ma r, in ori~e s.Vsaa rsnre (’,. mi ,-te ~ b . C, ."s ...... .- - - - ln,V,,i:e, .’ ,. . "(’ hrm ,..,o lrda hind ’ ,++r!l, hert.

  5. [Ecological security of wastewater treatment processes: a review].

    PubMed

    Yang, Sai; Hua, Tao

    2013-05-01

    Though the regular indicators of wastewater after treatment can meet the discharge requirements and reuse standards, it doesn't mean the effluent is harmless. From the sustainable point of view, to ensure the ecological and human security, comprehensive toxicity should be considered when discharge standards are set up. In order to improve the ecological security of wastewater treatment processes, toxicity reduction should be considered when selecting and optimizing the treatment processes. This paper reviewed the researches on the ecological security of wastewater treatment processes, with the focus on the purposes of various treatment processes, including the processes for special wastewater treatment, wastewater reuse, and for the safety of receiving waters. Conventional biological treatment combined with advanced oxidation technologies can enhance the toxicity reduction on the base of pollutants removal, which is worthy of further study. For the process aimed at wastewater reuse, the integration of different process units can complement the advantages of both conventional pollutants removal and toxicity reduction. For the process aimed at ecological security of receiving waters, the emphasis should be put on the toxicity reduction optimization of process parameters and process unit selection. Some suggestions for the problems in the current research and future research directions were put forward.

  6. Security model for VM in cloud

    NASA Astrophysics Data System (ADS)

    Kanaparti, Venkataramana; Naveen K., R.; Rajani, S.; Padmvathamma, M.; Anitha, C.

    2013-03-01

    Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM's.

  7. GEMSS: privacy and security for a medical Grid.

    PubMed

    Middleton, S E; Herveg, J A M; Crazzolara, F; Marvin, D; Poullet, Y

    2005-01-01

    The GEMSS project is developing a secure Grid infrastructure through which six medical simulations services can be invoked. We examine the legal and security framework within which GEMSS operates. We provide a legal qualification to the operations performed upon patient data, in view of EU directive 95/46, when using medical applications on the GEMSS Grid. We identify appropriate measures to ensure security and describe the legal rationale behind our choice of security technology. Our legal analysis demonstrates there must be an identified controller (typically a hospital) of patient data. The controller must then choose a processor (in this context a Grid service provider) that provides sufficient guarantees with respect to the security of their technical and organizational data processing procedures. These guarantees must ensure a level of security appropriate to the risks, with due regard to the state of the art and the cost of their implementation. Our security solutions are based on a public key infrastructure (PKI), transport level security and end-to-end security mechanisms in line with the web service (WS Security, WS Trust and SecureConversation) security specifications. The GEMSS infrastructure ensures a degree of protection of patient data that is appropriate for the health care sector, and is in line with the European directives. We hope that GEMSS will become synonymous with high security data processing, providing a framework by which GEMSS service providers can provide the security guarantees required by hospitals with regard to the processing of patient data.

  8. Providing security for automated process control systems at hydropower engineering facilities

    NASA Astrophysics Data System (ADS)

    Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.

    2016-12-01

    This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.

  9. Iris Cryptography for Security Purpose

    NASA Astrophysics Data System (ADS)

    Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.

    2018-04-01

    In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.

  10. Redefining the business process of Department of Food Security and Agriculture in Government of Surabaya City

    NASA Astrophysics Data System (ADS)

    Cahyono, H.; Wessiani, N. A.

    2018-04-01

    Government of Indonesia has been launched the bureaucratic reform program since 2010. One of the action is conducted restructuring organization in all city governments. Department of Food Security and Agriculture in Government of Surabaya City is the result of merger from two Department, namely Bureau of Food Security and Department of Agriculture. This merger makes Department of Food Security and Agriculture to redefine their business process. The new business process is needed to be defined in order to align the new structure with the long term strategic planning of Surabaya City Government. This research aims to redefine the business process of Department of Food Security and Agriculture in Government of Surabaya City. The CIMOSA model is adopted for identifying the activities in the business process. The new business process is important for the department to allocate their resource, mainly the human resource and as the main input for the department to build their standard operating procedure.

  11. NASA guidelines for assuring the adequacy and appropriateness of security safeguards in sensitive applications

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1984-01-01

    The Office of Management and Budget (OMB) Circular A-71, transmittal Memorandum No. 1, requires that each agency establish a management control process to assure that appropriate administrative, physical and technical safeguards are incorporated into all new computer applications. In addition to security specifications, the management control process should assure that the safeguards are adequate for the application. The security activities that should be integral to the system development process are examined. The software quality assurance process to assure that adequate and appropriate controls are incorporated into sensitive applications is also examined. Security for software packages is also discussed.

  12. Overview of Computer Security Certification and Accreditation. Final Report.

    ERIC Educational Resources Information Center

    Ruthberg, Zella G.; Neugent, William

    Primarily intended to familiarize ADP (automatic data processing) policy and information resource managers with the approach to computer security certification and accreditation found in "Guideline to Computer Security Certification and Accreditation," Federal Information Processing Standards Publications (FIPS-PUB) 102, this overview…

  13. 75 FR 82489 - Process for Submissions for Review of Security-Based Swaps for Mandatory Clearing and Notice...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-30

    ... Part IV Securities and Exchange Commission 17 CFR Parts 240 and 249 Process for Submissions for Review of Security-Based Swaps for Mandatory Clearing and Notice Filing Requirements for Clearing...;#0; [[Page 82490

  14. The Design Process of Physical Security as Applied to a U.S. Border Point of Entry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wagner, G.G.

    1998-10-26

    This paper describes the design process of physical security as applied to a U.S. Border Port of Entry (PoE). Included in this paper are descriptions of the elements that compose U.S. border security. The physical security design will describe the various elements that make up the process as well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry and exit of illegal contraband will be emphasized.

  15. Capturing security requirements for software systems.

    PubMed

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  16. Capturing security requirements for software systems

    PubMed Central

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  17. Aerial secure display by use of polarization-processing display with retarder film and retro-reflector

    NASA Astrophysics Data System (ADS)

    Ito, Shusei; Uchida, Keitaro; Mizushina, Haruki; Suyama, Shiro; Yamamoto, Hirotsugu

    2017-02-01

    Security is one of the big issues in automated teller machine (ATM). In ATM, two types of security have to be maintained. One is to secure displayed information. The other is to secure screen contamination. This paper gives a solution for these two security issues. In order to secure information against peeping at the screen, we utilize visual cryptography for displayed information and limit the viewing zone. Furthermore, an aerial information screen with aerial imaging by retro-reflection, named AIRR enables users to avoid direct touch on the information screen. The purpose of this paper is to propose an aerial secure display technique that ensures security of displayed information as well as security against contamination problem on screen touch. We have developed a polarization-processing display that is composed of a backlight, a polarizer, a background LCD panel, a gap, a half-wave retarder, and a foreground LCD panel. Polarization angle is rotated with the LCD panels. We have constructed a polarization encryption code set. Size of displayed images are designed to limit the viewing position. Furthermore, this polarization-processing display has been introduced into our aerial imaging optics, which employs a reflective polarizer and a retro-reflector covered with a quarter-wave retarder. Polarization-modulated light forms the real image over the reflective polarizer. We have successfully formed aerial information screen that shows the secret image with a limited viewing position. This is the first realization of aerial secure display by use of polarization-processing display with retarder-film and retro-reflector.

  18. Reforming The U.S. Security Assistance Export Process To Build Existing Capabilities

    DTIC Science & Technology

    2015-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA JOINT APPLIED PROJECT REFORMING THE U.S. SECURITY ASSISTANCE EXPORT PROCESS TO...December 2015 3. REPORT TYPE AND DATES COVERED Joint applied project 4. TITLE AND SUBTITLE REFORMING THE U.S. SECURITY ASSISTANCE EXPORT PROCESS TO...the programs. While acknowledging the expanding role of the programs, the findings indicate a need for reforms in the export -control mechanisms

  19. 24 CFR 81.99 - Additional provisions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... attachment for GSE Securities in Book-entry system. The interest of a debtor in a Security Entitlement may be reached by a creditor only by legal process upon the Securities Intermediary with whom the debtor's securities account is maintained, except where a Security Entitlement is maintained in the name of a secured...

  20. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...

  1. 78 FR 22361 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-15

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p..., Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security Administration. ACTION: Notice of Social Security Ruling; Correction. SUMMARY: The Social Security Administration...

  2. 78 FR 8217 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p..., Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security Administration. ACTION: Notice of Social Security Ruling; Correction. SUMMARY: The Social Security Administration...

  3. Neural evidence for a multifaceted model of attachment security.

    PubMed

    Canterberry, Melanie; Gillath, Omri

    2013-06-01

    The sense of attachment security has been linked with a host of beneficial outcomes related to personal and relational well-being. Moreover, research has demonstrated that the sense of attachment security can be enhanced via cognitive priming techniques. Studies using such techniques have shown that security priming results with similar outcomes as dispositional attachment security. The way security priming leads to these effects, however, is yet to be unveiled. Using fMRI we took one step in that direction and examined the neural mechanisms underlying enhanced attachment security. Participants were exposed to explicit and implicit security- and insecurity-related words. Security priming led to co-occurring activation in brain areas reflective of cognitive, affective, and behavioral processes (e.g., medial frontal cortex, parahippocampus, BA 6). There were activation differences based on attachment style. This research serves as an important step in mapping out the security process and supports a conceptualization of security as part of a behavioral system with multiple components. Copyright © 2012 Elsevier B.V. All rights reserved.

  4. 31 CFR 321.25 - Payment and retention of definitive securities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... prohibited from accepting an image, or other copy or reproduction of the definitive security, for redemption or processing. To ensure that all transactions processed by agents are properly validated, agents... converted to an electronic image. At a minimum, the agent must retain such securities for a period of thirty...

  5. 31 CFR 321.25 - Payment and retention of definitive securities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... agent is prohibited from accepting an image, or other copy or reproduction of the definitive security, for redemption or processing. To ensure that all transactions processed by agents are properly... truncated and converted to an electronic image. At a minimum, the agent must retain such securities for a...

  6. 31 CFR 321.25 - Payment and retention of definitive securities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... prohibited from accepting an image, or other copy or reproduction of the definitive security, for redemption or processing. To ensure that all transactions processed by agents are properly validated, agents... converted to an electronic image. At a minimum, the agent must retain such securities for a period of thirty...

  7. 17 CFR 202.11 - Public Company Accounting Oversight Board budget approval process.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Public Company Accounting Oversight Board budget approval process. 202.11 Section 202.11 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION INFORMAL AND OTHER PROCEDURES § 202.11 Public Company Accounting Oversight...

  8. 39 CFR 491.4 - Identification of employees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... involved. Garnishment of an employee whose name and social security number is similar to but not identical with the name and social security number on the garnishment will not be processed. An exact match of both name and social security number is required in order to permit processing; otherwise, the...

  9. Computer-Aided Sensor Development Focused on Security Issues.

    PubMed

    Bialas, Andrzej

    2016-05-26

    The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research.

  10. Computer-Aided Sensor Development Focused on Security Issues

    PubMed Central

    Bialas, Andrzej

    2016-01-01

    The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research. PMID:27240360

  11. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  12. Research on information security system of waste terminal disposal process

    NASA Astrophysics Data System (ADS)

    Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei

    2017-05-01

    Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.

  13. A time and frequency synchronization method for CO-OFDM based on CMA equalizers

    NASA Astrophysics Data System (ADS)

    Ren, Kaixuan; Li, Xiang; Huang, Tianye; Cheng, Zhuo; Chen, Bingwei; Wu, Xu; Fu, Songnian; Ping, Perry Shum

    2018-06-01

    In this paper, an efficient time and frequency synchronization method based on a new training symbol structure is proposed for polarization division multiplexing (PDM) coherent optical orthogonal frequency division multiplexing (CO-OFDM) systems. The coarse timing synchronization is achieved by exploiting the correlation property of the first training symbol, and the fine timing synchronization is accomplished by using the time-domain symmetric conjugate of the second training symbol. Furthermore, based on these training symbols, a constant modulus algorithm (CMA) is proposed for carrier frequency offset (CFO) estimation. Theoretical analysis and simulation results indicate that the algorithm has the advantages of robustness to poor optical signal-to-noise ratio (OSNR) and chromatic dispersion (CD). The frequency offset estimation range can achieve [ -Nsc/2 ΔfN , + Nsc/2 ΔfN ] GHz with the mean normalized estimation error below 12 × 10-3 even under the condition of OSNR as low as 10 dB.

  14. The utilization of crude fish oil (CFO) to increase mudcrab (Scylla serrata) feed quality

    NASA Astrophysics Data System (ADS)

    Lamid, Mirni; Agustono

    2017-02-01

    Crude fish oil is one of essential fatty acid sources, which is found in Sardinella lemuru. This research aims to study the quality improvement of mudcrab(Scylla serrata) feed. Four feed formulations were designed by using completely randomized design, including P0 = trash fish + 1% tapioca starch; P1=trash fish + 2.0% crude fish oil + 1% tapioca starch;, P2= trash fish +4.0% crude fish oil + 1% tapioca starch; P3=trash fish + 6.0% crude fish oil + 1% tapioca starch; P4=trash fish +8.0% crude fish oil + 1% tapioca starch, respectively, which were carried out in quadruplicate. This study showed that feed formulation significantly affected crude protein, crude fiber, crude lipid, ash, organic matter and nitrogen free extract and energy of mudcrab. The P2 feed was the best formulation but had a slight different from P3 formulation.

  15. System and method for secure group transactions

    DOEpatents

    Goldsmith, Steven Y [Rochester, MN

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  16. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  17. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  18. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  19. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  20. 31 CFR 375.23 - How does the securities delivery process work?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...

  1. 31 CFR 375.23 - How does the securities delivery process work?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...

  2. 31 CFR 375.23 - How does the securities delivery process work?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...

  3. 31 CFR 375.23 - How does the securities delivery process work?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...

  4. Securing Information with Complex Optical Encryption Networks

    DTIC Science & Technology

    2015-08-11

    Network Security, Network Vulnerability , Multi-dimentional Processing, optoelectronic devices 16. SECURITY CLASSIFICATION OF: 17. LIMITATION... optoelectronic devices and systems should be analyzed before the retrieval, any hostile hacker will need to possess multi-disciplinary scientific...sophisticated optoelectronic principles and systems where he/she needs to process the information. However, in the military applications, most military

  5. 77 FR 10657 - Protecting the Public and Our Employees in Our Hearing Process

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-23

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2011-0008] RIN 0960-AH29 Protecting the Public and Our Employees in Our Hearing Process AGENCY: Social Security Administration. ACTION... INFORMATION CONTACT: Glen Colvin, Social Security Administration, 5107 Leesburg Pike, Falls Church, VA 22041...

  6. Transportation Security Administration in Defense of the National Aviation Infrastructure

    DTIC Science & Technology

    2009-02-12

    evidence suggests a hole exists within our airport security process. That hole may be caused by an over-reliance on technology and a blatant disregard of...environment enables BDOs to operate with increased effectiveness.11 Technology. Three major tools sit at the airport security technology forefront...Through Covert Testing of TSA’s Passenger Screening Process, GAO‐08‐48T, 15 Nov 07, 2. 16 Orlando News, “TSA Workers Skipping Orlando Airport Security Causes

  7. 20 CFR 423.7 - Acknowledgment of mailed process.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Acknowledgment of mailed process. 423.7 Section 423.7 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.7 Acknowledgment of mailed process. The Social Security Administration will not provide a receipt or other...

  8. Accurate, fast, and secure biometric fingerprint recognition system utilizing sensor fusion of fingerprint patterns

    NASA Astrophysics Data System (ADS)

    El-Saba, Aed; Alsharif, Salim; Jagapathi, Rajendarreddy

    2011-04-01

    Fingerprint recognition is one of the first techniques used for automatically identifying people and today it is still one of the most popular and effective biometric techniques. With this increase in fingerprint biometric uses, issues related to accuracy, security and processing time are major challenges facing the fingerprint recognition systems. Previous work has shown that polarization enhancementencoding of fingerprint patterns increase the accuracy and security of fingerprint systems without burdening the processing time. This is mainly due to the fact that polarization enhancementencoding is inherently a hardware process and does not have detrimental time delay effect on the overall process. Unpolarized images, however, posses a high visual contrast and when fused (without digital enhancement) properly with polarized ones, is shown to increase the recognition accuracy and security of the biometric system without any significant processing time delay.

  9. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under subpart. (a...

  10. 78 FR 4856 - Intent To Request Renewal From OMB of One Current Public Collection of Information: TSA Customer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-23

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request Renewal...: Transportation Security Administration, DHS. ACTION: 60-Day notice. SUMMARY: The Transportation Security... provide feedback to TSA about their experiences with TSA's airport security process and procedures while...

  11. 17 CFR 240.17Ad-2 - Turnaround, processing, and forwarding of items.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Turnaround, processing, and forwarding of items. 240.17Ad-2 Section 240.17Ad-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... be filed with the Comptroller of the Currency shall be filed with the Office of the Comptroller of...

  12. 17 CFR 240.17Ad-2 - Turnaround, processing, and forwarding of items.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Turnaround, processing, and forwarding of items. 240.17Ad-2 Section 240.17Ad-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... be filed with the Comptroller of the Currency shall be filed with the Office of the Comptroller of...

  13. IT security evaluation - “hybrid” approach and risk of its implementation

    NASA Astrophysics Data System (ADS)

    Livshitz, I. I.; Neklyudov, A. V.; Lontsikh, P. A.

    2018-05-01

    It is relevant to evolve processes of evaluation of the IT security nowadays. Creating and application of the common evaluation approaches for an IT component, which are processed by the governmental and civil organizations, are still not solving problem. It is suggested to create a more precise and complex assessment tool for an IT security – the “hybrid” method of the IT security evaluation for a particular object, which is based on a range of adequate assessment tools.

  14. The Design Process of Physical Security as Applied to a U.S. Border Port of Entry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wagner, G.G.

    1999-02-22

    This paper details the application of a standard physical security system design process to a US Border Port of Entry (PoE) for vehicle entry/exit. The physical security design methodology is described as well as the physical security similarities to facilities currently at a US Border PoE for vehicles. The physical security design process description includes the various elements that make up the methodologies well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry/exit of illegal contraband and personnel are described. The potential to enhance the functionsmore » of drug/contraband detection in the Pre-Primary Inspection area through the application of emerging technologies are also addressed.« less

  15. INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project

    NASA Astrophysics Data System (ADS)

    D'Antonio, Salvatore; Romano, Luigi; Khelil, Abdelmajid; Suri, Neeraj

    The INSPIRE project aims at enhancing the European potential in the field of security by ensuring the protection of critical information infrastructures through (a) the identification of their vulnerabilities and (b) the development of innovative techniques for securing networked process control systems. To increase the resilience of such systems INSPIRE will develop traffic engineering algorithms, diagnostic processes and self-reconfigurable architectures along with recovery techniques. Hence, the core idea of the INSPIRE project is to protect critical information infrastructures by appropriately configuring, managing, and securing the communication network which interconnects the distributed control systems. A working prototype will be implemented as a final demonstrator of selected scenarios. Controls/Communication Experts will support project partners in the validation and demonstration activities. INSPIRE will also contribute to standardization process in order to foster multi-operator interoperability and coordinated strategies for securing lifeline systems.

  16. A secured e-tendering modeling using misuse case approach

    NASA Astrophysics Data System (ADS)

    Mohd, Haslina; Robie, Muhammad Afdhal Muhammad; Baharom, Fauziah; Darus, Norida Muhd; Saip, Mohamed Ali; Yasin, Azman

    2016-08-01

    Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering. Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an unclear security framework. Particularly, the available systems are lacking in addressing integrity, confidentiality, authentication, and non-repudiation in e-tendering requirements. Thus, one of the challenges in developing an e-tendering system is to ensure the system requirements include the function for secured and trusted environment. Therefore, this paper aims to model a secured e-tendering system using misuse case approach. The modeling process begins with identifying the e-tendering process, which is based on the Australian Standard Code of Tendering (AS 4120-1994). It is followed by identifying security threats and their countermeasure. Then, the e-tendering was modelled using misuse case approach. The model can contribute to e-tendering developers and also to other researchers or experts in the e-tendering domain.

  17. 75 FR 11610 - Notice Announcing Addresses for Service of Process

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-11

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0076] Notice Announcing Addresses for Service of Process AGENCY: Social Security Administration. ACTION: Notice announcing addresses for summonses and complaints. SUMMARY: The Office of the General Counsel (OGC) is responsible for processing and...

  18. Perimeter security for Minnesota correctional facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crist, D.; Spencer, D.D.

    1996-12-31

    For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned newmore » construction at other facilities.« less

  19. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  20. 31 CFR 363.210 - Is there any period of time during which I will be unable to process certain transactions...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... certain transactions regarding my security? A closed book period will be in effect for four business days... which I will be unable to process certain transactions regarding my security? 363.210 Section 363.210..., DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT...

  1. A joint signal processing and cryptographic approach to multimedia encryption.

    PubMed

    Mao, Yinian; Wu, Min

    2006-07-01

    In recent years, there has been an increasing trend for multimedia applications to use delegate service providers for content distribution, archiving, search, and retrieval. These delegate services have brought new challenges to the protection of multimedia content confidentiality. This paper discusses the importance and feasibility of applying a joint signal processing and cryptographic approach to multimedia encryption, in order to address the access control issues unique to multimedia applications. We propose two atomic encryption operations that can preserve standard compliance and are friendly to delegate processing. Quantitative analysis for these operations is presented to demonstrate that a good tradeoff can be made between security and bitrate overhead. In assisting the design and evaluation of media security systems, we also propose a set of multimedia-oriented security scores to quantify the security against approximation attacks and to complement the existing notion of generic data security. Using video as an example, we present a systematic study on how to strategically integrate different atomic operations to build a video encryption system. The resulting system can provide superior performance over both generic encryption and its simple adaptation to video in terms of a joint consideration of security, bitrate overhead, and friendliness to delegate processing.

  2. EoE (Eosinophilic Esophagitis)

    MedlinePlus

    ... Sheet Q & A with Experts Patient Stories Social Security Disability Application Process For Kids For Teens Managing ... Q & A with Experts Health Information Sheet Social Security Disability Application Process For Family and Friends For ...

  3. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.

    PubMed

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-04-12

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

  4. Evaluation of IT security – genesis and its state-of-art

    NASA Astrophysics Data System (ADS)

    Livshitz, I. I.; Neklyudov, A. V.; Lontsikh, P. A.

    2018-05-01

    It is topical to evolve processes of an evaluation of the IT security nowadays. Formation and application of common evaluation approaches to the IT component, which are processed by the governmental and civil organizations, are still not solving problem. Successful processing of the independent evaluation for conformity with a security standard is supposed to be the main criteria of a suitability of any IT component to be used in a trusted computer system. The solution of the mentioned-above problem is suggested through the localization of all research, development and producing processes in a national trusted area (digital sovereignty).

  5. Safety and Security Interface Technology Initiative

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme)more » includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ‘tool box’ of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems’ essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.« less

  6. 40 CFR 122.3 - Exclusions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... an energy or mining facility, a storage facility or a seafood processing facility, or when secured to a storage facility or a seafood processing facility, or when secured to the bed of the ocean...

  7. 40 CFR 122.3 - Exclusions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... an energy or mining facility, a storage facility or a seafood processing facility, or when secured to a storage facility or a seafood processing facility, or when secured to the bed of the ocean...

  8. 40 CFR 122.3 - Exclusions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... an energy or mining facility, a storage facility or a seafood processing facility, or when secured to a storage facility or a seafood processing facility, or when secured to the bed of the ocean...

  9. 40 CFR 122.3 - Exclusions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... an energy or mining facility, a storage facility or a seafood processing facility, or when secured to a storage facility or a seafood processing facility, or when secured to the bed of the ocean...

  10. 40 CFR 122.3 - Exclusions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... an energy or mining facility, a storage facility or a seafood processing facility, or when secured to a storage facility or a seafood processing facility, or when secured to the bed of the ocean...

  11. Crisis prevention: how to gear up your board.

    PubMed

    Salmon, W J

    1993-01-01

    Today's critics of corporate boardrooms have plenty of ammunition. The two crucial responsibilities of boards-oversight of long-term company strategy and the selection, evaluation, and compensation of top management--were reduced to damage control during the 1980s. Walter Salmon, a longtime director, notes that while boards have improved since he began serving on them in 1961, they haven't kept pace with the need for real change. Based on over 30 years of boardroom experience, Salmon recommends against government reform of board practices. But he does prescribe a series of incremental changes as a remedy. To begin with, he suggests limiting the size of boards and increasing the number of outside directors on them. In fact, according to Salmon, only three insiders belong on a board: the CEO, the COO, and the CFO. Changing how committees function is also necessary for gearing up today's boards. The audit committee, for example, can periodically review "high-exposure areas" of a business, perhaps helping to prevent embarrassing drops in future profits. Compensation committees can structure incentive compensation for executives to emphasize long-term rather than short-term performance. And nominating committees should be responsible for finding new, independent directors--not the CEO. In general, boards as a whole must spot problems early and blow the whistle, exercising what Salmon calls, "constructive dissatisfaction." On a revitalized board, directors have enough confidence in the process to vigorously challenge one another, including the company's chief executive.

  12. 31 CFR 357.29 - Time required for processing transaction request.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Book-Entry Securities System (Legacy Treasury Direct) § 357.29 Time required for processing transaction request. For purposes of a transaction request affecting payment instructions with respect to a security...

  13. A Systems Engineering Framework for Implementing a Security and Critical Patch Management Process in Diverse Environments (Academic Departments' Workstations)

    NASA Astrophysics Data System (ADS)

    Mohammadi, Hadi

    Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to create and design a Security and Critical Patch Management Process (SCPMP) framework based on Systems Engineering (SE) principles. This framework will assist Information Technology Department Staff (ITDS) to reduce IT operating time and costs and mitigate the risk of security and vulnerability attacks. Further, this study evaluates implementation of the SCPMP in the networked computing systems of an academic environment in order to: 1. Meet patch management requirements by applying SE principles. 2. Reduce the cost of IT operations and PVM cycles. 3. Improve the current PVM methodologies to prevent networked computing systems from becoming the targets of security vulnerability attacks. 4. Embed a Maintenance Optimization Tool (MOT) in the proposed framework. The MOT allows IT managers to make the most practicable choice of methods for deploying and installing released patches and vulnerability remediation. In recent years, there has been a variety of frameworks for security practices in every networked computing system to protect computer workstations from becoming compromised or vulnerable to security attacks, which can expose important information and critical data. I have developed a new mechanism for implementing PVM for maximizing security-vulnerability maintenance, protecting OS and software packages, and minimizing SCPMP cost. To increase computing system security in any diverse environment, particularly in academia, one must apply SCPMP. I propose an optimal maintenance policy that will allow ITDS to measure and estimate the variation of PVM cycles based on their department's requirements. My results demonstrate that MOT optimizes the process of implementing SCPMP in academic workstations.

  14. Secure Enclaves: An Isolation-centric Approach for Creating Secure High Performance Computing Environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aderholdt, Ferrol; Caldwell, Blake A.; Hicks, Susan Elaine

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges formore » the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.« less

  15. 20 CFR 423.1 - Suits against the Social Security Administration and its employees in their official capacities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...

  16. 20 CFR 423.1 - Suits against the Social Security Administration and its employees in their official capacities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...

  17. 76 FR 45309 - Social Security Ruling 11-1p; Titles II and XVI: Procedures for Handling Requests To File...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-28

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0057] Social Security Ruling 11-1p; Titles II... AGENCY: Social Security Administration. ACTION: Notice of Social Security Ruling (SSR) SUMMARY: We are... administrative review process. This change will allow us to more efficiently use our limited resources to handle...

  18. 15 CFR 700.72 - Compulsory process.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS..., in the judgment of the Director of the Office of Strategic Industries and Economic Security, U.S. Department of Commerce, in consultation with the Chief Counsel for Industry and Security, U.S. Department of...

  19. A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms

    NASA Astrophysics Data System (ADS)

    Hassan, Ahmed A.; Bahgat, Waleed M.

    2010-01-01

    Security policies have different components; firewall, active directory, and IDS are some examples of these components. Enforcement of network security policies to low level security mechanisms faces some essential difficulties. Consistency, verification, and maintenance are the major ones of these difficulties. One approach to overcome these difficulties is to automate the process of translation of high level security policy into low level security mechanisms. This paper introduces a framework of an automation process that translates a high level security policy into low level security mechanisms. The framework is described in terms of three phases; in the first phase all network assets are categorized according to their roles in the network security and relations between them are identified to constitute the network security model. This proposed model is based on organization based access control (OrBAC). However, the proposed model extend the OrBAC model to include not only access control policy but also some other administrative security policies like auditing policy. Besides, the proposed model enables matching of each rule of the high level security policy with the corresponding ones of the low level security policy. Through the second phase of the proposed framework, the high level security policy is mapped into the network security model. The second phase could be considered as a translation of the high level security policy into an intermediate model level. Finally, the intermediate model level is translated automatically into low level security mechanism. The paper illustrates the applicability of proposed approach through an application example.

  20. 17 CFR 239.42 - Form F-X, for appointment of agent for service of process and undertaking for issuers registering...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., rights offering or business combination. 239.42 Section 239.42 Commodity and Securities Exchanges... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-X, for appointment of agent for service of process and undertaking for issuers registering securities on Form F-8, F-9, F-10...

  1. Improving the Quality of Service and Security of Military Networks with a Network Tasking Order Process

    DTIC Science & Technology

    2010-09-01

    IMPROVING THE QUALITY OF SERVICE AND SECURITY OF MILITARY NETWORKS WITH A NETWORK TASKING ORDER...United States. AFIT/DCS/ENG/10-09 IMPROVING THE QUALITY OF SERVICE AND SECURITY OF MILITARY NETWORKS WITH A NETWORK TASKING ORDER PROCESS...USAF September 2010 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED AFIT/DCS/ENG/10-09 IMPROVING THE QUALITY OF SERVICE AND

  2. Conceptualizations of water security in the agricultural sector: Perceptions, practices, and paradigms

    NASA Astrophysics Data System (ADS)

    Malekian, Atefe; Hayati, Dariush; Aarts, Noelle

    2017-01-01

    Conceptions of agricultural water security are conditioned by larger understandings of being and reality. It is still unclear what such understandings mean for perspectives on water security in general and on causes and solutions related to perceived water security risks and problems in agricultural sector in particular. Based on a systematic literature review, three conceptualizations of water security, related to different paradigms, are presented. Also the consequences of such conceptualizations for determining research objectives, research activities, and research outcomes on agricultural water security are discussed. The results showed that agricultural water security from a positivist paradigm referred to tangible and measurable water-related hazards and threats, such as floods and droughts, pollution, and so forth. A constructivist approach to agricultural water security, constituted by a process of interaction and negotiation, pointed at perceptions of water security of farmers and other stakeholders involved in agricultural sector. A critical approach to agricultural water security focused on the processes of securing vulnerable farmers and others from wider political, social, and natural impediments to sufficient water supplies. The conclusions of the study suggest that paradigms, underlying approaches should be expressed, clarified, and related to one another in order to find optimal and complementary ways to study water security issues in agricultural sector.

  3. 49 CFR 1572.9 - Applicant information required for HME security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    .... (13) Passport number. This information is voluntary and may expedite the adjudication process for... information is voluntary and may expedite the adjudication process for applicants who are U.S. citizens born... adjudication process for applicants who have completed a TSA security threat assessment. (16) Whether the...

  4. 10 CFR 712.16 - DOE security review.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... of the HRP process, the HRP certifying official must be notified and the security concern evaluated... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...

  5. Effect of Organizational Factors on Information Security Implementations

    ERIC Educational Resources Information Center

    Perez, Rafael G.

    2013-01-01

    The purpose of this quantitative inferential study is to determine the level of correlation between the organizational factors of information security awareness, balanced security processes, and organizational structure with the size of the estimation gap of information security implementations mediated by the end user intentionality. The study…

  6. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

    PubMed Central

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-01-01

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866

  7. 17 CFR 239.43 - Form F-N, appointment of agent for service of process by foreign banks and foreign insurance...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-N, appointment of agent for service of process by foreign banks and foreign insurance companies and certain of their holding companies and finance subsidiaries making public offerings of securities in the United States. 239.43 Section 239.43 Commodity and Securities...

  8. 17 CFR 269.5 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form F-X, for appointment of... INDENTURE ACT OF 1939 § 269.5 Form F-X, for appointment of agent for service of process by issuers..., F-10 or F-80. Form F-X shall be filed with the Commission: (a) By any issuer registering securities...

  9. 17 CFR 269.5 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form F-X, for appointment of... INDENTURE ACT OF 1939 § 269.5 Form F-X, for appointment of agent for service of process by issuers..., F-10 or F-80. Form F-X shall be filed with the Commission: (a) By any issuer registering securities...

  10. 17 CFR 239.43 - Form F-N, appointment of agent for service of process by foreign banks and foreign insurance...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Form F-N, appointment of agent for service of process by foreign banks and foreign insurance companies and certain of their holding companies and finance subsidiaries making public offerings of securities in the United States. 239.43 Section 239.43 Commodity and Securities...

  11. 76 FR 7817 - Announcing Draft Federal Information Processing Standard 180-4, Secure Hash Standard, and Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-11

    ... before May 12, 2011. ADDRESSES: Written comments may be sent to: Chief, Computer Security Division... FURTHER INFORMATION CONTACT: Elaine Barker, Computer Security Division, National Institute of Standards... Quynh Dang, Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD...

  12. Multimedia Security System for Security and Medical Applications

    ERIC Educational Resources Information Center

    Zhou, Yicong

    2010-01-01

    This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

  13. Women's Marginalization, Economic Flows, and Environmental Flows: A Classroom Approach.

    ERIC Educational Resources Information Center

    O'Lear, Shannon

    1999-01-01

    Discusses environmental security, focusing on the meaning of "security." Defines the global economy as a process in which the security of groups is sought, maintained, or threatened. Illustrates connections among environmental security, the global economy, and abuse of women and children in less economically developed places,…

  14. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    PubMed

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  15. The new risk paradigm for chemical process security and safety.

    PubMed

    Moore, David A

    2004-11-11

    The world of safety and security in the chemical process industries has certainly changed since 11 September, but the biggest challenges may be yet to come. This paper will explain that there is a new risk management paradigm for chemical security, discuss the differences in interpreting this risk versus accidental risk, and identify the challenges we can anticipate will occur in the future on this issue. Companies need to be ready to manage the new chemical security responsibilities and to exceed the expectations of the public and regulators. This paper will outline the challenge and a suggested course of action.

  16. Assessment of Information Security Management System based on ISO/IEC 27001:2013 On Subdirectorate of Data Center and Data Recovery Center in Ministry of Internal Affairs

    NASA Astrophysics Data System (ADS)

    Kurnianto, Ari; Isnanto, Rizal; Widodo, Aris Puji

    2018-02-01

    Information security is a problem effected business process of an organization, so it needs special concern. Information security assessment which is good and has international standard is done using Information Security Management System (ISMS) ISO/IEC 27001:2013. In this research, the high level assessment has been done using ISO/IEC 27001:2013 to observe the strength of information secuity in Ministry of Internal Affairs. The research explains about the assessment of information security management which is built using PHP. The input data use primary and secondary data which passed observation. The process gets maturity using the assessment of ISO/IEC 27001:2013. GAP Analysis observes the condition now a days and then to get recommendation and road map. The result of this research gets all of the information security process which has not been already good enough in Ministry of Internal Affairs, gives recommendation and road map to improve part of all information system being running. It indicates that ISO/IEC 27001:2013 is good used to rate maturity of information security management. As the next analyzation, this research use Clause and Annex in ISO/IEC 27001:2013 which is suitable with condition of Data Center and Data Recovery Center, so it gets optimum result and solving problem of the weakness information security.

  17. A code inspection process for security reviews

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Garzoglio, Gabriele; /Fermilab

    2009-05-01

    In recent years, it has become more and more evident that software threat communities are taking an increasing interest in Grid infrastructures. To mitigate the security risk associated with the increased numbers of attacks, the Grid software development community needs to scale up effort to reduce software vulnerabilities. This can be achieved by introducing security review processes as a standard project management practice. The Grid Facilities Department of the Fermilab Computing Division has developed a code inspection process, tailored to reviewing security properties of software. The goal of the process is to identify technical risks associated with an application andmore » their impact. This is achieved by focusing on the business needs of the application (what it does and protects), on understanding threats and exploit communities (what an exploiter gains), and on uncovering potential vulnerabilities (what defects can be exploited). The desired outcome of the process is an improvement of the quality of the software artifact and an enhanced understanding of possible mitigation strategies for residual risks. This paper describes the inspection process and lessons learned on applying it to Grid middleware.« less

  18. A code inspection process for security reviews

    NASA Astrophysics Data System (ADS)

    Garzoglio, Gabriele

    2010-04-01

    In recent years, it has become more and more evident that software threat communities are taking an increasing interest in Grid infrastructures. To mitigate the security risk associated with the increased numbers of attacks, the Grid software development community needs to scale up effort to reduce software vulnerabilities. This can be achieved by introducing security review processes as a standard project management practice. The Grid Facilities Department of the Fermilab Computing Division has developed a code inspection process, tailored to reviewing security properties of software. The goal of the process is to identify technical risks associated with an application and their impact. This is achieved by focusing on the business needs of the application (what it does and protects), on understanding threats and exploit communities (what an exploiter gains), and on uncovering potential vulnerabilities (what defects can be exploited). The desired outcome of the process is an improvement of the quality of the software artifact and an enhanced understanding of possible mitigation strategies for residual risks. This paper describes the inspection process and lessons learned on applying it to Grid middleware.

  19. 5 CFR 9701.221 - Classification requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Section 9701.221 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.221 Classification...

  20. 5 CFR 9701.221 - Classification requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Section 9701.221 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.221 Classification...

  1. 5 CFR 9701.221 - Classification requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Section 9701.221 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.221 Classification...

  2. 5 CFR 9701.221 - Classification requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Section 9701.221 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.221 Classification...

  3. 17 CFR 240.17Ad-19 - Requirements for cancellation, processing, storage, transportation, and destruction or other...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Requirements for cancellation....17Ad-19 Section 240.17Ad-19 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...

  4. Putting food on the public health table: Making food security relevant to regional health authorities.

    PubMed

    Rideout, Karen; Seed, Barbara; Ostry, Aleck

    2006-01-01

    Food security is emerging as an increasingly important public health issue. The purpose of this paper is to describe a conceptual model and five classes of food security indicators for regional health authorities (RHAs): direct, indirect, consequence, process, and supra-regional. The model was developed after a review of the food security literature and interviews with British Columbia community nutritionists and public health officials. We offer this conceptual model as a practical tool to help RHAs develop a comprehensive framework and use specific indicators, in conjunction with public health nutritionists and other community stakeholders. We recommend using all five classes of indicator together to ensure a complete assessment of the full breadth of food security. This model will be useful for Canadian health authorities wishing to take a holistic community-based approach to public health nutrition to develop more effective policies and programs to maximize food security. The model and indicators offer a rational process that could be useful for collaborative multi-stakeholder initiatives to improve food security.

  5. Controlled information destruction: the final frontier in preserving information security for every organisation

    NASA Astrophysics Data System (ADS)

    Curiac, Daniel-Ioan; Pachia, Mihai

    2015-05-01

    Information security represents the cornerstone of every data processing system that resides in an organisation's trusted network, implementing all necessary protocols, mechanisms and policies to be one step ahead of possible threats. Starting from the need to strengthen the set of security services, in this article we introduce a new and innovative process named controlled information destruction (CID) that is meant to secure sensitive data that are no longer needed for the organisation's future purposes but would be very damaging if revealed. The disposal of this type of data has to be controlled carefully in order to delete not only the information itself but also all its splinters spread throughout the network, thus denying any possibility of recovering the information after its alleged destruction. This process leads to a modified model of information assurance and also reconfigures the architecture of any information security management system. The scheme we envisioned relies on a reshaped information lifecycle, which reveals the impact of the CID procedure directly upon the information states.

  6. Security and Privacy in Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Edgar, Thomas W.; Rice, Theora R.

    As you have seen from the previous chapters, cyber-physical systems (CPS) are broadly used across technology and industrial domains. While these systems enable process optimization and efficiency and allow previously impossible functionality, security and privacy are key concerns for their design, development, and operation. CPS have been key components utilized in some of the highest publicized security breaches over the last decade. In this chapter, we will look over the CPS described in the previous chapters from a security perspective. In this chapter, we explain classical information and physical security fundamentals in the context of CPS and contextualize them acrossmore » application domains. We give examples where the interplay of functionality and diverse communication can introduce unexpected vulnerabilities and produce larger impacts. We will discuss how CPS security and privacy is inherently different from that of pure cyber or physical systems and what may be done to secure these systems, considering their emergent cyber-physical properties. Finally, we will discuss security and privacy implications of merging infrastructural and personal CPS. Our hope is to impart the knowledge of what CPS security and privacy are, why they are important, and explain existing processes and challenges.« less

  7. Support system, excavation arrangement, and process of supporting an object

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arnold, Bill W.

    2017-08-01

    A support system, an excavation arrangement, and a process of supporting an object are disclosed. The support system includes a weight-bearing device and a camming mechanism positioned below the weight-bearing device. A downward force on the weight-bearing device at least partially secures the camming mechanism to opposing surfaces. The excavation arrangement includes a borehole, a support system positioned within and secured to the borehole, and an object positioned on and supported by the support system. The process includes positioning and securing the support system and positioning the object on the weight-bearing device.

  8. An approach for investigation of secure access processes at a combined e-learning environment

    NASA Astrophysics Data System (ADS)

    Romansky, Radi; Noninska, Irina

    2017-12-01

    The article discuses an approach to investigate processes for regulation the security and privacy control at a heterogenous e-learning environment realized as a combination of traditional and cloud means and tools. Authors' proposal for combined architecture of e-learning system is presented and main subsystems and procedures are discussed. A formalization of the processes for using different types resources (public, private internal and private external) is proposed. The apparatus of Markovian chains (MC) is used for modeling and analytical investigation of the secure access to the resources is used and some assessments are presented.

  9. Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing

    NASA Astrophysics Data System (ADS)

    Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo

    2016-12-01

    Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.

  10. Survey on Security Issues in File Management in Cloud Computing Environment

    NASA Astrophysics Data System (ADS)

    Gupta, Udit

    2015-06-01

    Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data, generated by various devices in real time, with the advent of cloud networks. The privacy of users data is maintained by data centers around the world and hence it has become feasible to operate on that data from lightweight portable devices. But with ease of processing comes the security aspect of the data. One such security aspect is secure file transfer either internally within cloud or externally from one cloud network to another. File management is central to cloud computing and it is paramount to address the security concerns which arise out of it. This survey paper aims to elucidate the various protocols which can be used for secure file transfer and analyze the ramifications of using each protocol.

  11. The research of network database security technology based on web service

    NASA Astrophysics Data System (ADS)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  12. An alternative to sneakernet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orrell, S.; Ralstin, S.

    1992-04-01

    Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less

  13. An alternative to sneakernet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orrell, S.; Ralstin, S.

    1992-01-01

    Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less

  14. 75 FR 60158 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing of a Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-29

    ... Process in Providing Trustee Access to the Security Position Report Service September 24, 2010. Pursuant...'') service with an automated approval process. II. Self-Regulatory Organization's Statement of the Purpose of... approve a Trustee's access to the SPR service for a security is done manually, and the process is...

  15. 75 FR 69150 - Self-Regulatory Organizations; The Depository Trust Company; Order Approving Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-10

    ... Process in Providing Trustee Access to the Security Position Report Service November 4, 2010. I.... The current review process to approve a trustee's access to the SPR service for a security is done... a trustee's access to DTC's SPR service for an issue with an automated approval process, DTC will be...

  16. A new (Ba, Ca) (Ti, Zr)O3 based multiferroic composite with large magnetoelectric effect

    PubMed Central

    Naveed-Ul-Haq, M.; Shvartsman, Vladimir V.; Salamon, Soma; Wende, Heiko; Trivedi, Harsh; Mumtaz, Arif; Lupascu, Doru C.

    2016-01-01

    The lead-free ferroelectric 0.5Ba(Zr0.2Ti0.8)O3 − 0.5(Ba0.7Ca0.3)TiO3 (BCZT) is a promising component for multifunctional multiferroics due to its excellent room temperature piezoelectric properties. Having a composition close to the polymorphic phase boundary between the orthorhombic and tetragonal phases, it deserves a case study for analysis of its potential for modern electronics applications. To obtain magnetoelectric coupling, the piezoelectric phase needs to be combined with a suitable magnetostrictive phase. In the current article, we report on the synthesis, dielectric, magnetic, and magnetoelectric characterization of a new magnetoelectric multiferroic composite consisting of BCZT as a piezoelectric phase and CoFe2O4 (CFO) as the magnetostrictive phase. We found that this material is multiferroic at room temperature and manifests a magnetoelectric effect larger than that of BaTiO3 −CoFe2O4 bulk composites with similar content of the ferrite phase. PMID:27555563

  17. A new (Ba, Ca) (Ti, Zr)O3 based multiferroic composite with large magnetoelectric effect

    NASA Astrophysics Data System (ADS)

    Naveed-Ul-Haq, M.; Shvartsman, Vladimir V.; Salamon, Soma; Wende, Heiko; Trivedi, Harsh; Mumtaz, Arif; Lupascu, Doru C.

    2016-08-01

    The lead-free ferroelectric 0.5Ba(Zr0.2Ti0.8)O3 - 0.5(Ba0.7Ca0.3)TiO3 (BCZT) is a promising component for multifunctional multiferroics due to its excellent room temperature piezoelectric properties. Having a composition close to the polymorphic phase boundary between the orthorhombic and tetragonal phases, it deserves a case study for analysis of its potential for modern electronics applications. To obtain magnetoelectric coupling, the piezoelectric phase needs to be combined with a suitable magnetostrictive phase. In the current article, we report on the synthesis, dielectric, magnetic, and magnetoelectric characterization of a new magnetoelectric multiferroic composite consisting of BCZT as a piezoelectric phase and CoFe2O4 (CFO) as the magnetostrictive phase. We found that this material is multiferroic at room temperature and manifests a magnetoelectric effect larger than that of BaTiO3 -CoFe2O4 bulk composites with similar content of the ferrite phase.

  18. Synthesis and Characterization of Zirconium Substituted Cobalt Ferrite Nanopowders

    DOE PAGES

    Rus, S. F.; Vlazan, P.; Herklotz, A.

    2016-01-01

    Nanocrystalline ferrites; CoFe 2O 4 (CFO) and CoFe 1.9Zr 0.1O 4 (CFZO) have been synthesized through chemical coprecipitation method. Moreover, the role played by the zirconium ions in improving the magnetic and structural properties is analyzed. X-ray diffraction revealed a single-phase cubic spinel structure for both materials, where the crystallite size increases and the lattice parameter decreases with substitution of Zr. The average sizes of the nanoparticles are estimated to be 16-19 nm. These sizes are small enough to achieve the suitable signal to noise ratio in the high density recording media. An increase in the saturation magnetization with themore » substitution of Zr suggests the preferential occupation of Zr 4+ ions in the tetrahedral sites. A decrease in the coercivity values indicates the reduction of magneto-crystalline anisotropy. We investigated spinel ferrites can be used also in recoding media due to the large value of coercivity 1000 Oe which is comparable to those of hard magnetic materials.« less

  19. Simple Adaptive Single Differential Coherence Detection of BPSK Signals in IEEE 802.15.4 Wireless Sensor Networks

    PubMed Central

    Wen, Hong; Wang, Longye; Xie, Ping; Song, Liang; Tang, Jie; Liao, Runfa

    2017-01-01

    In this paper, we propose an adaptive single differential coherent detection (SDCD) scheme for the binary phase shift keying (BPSK) signals in IEEE 802.15.4 Wireless Sensor Networks (WSNs). In particular, the residual carrier frequency offset effect (CFOE) for differential detection is adaptively estimated, with only linear operation, according to the changing channel conditions. It was found that the carrier frequency offset (CFO) and chip signal-to-noise ratio (SNR) conditions do not need a priori knowledge. This partly benefits from that the combination of the trigonometric approximation sin−1(x)≈x and a useful assumption, namely, the asymptotic or high chip SNR, is considered for simplification of the full estimation scheme. Simulation results demonstrate that the proposed algorithm can achieve an accurate estimation and the detection performance can completely meet the requirement of the IEEE 802.15.4 standard, although with a little loss of reliability and robustness as compared with the conventional optimal single-symbol detector. PMID:29278404

  20. Simple Adaptive Single Differential Coherence Detection of BPSK Signals in IEEE 802.15.4 Wireless Sensor Networks.

    PubMed

    Zhang, Gaoyuan; Wen, Hong; Wang, Longye; Xie, Ping; Song, Liang; Tang, Jie; Liao, Runfa

    2017-12-26

    In this paper, we propose an adaptive single differential coherent detection (SDCD) scheme for the binary phase shift keying (BPSK) signals in IEEE 802.15.4 Wireless Sensor Networks (WSNs). In particular, the residual carrier frequency offset effect (CFOE) for differential detection is adaptively estimated, with only linear operation, according to the changing channel conditions. It was found that the carrier frequency offset (CFO) and chip signal-to-noise ratio (SNR) conditions do not need a priori knowledge. This partly benefits from that the combination of the trigonometric approximation sin - 1 ( x ) ≈ x and a useful assumption, namely, the asymptotic or high chip SNR, is considered for simplification of the full estimation scheme. Simulation results demonstrate that the proposed algorithm can achieve an accurate estimation and the detection performance can completely meet the requirement of the IEEE 802.15.4 standard, although with a little loss of reliability and robustness as compared with the conventional optimal single-symbol detector.

  1. 20 CFR 416.1019 - Quick disability determination process.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Quick disability determination process. 416.1019 Section 416.1019 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME... disagreement between the disability examiner and the medical or psychological consultant, the State agency will...

  2. Information Security – Guidance for Manually Completing the Information Security Awareness Training

    EPA Pesticide Factsheets

    The purpose of this guidance is to provide an alternative manual process for disseminating EPA Information Security Awareness Training (ISAT) materials and collecting results from EPA users who elect to complete the ISAT manually.

  3. 20 CFR 405.5 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL DISABILITY... means the Social Security Act, as amended. Administrative appeals judge means an official, other than an... employed by the Social Security Administration. Board means Decision Review Board. Commissioner means the...

  4. 45 CFR 164.308 - Administrative safeguards.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... accordance with § 164.306: (1)(i) Standard: Security management process. Implement policies and procedures to... to the confidentiality, integrity, and availability of electronic protected health information held...

  5. 45 CFR 164.308 - Administrative safeguards.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... accordance with § 164.306: (1)(i) Standard: Security management process. Implement policies and procedures to... to the confidentiality, integrity, and availability of electronic protected health information held...

  6. 5 CFR 9701.222 - Reconsideration of classification decisions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... decisions. 9701.222 Section 9701.222 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...

  7. Focus on Resiliency: A Process-Oriented Approach to Security

    DTIC Science & Technology

    2005-11-01

    by ANSI Std Z39-18 © 2005 Carnegie Mellon University CSI v1.0 2 Agenda About the SEI Characterizing the problem Security, resiliency, and risk A...2005 Carnegie Mellon University CSI v1.0 5 SEI Technical Programs Product Line Systems Dynamic Systems Software Engineering Process Management...University CSI v1.0 7 What is the problem? Is your organization’s security capability sufficient to identify and manage risks that result from failed

  8. 17 CFR 249.250 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form F-X, for appointment of... F-X, for appointment of agent for service of process by issuers registering securities on Form F-8... registered on Form F-7 (§ 249.37 of this chapter), F-8, F-9, F-10 or F-80. Form F-X shall be filed with the...

  9. 17 CFR 249.250 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form F-X, for appointment of... F-X, for appointment of agent for service of process by issuers registering securities on Form F-8... registered on Form F-7 (§ 249.37 of this chapter), F-8, F-9, F-10 or F-80. Form F-X shall be filed with the...

  10. AST: Activity-Security-Trust driven modeling of time varying networks.

    PubMed

    Wang, Jian; Xu, Jiake; Liu, Yanheng; Deng, Weiwen

    2016-02-18

    Network modeling is a flexible mathematical structure that enables to identify statistical regularities and structural principles hidden in complex systems. The majority of recent driving forces in modeling complex networks are originated from activity, in which an activity potential of a time invariant function is introduced to identify agents' interactions and to construct an activity-driven model. However, the new-emerging network evolutions are already deeply coupled with not only the explicit factors (e.g. activity) but also the implicit considerations (e.g. security and trust), so more intrinsic driving forces behind should be integrated into the modeling of time varying networks. The agents undoubtedly seek to build a time-dependent trade-off among activity, security, and trust in generating a new connection to another. Thus, we reasonably propose the Activity-Security-Trust (AST) driven model through synthetically considering the explicit and implicit driving forces (e.g. activity, security, and trust) underlying the decision process. AST-driven model facilitates to more accurately capture highly dynamical network behaviors and figure out the complex evolution process, allowing a profound understanding of the effects of security and trust in driving network evolution, and improving the biases induced by only involving activity representations in analyzing the dynamical processes.

  11. The Role of Human Factors/Ergonomics in the Science of Security: Decision Making and Action Selection in Cyberspace.

    PubMed

    Proctor, Robert W; Chen, Jing

    2015-08-01

    The overarching goal is to convey the concept of science of security and the contributions that a scientifically based, human factors approach can make to this interdisciplinary field. Rather than a piecemeal approach to solving cybersecurity problems as they arise, the U.S. government is mounting a systematic effort to develop an approach grounded in science. Because humans play a central role in security measures, research on security-related decisions and actions grounded in principles of human information-processing and decision-making is crucial to this interdisciplinary effort. We describe the science of security and the role that human factors can play in it, and use two examples of research in cybersecurity--detection of phishing attacks and selection of mobile applications--to illustrate the contribution of a scientific, human factors approach. In these research areas, we show that systematic information-processing analyses of the decisions that users make and the actions they take provide a basis for integrating the human component of security science. Human factors specialists should utilize their foundation in the science of applied information processing and decision making to contribute to the science of cybersecurity. © 2015, Human Factors and Ergonomics Society.

  12. 20 CFR 423.1 - Suits against the Social Security Administration and its employees in their official capacities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Suits against the Social Security Administration and its employees in their official capacities. 423.1 Section 423.1 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...

  13. 20 CFR 423.1 - Suits against the Social Security Administration and its employees in their official capacities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Suits against the Social Security Administration and its employees in their official capacities. 423.1 Section 423.1 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...

  14. 20 CFR 423.1 - Suits against the Social Security Administration and its employees in their official capacities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Suits against the Social Security Administration and its employees in their official capacities. 423.1 Section 423.1 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...

  15. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... COMMERCE SPECIAL CATEGORIES OF CONTRACTING SERVICE CONTRACTING Service Contracts-General 1337.110-70... processing for contractors performing services on or within a Department of Commerce facility or through an information technology (IT) system, as required by the Department of Commerce Security Manual and Department...

  16. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... COMMERCE SPECIAL CATEGORIES OF CONTRACTING SERVICE CONTRACTING Service Contracts-General 1337.110-70... processing for contractors performing services on or within a Department of Commerce facility or through an information technology (IT) system, as required by the Department of Commerce Security Manual and Department...

  17. 75 FR 68849 - Privacy Act of 1974: System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-09

    ... processing of personal information is conducted within established FAA computer security regulations. A risk... SECURITY CLASSIFICATION: Sensitive, unclassified SYSTEM LOCATION: Federal Aviation Administration (FAA... Enforcement Centers of the Drug Abatement Division; Office of Security and Hazardous Materials; Flight...

  18. 17 CFR 256.931 - Rents.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Rents. 256.931 Section 256.931 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) UNIFORM SYSTEM OF ACCOUNTS..., computers, data processing equipment, micro-wave and telecommunication equipment, airplanes, automobiles...

  19. A Systems Engineering Framework for Implementing a Security and Critical Patch Management Process in Diverse Environments (Academic Departments' Workstations)

    ERIC Educational Resources Information Center

    Mohammadi, Hadi

    2014-01-01

    Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…

  20. Deployment of ERP Systems at Automotive Industries, Security Inspection (Case Study: IRAN KHODRO Automotive Company)

    NASA Astrophysics Data System (ADS)

    Ali, Hatamirad; Hasan, Mehrjerdi

    Automotive industry and car production process is one of the most complex and large-scale production processes. Today, information technology (IT) and ERP systems incorporates a large portion of production processes. Without any integrated systems such as ERP, the production and supply chain processes will be tangled. The ERP systems, that are last generation of MRP systems, make produce and sale processes of these industries easier and this is the major factor of development of these industries anyhow. Today many of large-scale companies are developing and deploying the ERP systems. The ERP systems facilitate many of organization processes and make organization to increase efficiency. The security is a very important part of the ERP strategy at the organization, Security at the ERP systems, because of integrity and extensive, is more important of local and legacy systems. Disregarding of this point can play a giant role at success or failure of this kind of systems. The IRANKHODRO is the biggest automotive factory in the Middle East with an annual production over 600.000 cars. This paper presents ERP security deployment experience at the "IRANKHODRO Company". Recently, by launching ERP systems, it moved a big step toward more developments.

  1. A generalized architecture of quantum secure direct communication for N disjointed users with authentication

    NASA Astrophysics Data System (ADS)

    Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.

    2015-11-01

    In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.

  2. A generalized architecture of quantum secure direct communication for N disjointed users with authentication.

    PubMed

    Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A

    2015-11-18

    In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.

  3. People, Process, and Policy: Case Studies in National Security Advising, the National Security Council, and Presidential Decision Making

    DTIC Science & Technology

    2017-06-01

    processes. Rothkopf, David J. 2006. Running the World: The Inside Story of The National Security Council and The Architects of American Power . 1st ed...recognized Soviet aims. They aimed to gain power , spread communism, and counter the West. Eisenhower’s belief in American physical and ideological...The Architects of American Power . 1st ed. New York: Public Affairs: 322-324. 22 Burke, Honest Broker?, 341. 23 U.N. Ambassador Albright, Treasury

  4. Positive valence bias and parent-child relationship security moderate the association between early institutional caregiving and internalizing symptoms

    PubMed Central

    VanTieghem, Michelle R.; Gabard-Durnam, Laurel; Goff, Bonnie; Flannery, Jessica; Humphreys, Kathryn L.; Telzer, Eva H.; Caldera, Christina; Louie, Jennifer Y.; Shapiro, Mor; Bolger, Niall; Tottenham, Nim

    2018-01-01

    Institutional caregiving is associated with significant deviations from species-expected caregiving, altering the normative sequence of attachment formation and placing children at risk for long-term emotional difficulties. However, little is known about factors that can promote resilience following early institutional caregiving. In the current study, we investigated how adaptations in affective processing (i.e. positive valence bias) and family-level protective factors (i.e. secure parent-child relationships) moderate risk for internalizing symptoms in Previously Institutionalized (PI) youth. Children and adolescents with and without a history of institutional care performed a laboratory-based affective processing task and self-reported measures of parent-child relationship security. PI youth were more likely than comparison youth to show positive valence biases when interpreting ambiguous facial expressions. Both positive valence bias and parent-child relationship security moderated the association between institutional care and parent-reported internalizing symptoms, such that greater positive valence bias and more secure parent-child relationships predicted fewer symptoms in PI youth. However, when both factors were tested concurrently, parent-child relationship security more strongly moderated the link between PI status and internalizing symptoms. These findings suggest that both individual-level adaptations in affective processing and family-level factors of secure parent-child relationships may ameliorate risk for internalizing psychopathology following early institutional caregiving. PMID:28401841

  5. Triple symmetric key cryptosystem for data security

    NASA Astrophysics Data System (ADS)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  6. Positive valence bias and parent-child relationship security moderate the association between early institutional caregiving and internalizing symptoms.

    PubMed

    Vantieghem, Michelle R; Gabard-Durnam, Laurel; Goff, Bonnie; Flannery, Jessica; Humphreys, Kathryn L; Telzer, Eva H; Caldera, Christina; Louie, Jennifer Y; Shapiro, Mor; Bolger, Niall; Tottenham, Nim

    2017-05-01

    Institutional caregiving is associated with significant deviations from species-expected caregiving, altering the normative sequence of attachment formation and placing children at risk for long-term emotional difficulties. However, little is known about factors that can promote resilience following early institutional caregiving. In the current study, we investigated how adaptations in affective processing (i.e., positive valence bias) and family-level protective factors (i.e., secure parent-child relationships) moderate risk for internalizing symptoms in previously institutionalized (PI) youth. Children and adolescents with and without a history of institutional care performed a laboratory-based affective processing task and self-reported measures of parent-child relationship security. PI youth were more likely than comparison youth to show positive valence biases when interpreting ambiguous facial expressions. Both positive valence bias and parent-child relationship security moderated the association between institutional care and parent-reported internalizing symptoms, such that greater positive valence bias and more secure parent-child relationships predicted fewer symptoms in PI youth. However, when both factors were tested concurrently, parent-child relationship security more strongly moderated the link between PI status and internalizing symptoms. These findings suggest that both individual-level adaptations in affective processing and family-level factors of secure parent-child relationships may ameliorate risk for internalizing psychopathology following early institutional caregiving.

  7. 2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference

    DTIC Science & Technology

    2017-11-15

    beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and

  8. How to Perform a Security Audit: Is Your School's or District's Network Vulnerable?

    ERIC Educational Resources Information Center

    Dark, Melissa; Poftak, Amy

    2004-01-01

    In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…

  9. Systems Security Engineering Capability Maturity Model SSE-CMM Model Description Document

    DTIC Science & Technology

    1999-04-01

    management is the process of accessing and quantifying risk , and establishing an acceptable level of risk for the organization. Managing risk is an...Process of assessing and quantifying risk and establishing acceptable level of risk for the organization. [IEEE 13335-1:1996] Security Engineering

  10. 76 FR 31671 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-01

    ... Credentialing and Authentication Process--20 CFR 401.45--0960-NEW. Social Security is introducing a stronger citizen authentication process that will enable a new user to experience and access more electronic services. Background: Authentication is the foundation for secure, online transactions. Identity...

  11. 77 FR 52692 - NIST Federal Information Processing Standard (FIPS) 140-3 (Second Draft), Security Requirements...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-30

    ...-03] NIST Federal Information Processing Standard (FIPS) 140-3 (Second Draft), Security Requirements... Technology (NIST), Commerce. ACTION: Notice and Request for Comments. SUMMARY: The National Institute of Standards and Technology (NIST) seeks additional comments on specific sections of Federal Information...

  12. Report: EPA’s Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes

    EPA Pesticide Factsheets

    Report #18-P-0031, October 30, 2017. Although the EPA has an effective information security program, management emphasis is needed to achieve a higher level of maturity for the agency’s information security program.

  13. 75 FR 70310 - Sunshine Act Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-17

    ... Consumer Protection Act governing the security-based swap data repository registration process, the duties of such repositories, and the core principles applicable to such repositories. 4. The Commission will... security-based swap data repositories or the Commission and the public dissemination of security-based swap...

  14. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    ... as new developments in systems engineering, cyber-security, knowledge management and how best to... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Science and... the Under Secretary on policies, management processes, and organizational constructs as needed. Agenda...

  15. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-07

    ... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Science and... also advises the Under Secretary on policies, management processes, and organizational constructs as...

  16. Assessing the Security of Connected Diabetes Devices.

    PubMed

    Out, Dirk-Jan; Tettero, Olaf

    2017-03-01

    This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices.

  17. Anatomy of a Security Operations Center

    NASA Technical Reports Server (NTRS)

    Wang, John

    2010-01-01

    Many agencies and corporations are either contemplating or in the process of building a cyber Security Operations Center (SOC). Those Agencies that have established SOCs are most likely working on major revisions or enhancements to existing capabilities. As principle developers of the NASA SOC; this Presenters' goals are to provide the GFIRST community with examples of some of the key building blocks of an Agency scale cyber Security Operations Center. This presentation viII include the inputs and outputs, the facilities or shell, as well as the internal components and the processes necessary to maintain the SOC's subsistence - in other words, the anatomy of a SOC. Details to be presented include the SOC architecture and its key components: Tier 1 Call Center, data entry, and incident triage; Tier 2 monitoring, incident handling and tracking; Tier 3 computer forensics, malware analysis, and reverse engineering; Incident Management System; Threat Management System; SOC Portal; Log Aggregation and Security Incident Management (SIM) systems; flow monitoring; IDS; etc. Specific processes and methodologies discussed include Incident States and associated Work Elements; the Incident Management Workflow Process; Cyber Threat Risk Assessment methodology; and Incident Taxonomy. The Evolution of the Cyber Security Operations Center viII be discussed; starting from reactive, to proactive, and finally to proactive. Finally, the resources necessary to establish an Agency scale SOC as well as the lessons learned in the process of standing up a SOC viII be presented.

  18. Processing multilevel secure test and evaluation information

    NASA Astrophysics Data System (ADS)

    Hurlburt, George; Hildreth, Bradley; Acevedo, Teresa

    1994-07-01

    The Test and Evaluation Community Network (TECNET) is building a Multilevel Secure (MLS) system. This system features simultaneous access to classified and unclassified information and easy access through widely available communications channels. It provides the necessary separation of classification levels, assured through the use of trusted system design techniques, security assessments and evaluations. This system enables cleared T&E users to view and manipulate classified and unclassified information resources either using a single terminal interface or multiple windows in a graphical user interface. TECNET is in direct partnership with the National Security Agency (NSA) to develop and field the MLS TECNET capability in the near term. The centerpiece of this partnership is a state-of-the-art Concurrent Systems Security Engineering (CSSE) process. In developing the MLS TECNET capability, TECNET and NSA are providing members, with various expertise and diverse backgrounds, to participate in the CSSE process. The CSSE process is founded on the concepts of both Systems Engineering and Concurrent Engineering. Systems Engineering is an interdisciplinary approach to evolve and verify an integrated and life cycle balanced set of system product and process solutions that satisfy customer needs (ASD/ENS-MIL STD 499B 1992). Concurrent Engineering is design and development using the simultaneous, applied talents of a diverse group of people with the appropriate skills. Harnessing diverse talents to support CSSE requires active participation by team members in an environment that both respects and encourages diversity.

  19. A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform

    PubMed Central

    Kang, Jungho; Kim, Mansik; Park, Jong Hyuk

    2016-01-01

    With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms. PMID:27399699

  20. A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform.

    PubMed

    Kang, Jungho; Kim, Mansik; Park, Jong Hyuk

    2016-07-05

    With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms.

  1. Secure electronic commerce communication system based on CA

    NASA Astrophysics Data System (ADS)

    Chen, Deyun; Zhang, Junfeng; Pei, Shujun

    2001-07-01

    In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

  2. National Computer Security Conference Proceedings (11th): A Postscript: Computer Security--Into the Future, 17-20 October 1988

    DTIC Science & Technology

    1988-10-20

    The LOCK project , from its very beginnings as an implementation study for the Provably Secure Operating System in 1979...to the security field, can study to gain insight into the evaluation process. The project has developed an innovative format for the DTLS and FTLS...management tern becomes available, the Al Secure DBMS will be system (DBMS) that is currently being developed un- ported to it . der the Advanced

  3. [How to establish the hospital information system security policies].

    PubMed

    Gong, Qing-Yue; Shi, Cheng

    2008-03-01

    It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.

  4. Security Requirements Management in Software Product Line Engineering

    NASA Astrophysics Data System (ADS)

    Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario

    Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Witzke, Edward L.

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process,more » this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.« less

  6. Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm

    NASA Astrophysics Data System (ADS)

    Rachmawati, D.; Budiman, M. A.; Aulya, L.

    2018-02-01

    Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.

  7. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  8. Identification of yeasts during alcoholic fermentation of tchapalo, a traditional sorghum beer from Côte d'Ivoire.

    PubMed

    N'guessan, Kouadio Florent; Brou, Kouakou; Jacques, Noémie; Casaregola, Serge; Dje, Koffi Marcellin

    2011-05-01

    This study investigated the diversity and dynamics of yeasts involved in alcoholic fermentation of a traditional sorghum beer from Côte d'Ivoire, tchapalo. A total of 240 yeast strains were isolated from fermenting sorghum wort inoculated with dry yeast from two geographic regions of Côte d'Ivoire (Abidjan and Bondoukou). Initial molecular identification to the species level was carried out using RFLP of PCR-amplified internal transcribed spacers of rDNA (ITS1-5.8S-ITS2). Ten different profiles were obtained from the restriction of PCR products with the three endonucleases HaeIII, CfoI and HinfI. Sequence analysis of the D1/D2 domain of the 26S rDNA and the ACT1 gene allowed us to assign these groups to six different species: Saccharomyces cerevisiae-like, Candida tropicalis, Pichia kudriavzevii, Pichia kluyveri, Kodamaea ohmeri and Meyerozyma caribbica. The most frequent species associated with tchapalo fermentation was S. cerevisiae-like (87.36%), followed by C. tropicalis (5.45%) and M. caribbica (2.71%). S. cerevisiae-like strains were diploid heterozygotes and exhibited three to four nucleotides divergence from the type strain in the D1/D2 domain and several indels in the more discriminant sequence of the intron of the ACT1 gene. During the process, the yeast species isolated and their frequencies varied according to the geographic origin of the dry yeast. The occurrence of some species was sporadic and only two non-Saccharomyces species were found in the final product.

  9. Tantalum Etching with an Atmospheric Pressure Plasma Jet

    NASA Astrophysics Data System (ADS)

    Teslow, Hilary; Herrmann, Hans; Rosocha, Louis

    2002-10-01

    The APPJ is a non-thermal, atmospheric-pressure, glow discharge. A feedgas, composed of an inert carrier gas (e.g., He) and small concentrations of additives (e.g., O2, or CF4), flows between closely spaced electrodes powered at 13.56 MHz rf in a coaxial or parallel plate arrangement. The plasma has Te ˜ 2 eV and ne ˜ 10^11 cm-3. Electrons are not in thermal equilibrium with ions and neutrals: the electrons are ``hot", while the overall gas temperature is quite ``cold", typically 50-300 C. In the plasma, the gas is excited, dissociated or ionized by energetic electron impact. As the gas exits the discharge volume, ions and electrons are rapidly lost by recombination, leaving metastables (e.g. O2*, He*) and radicals (e.g. O, F, OF, O2F, CFO). These reactive species are then directed onto a surface to be processed. The APPJ has been developed for decontaminating nuclear, chemical, and biological agents. Atomic fluorine, and possibly other reactive species, can be used to convert actinides (e.g., U and Pu), into volatile fluorides (e.g., UF6, PuF6) that can be trapped, resulting in significant volume reduction of radioactive waste. In this talk, we will present results on using Ta as a surrogate for Pu in He/O2/CF4 etching plasmas. Results of experimental measurements of Ta etch rates for various gas mixtures and plasma jet standoff distance will be compared with plasma chemistry modeling of the concentrations of several active species produced in the plasma.

  10. 31 CFR 601.2 - Description of paper.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... the Secretary of the Treasury, security threads embedded beneath the surface of the paper during the manufacturing process. Security threads shall contain graphics consisting of the designation “USA” and the..., incorporated in the body of the paper while in the process of manufacture and evenly distributed throughout. In...

  11. 31 CFR 601.2 - Description of paper.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... the Secretary of the Treasury, security threads embedded beneath the surface of the paper during the manufacturing process. Security threads shall contain graphics consisting of the designation “USA” and the..., incorporated in the body of the paper while in the process of manufacture and evenly distributed throughout. In...

  12. 31 CFR 601.2 - Description of paper.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the Secretary of the Treasury, security threads embedded beneath the surface of the paper during the manufacturing process. Security threads shall contain graphics consisting of the designation “USA” and the..., incorporated in the body of the paper while in the process of manufacture and evenly distributed throughout. In...

  13. 31 CFR 601.2 - Description of paper.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... the Secretary of the Treasury, security threads embedded beneath the surface of the paper during the manufacturing process. Security threads shall contain graphics consisting of the designation “USA” and the..., incorporated in the body of the paper while in the process of manufacture and evenly distributed throughout. In...

  14. 31 CFR 601.2 - Description of paper.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the Secretary of the Treasury, security threads embedded beneath the surface of the paper during the manufacturing process. Security threads shall contain graphics consisting of the designation “USA” and the..., incorporated in the body of the paper while in the process of manufacture and evenly distributed throughout. In...

  15. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Personnel security processing requirements. 1337.110-70 Section 1337.110-70 Federal Acquisition Regulations System DEPARTMENT OF... where foreign national access to any DOC facility or DOC IT system is required. The language of the...

  16. 17 CFR 202.190 - Public Company Accounting Oversight Board budget approval process.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Public Company Accounting... SECURITIES AND EXCHANGE COMMISSION INFORMAL AND OTHER PROCEDURES Public Company Accounting Oversight Board (Regulation P) § 202.190 Public Company Accounting Oversight Board budget approval process. (a) Purpose. These...

  17. 17 CFR 202.190 - Public Company Accounting Oversight Board budget approval process.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Public Company Accounting... SECURITIES AND EXCHANGE COMMISSION INFORMAL AND OTHER PROCEDURES Public Company Accounting Oversight Board (Regulation P) § 202.190 Public Company Accounting Oversight Board budget approval process. (a) Purpose. These...

  18. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Personnel security processing requirements. 1337.110-70 Section 1337.110-70 Federal Acquisition Regulations System DEPARTMENT OF... where foreign national access to any DOC facility or DOC IT system is required. The language of the...

  19. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Personnel security processing requirements. 1337.110-70 Section 1337.110-70 Federal Acquisition Regulations System DEPARTMENT OF... where foreign national access to any DOC facility or DOC IT system is required. The language of the...

  20. 77 FR 70865 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... industry standard for processing and settling mutual fund transactions. Through automated, standardized... trend in the mutual fund industry toward omnibus processing, a practice where distribution firms bundle... to Fund/SERV[supreg] Fees November 20, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange...

  1. Social Security at the Crossroads.

    ERIC Educational Resources Information Center

    International Labour Review, 1980

    1980-01-01

    Social security schemes need to be streamlined and the underlying policies made more coherent to obtain the fullest possible return on expenditure. Third World countries need to reflect very seriously on the role of social security in the development process and on the management problems involved. (CT)

  2. Assessing the Security of Connected Diabetes Devices

    PubMed Central

    Out, Dirk-Jan; Tettero, Olaf

    2017-01-01

    This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices. PMID:28264190

  3. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  4. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  5. A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks

    PubMed Central

    Han, Guangjie; Liu, Li; Jiang, Jinfang; Shu, Lei; Rodrigues, Joel J.P.C.

    2016-01-01

    Localization is one of the hottest research topics in Underwater Wireless Sensor Networks (UWSNs), since many important applications of UWSNs, e.g., event sensing, target tracking and monitoring, require location information of sensor nodes. Nowadays, a large number of localization algorithms have been proposed for UWSNs. How to improve location accuracy are well studied. However, few of them take location reliability or security into consideration. In this paper, we propose a Collaborative Secure Localization algorithm based on Trust model (CSLT) for UWSNs to ensure location security. Based on the trust model, the secure localization process can be divided into the following five sub-processes: trust evaluation of anchor nodes, initial localization of unknown nodes, trust evaluation of reference nodes, selection of reference node, and secondary localization of unknown node. Simulation results demonstrate that the proposed CSLT algorithm performs better than the compared related works in terms of location security, average localization accuracy and localization ratio. PMID:26891300

  6. Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model.

    PubMed

    Moghaddasi, Hamid; Sajjadi, Samad; Kamkarhaghighi, Mehran

    2016-01-01

    Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. The "data security models" presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the "needs and improvement" cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.

  7. Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model

    PubMed Central

    Moghaddasi, Hamid; Kamkarhaghighi, Mehran

    2016-01-01

    Introduction: Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. Background: The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Findings: Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Conclusion: Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced. PMID:27857823

  8. Introducing the CERT (Trademark) Resiliency Engineering Framework: Improving the Security and Sustainability Processes

    DTIC Science & Technology

    2007-05-01

    Organizational Structure 40 6.1.3 Funding Model 40 6.1.4 Role of Information Technology 40 6.2 Considering Process Improvement 41 6.2.1 Dimensions of...to the process definition for resiliency engineering. 6.1.3 Funding Model Just as organizational structures tend to align across security and...responsibility. Adopting an enter- prise view of operational resiliency and a process improvement approach requires that the funding model evolve to one

  9. Usage of information safety requirements in improving tube bending process

    NASA Astrophysics Data System (ADS)

    Livshitz, I. I.; Kunakov, E.; Lontsikh, P. A.

    2018-05-01

    This article is devoted to an improvement of the technological process's analysis with the information security requirements implementation. The aim of this research is the competition increase analysis in aircraft industry enterprises due to the information technology implementation by the example of the tube bending technological process. The article analyzes tube bending kinds and current technique. In addition, a potential risks analysis in a tube bending technological process is carried out in terms of information security.

  10. AST: Activity-Security-Trust driven modeling of time varying networks

    PubMed Central

    Wang, Jian; Xu, Jiake; Liu, Yanheng; Deng, Weiwen

    2016-01-01

    Network modeling is a flexible mathematical structure that enables to identify statistical regularities and structural principles hidden in complex systems. The majority of recent driving forces in modeling complex networks are originated from activity, in which an activity potential of a time invariant function is introduced to identify agents’ interactions and to construct an activity-driven model. However, the new-emerging network evolutions are already deeply coupled with not only the explicit factors (e.g. activity) but also the implicit considerations (e.g. security and trust), so more intrinsic driving forces behind should be integrated into the modeling of time varying networks. The agents undoubtedly seek to build a time-dependent trade-off among activity, security, and trust in generating a new connection to another. Thus, we reasonably propose the Activity-Security-Trust (AST) driven model through synthetically considering the explicit and implicit driving forces (e.g. activity, security, and trust) underlying the decision process. AST-driven model facilitates to more accurately capture highly dynamical network behaviors and figure out the complex evolution process, allowing a profound understanding of the effects of security and trust in driving network evolution, and improving the biases induced by only involving activity representations in analyzing the dynamical processes. PMID:26888717

  11. Emerging Security Mechanisms for Medical Cyber Physical Systems.

    PubMed

    Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K

    2016-01-01

    The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.

  12. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1981-04-15

    on item were processed through the screening system daily. The airline and airport security measures developed continue to provide increased safety...United States or Puerto Rico. None of these 16 hijackings resulted from insufficient airport security measures or a breakdown in the FAA-approved airport ... airport security programs is conducted at the Transportation Safety Institute in Oklahoma City, Oklahoma. The course provides in-depth coverage of civil

  13. 17 CFR 249.508 - Form 8-M, consent to service of process by a corporation which is a nonresident broker-dealer.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form 8-M, consent to service... and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) FORMS, SECURITIES EXCHANGE ACT... pursuant to Rule 15b1-5 (§ 240.15b1-5 of this chapter) by each corporate nonresident broker-dealer...

  14. A Network Centric Warfare (NCW) Compliance Process for Australian Defence

    DTIC Science & Technology

    2006-08-01

    discovery and access by a wide range of authorised Defence users. The information could be used to simplify future NCW Compliance Assessments by re-using...Security standards 1. General Security Services - General Table 5.1 2. General Security services - Authentication Table 5.2 3. General Security...Personnel Positions in an authorised establishment must be filled by individuals who satisfy the necessary individual readiness requirements

  15. ITIL{sup ®} and information security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jašek, Roman; Králík, Lukáš; Popelka, Miroslav

    2015-03-10

    This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The conclusion is about link between standards, which are related to security, and ITIL framework.

  16. Software Assurance in Acquisition: Mitigating Risks to the Enterprise. A Reference Guide for Security-Enhanced Software Acquisition and Outsourcing

    DTIC Science & Technology

    2009-02-01

    management, available at <http://www.iso.org/ iso /en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=39612&ICS1=35&ICS2=40 &ICS3=>. ISO /IEC 27001 . Information...Management of the Systems Engineering Process. [ ISO /IEC 27001 ] ISO /IEC 27001 :2005. Information technology -- Security techniques -- Information security...software life cycles [ ISO /IEC 15026]. Software assurance is a key element of national security and homeland security. It is critical because dramatic

  17. Cyber security best practices for the nuclear industry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Badr, I.

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  18. A Framework for an Institutional High Level Security Policy for the Processing of Medical Data and their Transmission through the Internet

    PubMed Central

    Pangalos, George

    2001-01-01

    Background The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. Objective To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. Methods We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. Results We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. Conclusions The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a specific implementation environment. When implemented in specific environments, these principles and guidelines must also be complemented by measures, which are more specific. Even when a High Level Security Policy already exists in an institution, it is advisable that the management of the Health Care Establishment periodically revisits it to see whether it should be modified or augmented. PMID:11720956

  19. A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet.

    PubMed

    Ilioudis, C; Pangalos, G

    2001-01-01

    The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a specific implementation environment. When implemented in specific environments, these principles and guidelines must also be complemented by measures, which are more specific. Even when a High Level Security Policy already exists in an institution, it is advisable that the management of the Health Care Establishment periodically revisits it to see whether it should be modified or augmented.

  20. Administrative review process for adjudicating initial disability claims. Final rule.

    PubMed

    2006-03-31

    The Social Security Administration is committed to providing the high quality of service the American people expect and deserve. In light of the significant growth in the number of disability claims and the increased complexity of those claims, the need to make substantial changes in our disability determination process has become urgent. We are publishing a final rule that amends our administrative review process for applications for benefits that are based on whether you are disabled under title II of the Social Security Act (the Act), or applications for supplemental security income (SSI) payments that are based on whether you are disabled or blind under title XVI of the Act. We expect that this final rule will improve the accuracy, consistency, and timeliness of decision-making throughout the disability determination process.

  1. Research on key technologies of data processing in internet of things

    NASA Astrophysics Data System (ADS)

    Zhu, Yangqing; Liang, Peiying

    2017-08-01

    The data of Internet of things (IOT) has the characteristics of polymorphism, heterogeneous, large amount and processing real-time. The traditional structured and static batch processing method has not met the requirements of data processing of IOT. This paper studied a middleware that can integrate heterogeneous data of IOT, and integrated different data formats into a unified format. Designed a data processing model of IOT based on the Storm flow calculation architecture, integrated the existing Internet security technology to build the Internet security system of IOT data processing, which provided reference for the efficient transmission and processing of IOT data.

  2. Cyber / Physical Security Vulnerability Assessment Integration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Simpkins, Bret E.

    Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness, before penetrating further into the defenses. The proper identification and assessment of the overlapping areas (and interaction between these areas) in the VA process is necessary to accurately assess the true risk.« less

  3. 6 CFR 5.24 - Classified information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Classified information. 5.24 Section 5.24 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.24 Classified information. In processing a request for access to a record...

  4. Recurrent Otitis Media and Attachment Security: A Path Model.

    ERIC Educational Resources Information Center

    McCallum, Michelle S.; McKim, Margaret K.

    1999-01-01

    Used regular telephone interviews over six months to examine processes through which recurrent episodes of otitis media influence children's attachment security. Found that recurrent otitis media negatively affected attachment security by increasing mothers' perceptions of their children as behaving more negatively. Parenting stress was not…

  5. 15 CFR 30.5 - Electronic Export Information filing application and certification processes and standards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Census Bureau's Foreign Trade Division Computer Security Officer and refrain from using AESDirect until... Bureau's Foreign Trade Division Computer Security Officer that the company's computer systems accessing... threat to national security interests such that its participation in postdeparture filing should be...

  6. 15 CFR 30.5 - Electronic Export Information filing application and certification processes and standards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Census Bureau's Foreign Trade Division Computer Security Officer and refrain from using AESDirect until... Bureau's Foreign Trade Division Computer Security Officer that the company's computer systems accessing... threat to national security interests such that its participation in postdeparture filing should be...

  7. 15 CFR 30.5 - Electronic Export Information filing application and certification processes and standards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Census Bureau's Foreign Trade Division Computer Security Officer and refrain from using AESDirect until... Bureau's Foreign Trade Division Computer Security Officer that the company's computer systems accessing... threat to national security interests such that its participation in postdeparture filing should be...

  8. Integrated Work Management: Overview, Course 31881

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Simpson, Lewis Edward

    Integrated work management (IWM) is the process used for formally implementing the five-step process associated with integrated safety management (ISM) and integrated safeguards and security management (ISSM) at Los Alamos National Laboratory (LANL). IWM also directly supports the LANL Environmental Management System (EMS). IWM helps all workers and managers perform work safely and securely and in a manner that protects people, the environment, property, and the security of the nation. The IWM process applies to all work activities at LANL, from working in the office to designing experiments to assembling and detonating explosives. The primary LANL document that establishes andmore » describes IWM requirements is Procedure (P) 300, Integrated Work Management.« less

  9. Texting "boosts" felt security.

    PubMed

    Otway, Lorna J; Carnelley, Katherine B; Rowe, Angela C

    2014-01-01

    Attachment security can be induced in laboratory settings (e.g., Rowe & Carnelley, 2003) and the beneficial effects of repeated security priming can last for a number of days (e.g., Carnelley & Rowe, 2007). The priming process, however, can be costly in terms of time. We explored the effectiveness of security priming via text message. Participants completed a visualisation task (a secure attachment experience or neutral experience) in the laboratory. On three consecutive days following the laboratory task, participants received (secure or neutral) text message visualisation tasks. Participants in the secure condition reported significantly higher felt security than those in the neutral condition, immediately after the laboratory prime, after the last text message prime and one day after the last text prime. These findings suggest that security priming via text messages is an innovative methodological advancement that effectively induces felt security, representing a potential direction forward for security priming research.

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pind, C.

    The SECURE heating reactor was designed by ASEA-ATOM as a realistic alternative for district heating in urban areas and for supplying heat to process industries. SECURE has unique safety characteristics, that are based on fundamental laws of physics. The safety does not depend on active components or operator intervention for shutdown and cooling of the reactor. The inherent safety characteristics of the plant cannot be affected by operator errors. Due to its very low environment impact, it can be sited close to heat consumers. The SECURE heating reactor has been shown to be competitive in comparison with other alternatives formore » heating Helsinki and Seoul. The SECURE heating reactor forms a basis for the power-producing SECURE-P reactor known as PIUS (Process Inherent Ultimate Safety), which is based on the same inherent safety principles. The thermohydraulic function and transient response have been demonstrated in a large electrically heated loop at the ASEA-ATOM laboratories.« less

  11. Future of Assurance: Ensuring that a System is Trustworthy

    NASA Astrophysics Data System (ADS)

    Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid; Vishik, Claire

    Significant efforts are put in defining and implementing strong security measures for all components of the comput-ing environment. It is equally important to be able to evaluate the strength and robustness of these measures and establish trust among the components of the computing environment based on parameters and attributes of these elements and best practices associated with their production and deployment. Today the inventory of techniques used for security assurance and to establish trust -- audit, security-conscious development process, cryptographic components, external evaluation - is somewhat limited. These methods have their indisputable strengths and have contributed significantly to the advancement in the area of security assurance. However, shorter product and tech-nology development cycles and the sheer complexity of modern digital systems and processes have begun to decrease the efficiency of these techniques. Moreover, these approaches and technologies address only some aspects of security assurance and, for the most part, evaluate assurance in a general design rather than an instance of a product. Additionally, various components of the computing environment participating in the same processes enjoy different levels of security assurance, making it difficult to ensure adequate levels of protection end-to-end. Finally, most evaluation methodologies rely on the knowledge and skill of the evaluators, making reliable assessments of trustworthiness of a system even harder to achieve. The paper outlines some issues in security assurance that apply across the board, with the focus on the trustworthiness and authenticity of hardware components and evaluates current approaches to assurance.

  12. The National Security Policy Process: The National Security Council and Interagency System

    DTIC Science & Technology

    2008-11-24

    Service Officer who has served as the State Department’s Deputy Executive Secretary, and also was U.S. Ambassador to the State of Qatar from 1998...creation under President Truman. It describes the current NSC organizational structure and processes, and defines the roles of the key departments and...of doing business. Finally, the paper comments upon how the interagency process is incorporating new organizational structures associated with

  13. A generalized architecture of quantum secure direct communication for N disjointed users with authentication

    PubMed Central

    Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.

    2015-01-01

    In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N − 1 disjointed users u1, u2, …, uN−1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N − 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N − 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement. PMID:26577473

  14. Advancing the science of forensic data management

    NASA Astrophysics Data System (ADS)

    Naughton, Timothy S.

    2002-07-01

    Many individual elements comprise a typical forensics process. Collecting evidence, analyzing it, and using results to draw conclusions are all mutually distinct endeavors. Different physical locations and personnel are involved, juxtaposed against an acute need for security and data integrity. Using digital technologies and the Internet's ubiquity, these diverse elements can be conjoined using digital data as the common element. This result is a new data management process that can be applied to serve all elements of the community. The first step is recognition of a forensics lifecycle. Evidence gathering, analysis, storage, and use in legal proceedings are actually just distinct parts of a single end-to-end process, and thus, it is hypothesized that a single data system that can also accommodate each constituent phase using common network and security protocols. This paper introduces the idea of web-based Central Data Repository. Its cornerstone is anywhere, anytime Internet upload, viewing, and report distribution. Archives exist indefinitely after being created, and high-strength security and encryption protect data and ensure subsequent case file additions do not violate chain-of-custody or other handling provisions. Several legal precedents have been established for using digital information in courts of law, and in fact, effective prosecution of cyber crimes absolutely relies on its use. An example is a US Department of Agriculture division's use of digital images to back up its inspection process, with pictures and information retained on secure servers to enforce the Perishable Agricultural Commodities Act. Forensics is a cumulative process. Secure, web-based data management solutions, such as the Central Data Repository postulated here, can support each process step. Logically marrying digital technologies with Internet accessibility should help nurture a thought process to explore alternatives that make forensics data accessible to authorized individuals, whenever and wherever they need it.

  15. 6 CFR 5.7 - Classified information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Classified information. 5.7 Section 5.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Freedom of Information Act § 5.7 Classified information. In processing a request for information that is...

  16. The Importance of Trust in Electronic Commerce.

    ERIC Educational Resources Information Center

    Ratnasingham, Pauline

    1998-01-01

    Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)

  17. New Technology's Surprising Security Threats. Building Digital Libraries

    ERIC Educational Resources Information Center

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  18. 17 CFR 201.1100 - Creation of Fair Fund.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Creation of Fair Fund. 201.1100 Section 201.1100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Fair Fund and Disgorgement Plans § 201.1100 Creation of Fair Fund. In any agency process initiated...

  19. 17 CFR 201.1100 - Creation of Fair Fund.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Creation of Fair Fund. 201.1100 Section 201.1100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Fair Fund and Disgorgement Plans § 201.1100 Creation of Fair Fund. In any agency process initiated...

  20. 17 CFR 201.1100 - Creation of Fair Fund.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Creation of Fair Fund. 201.1100 Section 201.1100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Fair Fund and Disgorgement Plans § 201.1100 Creation of Fair Fund. In any agency process initiated...

  1. 17 CFR 201.1100 - Creation of Fair Fund.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Creation of Fair Fund. 201.1100 Section 201.1100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Fair Fund and Disgorgement Plans § 201.1100 Creation of Fair Fund. In any agency process initiated...

  2. 17 CFR 201.1100 - Creation of Fair Fund.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Creation of Fair Fund. 201.1100 Section 201.1100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Fair Fund and Disgorgement Plans § 201.1100 Creation of Fair Fund. In any agency process initiated...

  3. 75 FR 60488 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-30

    ... decisions. Data elements with respect to the SHORT subscription service that would be provided through the... information about technical data elements to support transmission and data-integrity processes between the... Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities [[Page...

  4. 12 CFR 380.53 - Repudiation of secured contract.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... POLICY ORDERLY LIQUIDATION AUTHORITY Receivership Administrative Claims Process § 380.53 Repudiation of secured contract. To the extent that a contract to which a covered financial company is a party is secured by property of the covered financial company, the repudiation of the contract by the Corporation as...

  5. 12 CFR 380.53 - Repudiation of secured contract.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... POLICY ORDERLY LIQUIDATION AUTHORITY Receivership Administrative Claims Process § 380.53 Repudiation of secured contract. To the extent that a contract to which a covered financial company is a party is secured by property of the covered financial company, the repudiation of the contract by the Corporation as...

  6. 32 CFR Appendix A to Part 223 - Procedures for Identifying and Controlling DoD UCNI

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security measures, including security plans, procedures, and equipment, for the physical protection of DoD... stand-alone personal computers, or shared-logic work processing systems, if protection from unauthorized... and security by increasing significantly the likelihood of the illegal production of nuclear weapons...

  7. 17 CFR 240.17g-5 - Conflicts of interest.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... section relating to issuing or maintaining a credit rating for a security or money market instrument... site a list of each such security or money market instrument for which it is currently in the process... or money market instrument, the name of the issuer, the date the rating process was initiated, and...

  8. 17 CFR 240.17g-5 - Conflicts of interest.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... section relating to issuing or maintaining a credit rating for a security or money market instrument... site a list of each such security or money market instrument for which it is currently in the process... or money market instrument, the name of the issuer, the date the rating process was initiated, and...

  9. 17 CFR 240.17g-5 - Conflicts of interest.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... section relating to issuing or maintaining a credit rating for a security or money market instrument... site a list of each such security or money market instrument for which it is currently in the process... or money market instrument, the name of the issuer, the date the rating process was initiated, and...

  10. 17 CFR 240.17g-5 - Conflicts of interest.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... section relating to issuing or maintaining a credit rating for a security or money market instrument... site a list of each such security or money market instrument for which it is currently in the process... or money market instrument, the name of the issuer, the date the rating process was initiated, and...

  11. 17 CFR 240.17g-5 - Conflicts of interest.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... section relating to issuing or maintaining a credit rating for a security or money market instrument... site a list of each such security or money market instrument for which it is currently in the process... or money market instrument, the name of the issuer, the date the rating process was initiated, and...

  12. 77 FR 13294 - Announcing Approval of Federal Information Processing Standard (FIPS) Publication 180-4, Secure...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-06

    ... hash algorithms in many computer network applications. On February 11, 2011, NIST published a notice in... Information Security Management Act (FISMA) of 2002 (Pub. L. 107-347), the Secretary of Commerce is authorized to approve Federal Information Processing Standards (FIPS). NIST activities to develop computer...

  13. 77 FR 17566 - Notice of Proposed Buy America Waivers

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-26

    ... their ongoing process to secure a domestic supplier of Lithium Ion batteries. FTA seeks public comment... ongoing process to secure and qualify a domestic supplier of Lithium Ion batteries. The ESU is one of five... Hydride (NiMH) batteries with Lithium Ion and determined Lithium Ion was appropriate for transit bus...

  14. Notification: Audit of EPA's Processes for Managing Background Investigations of Privileged Users and Taking Action to Remediate Weaknesses in Agency's Information Security Program

    EPA Pesticide Factsheets

    Project #OA-FY17-0139, Feb 15, 2017.The EPA OIG plans to begin preliminary research on an audit of EPA's processes for managing background investigations of privileged users and taking action to remediate weaknesses in agency's info security program.

  15. 76 FR 7102 - Simplified Network Application Processing System, On-line Registration and Account Maintenance

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-09

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 748 [Docket No. 100826397-1059-02] RIN 0694-AE98 Simplified Network Application Processing System, On-line Registration and Account Maintenance AGENCY: Bureau of Industry and Security, Commerce. ACTION: Final rule. SUMMARY: The Bureau of...

  16. Quantum technology and cryptology for information security

    NASA Astrophysics Data System (ADS)

    Naqvi, Syed; Riguidel, Michel

    2007-04-01

    Cryptology and information security are set to play a more prominent role in the near future. In this regard, quantum communication and cryptography offer new opportunities to tackle ICT security. Quantum Information Processing and Communication (QIPC) is a scientific field where new conceptual foundations and techniques are being developed. They promise to play an important role in the future of information Security. It is therefore essential to have a cross-fertilizing development between quantum technology and cryptology in order to address the security challenges of the emerging quantum era. In this article, we discuss the impact of quantum technology on the current as well as future crypto-techniques. We then analyse the assumptions on which quantum computers may operate. Then we present our vision for the distribution of security attributes using a novel form of trust based on Heisenberg's uncertainty; and, building highly secure quantum networks based on the clear transmission of single photons and/or bundles of photons able to withstand unauthorized reading as a result of secure protocols based on the observations of quantum mechanics. We argue how quantum cryptographic systems need to be developed that can take advantage of the laws of physics to provide long-term security based on solid assumptions. This requires a structured integration effort to deploy quantum technologies within the existing security infrastructure. Finally, we conclude that classical cryptographic techniques need to be redesigned and upgraded in view of the growing threat of cryptanalytic attacks posed by quantum information processing devices leading to the development of post-quantum cryptography.

  17. Computer simulation of functioning of elements of security systems

    NASA Astrophysics Data System (ADS)

    Godovykh, A. V.; Stepanov, B. P.; Sheveleva, A. A.

    2017-01-01

    The article is devoted to issues of development of the informational complex for simulation of functioning of the security system elements. The complex is described from the point of view of main objectives, a design concept and an interrelation of main elements. The proposed conception of the computer simulation provides an opportunity to simulate processes of security system work for training security staff during normal and emergency operation.

  18. 17 CFR 249.508 - Form 8-M, consent to service of process by a corporation which is a nonresident broker-dealer.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form 8-M, consent to service... and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) FORMS, SECURITIES EXCHANGE ACT...-dealer. This form shall be filed pursuant to Rule 15b1-5 (§ 240.15b1-5 of this chapter) by each corporate...

  19. 17 CFR 249.508 - Form 8-M, consent to service of process by a corporation which is a nonresident broker-dealer.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form 8-M, consent to service... and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) FORMS, SECURITIES EXCHANGE ACT...-dealer. This form shall be filed pursuant to Rule 15b1-5 (§ 240.15b1-5 of this chapter) by each corporate...

  20. 17 CFR 249.508 - Form 8-M, consent to service of process by a corporation which is a nonresident broker-dealer.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form 8-M, consent to service... and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) FORMS, SECURITIES EXCHANGE ACT...-dealer. This form shall be filed pursuant to Rule 15b1-5 (§ 240.15b1-5 of this chapter) by each corporate...

Top