Sample records for security check points

  1. The method of a joint intraday security check system based on cloud computing

    NASA Astrophysics Data System (ADS)

    Dong, Wei; Feng, Changyou; Zhou, Caiqi; Cai, Zhi; Dan, Xu; Dai, Sai; Zhang, Chuancheng

    2017-01-01

    The intraday security check is the core application in the dispatching control system. The existing security check calculation only uses the dispatch center’s local model and data as the functional margin. This paper introduces the design of all-grid intraday joint security check system based on cloud computing and its implementation. To reduce the effect of subarea bad data on the all-grid security check, a new power flow algorithm basing on comparison and adjustment with inter-provincial tie-line plan is presented. And the numerical example illustrated the effectiveness and feasibility of the proposed method.

  2. 46 CFR 10.214 - Security Check.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...

  3. 46 CFR 10.214 - Security Check.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...

  4. Analyzing the cost of screening selectee and non-selectee baggage.

    PubMed

    Virta, Julie L; Jacobson, Sheldon H; Kobza, John E

    2003-10-01

    Determining how to effectively operate security devices is as important to overall system performance as developing more sensitive security devices. In light of recent federal mandates for 100% screening of all checked baggage, this research studies the trade-offs between screening only selectee checked baggage and screening both selectee and non-selectee checked baggage for a single baggage screening security device deployed at an airport. This trade-off is represented using a cost model that incorporates the cost of the baggage screening security device, the volume of checked baggage processed through the device, and the outcomes that occur when the device is used. The cost model captures the cost of deploying, maintaining, and operating a single baggage screening security device over a one-year period. The study concludes that as excess baggage screening capacity is used to screen non-selectee checked bags, the expected annual cost increases, the expected annual cost per checked bag screened decreases, and the expected annual cost per expected number of threats detected in the checked bags screened increases. These results indicate that the marginal increase in security per dollar spent is significantly lower when non-selectee checked bags are screened than when only selectee checked bags are screened.

  5. The United States, Russia, Europe, and Security: How to Address the Unfinished Business of the Post-Cold War Era

    DTIC Science & Technology

    2012-04-01

    offered transparency and force limitations through clear rules of the game, enabling former enemies to keep suspicions in check. It guarantees...will have to change. Of course, it will change should oil prices drop to the point of getting Russia on its knees . Beyond such a scenario, there will...and addressing security challenges in and around Europe. Today’s declaratory policy hardly matches the facts on the ground, and the rules of the

  6. 28 CFR 105.27 - Miscellaneous provisions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...

  7. 28 CFR 105.27 - Miscellaneous provisions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...

  8. 28 CFR 105.27 - Miscellaneous provisions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...

  9. 28 CFR 105.27 - Miscellaneous provisions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...

  10. 28 CFR 105.27 - Miscellaneous provisions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...

  11. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  12. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  13. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  14. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  15. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  16. Fixed-point Design of the Lattice-reduction-aided Iterative Detection and Decoding Receiver for Coded MIMO Systems

    DTIC Science & Technology

    2011-01-01

    reliability, e.g., Turbo Codes [2] and Low Density Parity Check ( LDPC ) codes [3]. The challenge to apply both MIMO and ECC into wireless systems is on...REPORT Fixed-point Design of theLattice-reduction-aided Iterative Detection andDecoding Receiver for Coded MIMO Systems 14. ABSTRACT 16. SECURITY...illustrates the performance of coded LR aided detectors. 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13. SUPPLEMENTARY NOTES The views, opinions

  17. Finite-Time Performance of Local Search Algorithms: Theory and Application

    DTIC Science & Technology

    2010-06-10

    security devices deployed at airport security checkpoints are used to detect prohibited items (e.g., guns, knives, explosives). Each security device...security devices are deployed, the practical issue of determining how to optimally use them can be difficult. For an airport security system design...checked baggage), explosive detection systems (designed to detect explosives in checked baggage), and detailed hand search by an airport security official

  18. 31 CFR 515.405 - Exportation of securities, currency, checks, drafts and promissory notes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., checks, drafts and promissory notes. 515.405 Section 515.405 Money and Finance: Treasury Regulations..., drafts and promissory notes. Section 515.201 prohibits the exportation of securities, currency, checks, drafts and promissory notes to a designated foreign country. ...

  19. 31 CFR 515.405 - Exportation of securities, currency, checks, drafts and promissory notes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., checks, drafts and promissory notes. 515.405 Section 515.405 Money and Finance: Treasury Regulations..., drafts and promissory notes. Section 515.201 prohibits the exportation of securities, currency, checks, drafts and promissory notes to a designated foreign country. ...

  20. 31 CFR 515.405 - Exportation of securities, currency, checks, drafts and promissory notes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., checks, drafts and promissory notes. 515.405 Section 515.405 Money and Finance: Treasury Regulations..., drafts and promissory notes. Section 515.201 prohibits the exportation of securities, currency, checks, drafts and promissory notes to a designated foreign country. ...

  1. 31 CFR 515.405 - Exportation of securities, currency, checks, drafts and promissory notes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., checks, drafts and promissory notes. 515.405 Section 515.405 Money and Finance: Treasury Regulations..., drafts and promissory notes. Section 515.201 prohibits the exportation of securities, currency, checks, drafts and promissory notes to a designated foreign country. ...

  2. 31 CFR 515.405 - Exportation of securities, currency, checks, drafts and promissory notes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., checks, drafts and promissory notes. 515.405 Section 515.405 Money and Finance: Treasury Regulations..., drafts and promissory notes. Section 515.201 prohibits the exportation of securities, currency, checks, drafts and promissory notes to a designated foreign country. ...

  3. 75 FR 23196 - Exchange Visitor Program-Secondary School Students

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-03

    .... diplomatic and foreign policy goals by encouraging this positive academic and social interaction. Experience... currently requires a private vendor name and social security number check of all potential host family... check or the name and social security number criminal background check. NCMEC would interpret...

  4. 49 CFR 1546.203 - Acceptance and screening of checked baggage.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... foreign air carrier must refuse to transport any individual's checked baggage or property if the...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR... deterring the carriage of any explosive or incendiary. Each foreign air carrier must use the procedures...

  5. A Weakest Precondition Approach to Robustness

    NASA Astrophysics Data System (ADS)

    Balliu, Musard; Mastroeni, Isabella

    With the increasing complexity of information management computer systems, security becomes a real concern. E-government, web-based financial transactions or military and health care information systems are only a few examples where large amount of information can reside on different hosts distributed worldwide. It is clear that any disclosure or corruption of confidential information in these contexts can result fatal. Information flow controls constitute an appealing and promising technology to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in the area of language-based security. Robustness asserts that an active attacker, who can modify program code in some fixed points (holes), is unable to disclose more private information than a passive attacker, who merely observes unclassified data. In this paper, we extend a method recently proposed for checking declassified non-interference in presence of passive attackers only, in order to check robustness by means of weakest precondition semantics. In particular, this semantics simulates the kind of analysis that can be performed by an attacker, i.e., from public output towards private input. The choice of semantics allows us to distinguish between different attacks models and to characterize the security of applications in different scenarios.

  6. 76 FR 23515 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-27

    ... material and would add new event notification requirements on the theft or loss of enhanced weapons...-2011-0017] RIN 3150-AI49 Enhanced Weapons, Firearms Background Checks, and Security Event Notifications... regulations governing security event notifications. These proposed regulations are consistent with the...

  7. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection

    PubMed Central

    Dai, Huning; Murphy, Christian; Kaiser, Gail

    2010-01-01

    Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations and inputs together with a certain runtime environment. One approach to detecting these vulnerabilities is fuzz testing. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, we present a new testing methodology called Configuration Fuzzing. Configuration Fuzzing is a technique whereby the configuration of the running application is mutated at certain execution points, in order to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks “security invariants” that, if violated, indicate a vulnerability. We discuss the approach and introduce a prototype framework called ConFu (CONfiguration FUzzing testing framework) for implementation. We also present the results of case studies that demonstrate the approach’s feasibility and evaluate its performance. PMID:21037923

  8. 76 FR 9034 - Privacy Act of 1974; Department of Homeland Security United States Citizenship and Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-16

    ... 1974; Department of Homeland Security United States Citizenship and Immigration Services--DHS/USCIS... of Homeland Security/ United States Citizenship and Immigration Services--SORN DHS/USCIS--013 E-Verify Self Check System of Records.'' The U.S. Citizenship and Immigration Services E-Verify Self Check...

  9. National Security and Immigration Policy: Reclaiming Terms, Measuring Success, and Setting Priorities

    DTIC Science & Technology

    2006-10-31

    Catholic Bishops. + Associate Professor, Department of Social Sciences, United States Military Academy, West Point, New York and Lieutenant Colonel...detailed form explaining their affiliations and travel history, and undergo consular interviews. In addition, the United States instituted new ...completed, but the task assumed a new life following the September 11th attacks. By the end of 2005, DHS had instituted “entry” (check-in

  10. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  11. Social Security Administration

    MedlinePlus

    ... Plan Costs my Social Security Check out your Social Security Statement , change your address & manage your benefits online today. Social Security Number Your Social Security number remains your ...

  12. Airport Viz - a 3D Tool to Enhance Security Operations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Koch, Daniel B

    2006-01-01

    In the summer of 2000, the National Safe Skies Alliance (NSSA) awarded a project to the Applied Visualization Center (AVC) at the University of Tennessee, Knoxville (UTK) to develop a 3D computer tool to assist the Federal Aviation Administration security group, now the Transportation Security Administration (TSA), in evaluating new equipment and procedures to improve airport checkpoint security. A preliminary tool was demonstrated at the 2001 International Aviation Security Technology Symposium. Since then, the AVC went on to construct numerous detection equipment models as well as models of several airports. Airport Viz has been distributed by the NSSA to amore » number of airports around the country which are able to incorporate their own CAD models into the software due to its unique open architecture. It provides a checkpoint design and passenger flow simulation function, a layout design and simulation tool for checked baggage and cargo screening, and a means to assist in the vulnerability assessment of airport access points for pedestrians and vehicles.« less

  13. Block-Level Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of Processor-Memory Transactions

    NASA Astrophysics Data System (ADS)

    Elbaz, Reouven; Torres, Lionel; Sassatelli, Gilles; Guillemin, Pierre; Bardouillet, Michel; Martinez, Albert

    The bus between the System on Chip (SoC) and the external memory is one of the weakest points of computer systems: an adversary can easily probe this bus in order to read private data (data confidentiality concern) or to inject data (data integrity concern). The conventional way to protect data against such attacks and to ensure data confidentiality and integrity is to implement two dedicated engines: one performing data encryption and another data authentication. This approach, while secure, prevents parallelizability of the underlying computations. In this paper, we introduce the concept of Block-Level Added Redundancy Explicit Authentication (BL-AREA) and we describe a Parallelized Encryption and Integrity Checking Engine (PE-ICE) based on this concept. BL-AREA and PE-ICE have been designed to provide an effective solution to ensure both security services while allowing for full parallelization on processor read and write operations and optimizing the hardware resources. Compared to standard encryption which ensures only confidentiality, we show that PE-ICE additionally guarantees code and data integrity for less than 4% of run-time performance overhead.

  14. Role-based access control permissions

    DOEpatents

    Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander

    2017-04-25

    Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.

  15. 32 CFR 635.6 - Name checks.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... justice purposes. To conduct a name check, users must have either the social security number/foreign...) Report Date; (3) Social Security Number; (4) Last Name; (5) First Name; (6) Protected Identity (Y/N); (7...) Provost Marshals/Directors of Emergency Services will ensure that an audit trail is established and...

  16. 32 CFR 635.6 - Name checks.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... justice purposes. To conduct a name check, users must have either the social security number/foreign...) Report Date; (3) Social Security Number; (4) Last Name; (5) First Name; (6) Protected Identity (Y/N); (7...) Provost Marshals/Directors of Emergency Services will ensure that an audit trail is established and...

  17. Secure open cloud in data transmission using reference pattern and identity with enhanced remote privacy checking

    NASA Astrophysics Data System (ADS)

    Vijay Singh, Ran; Agilandeeswari, L.

    2017-11-01

    To handle the large amount of client’s data in open cloud lots of security issues need to be address. Client’s privacy should not be known to other group members without data owner’s valid permission. Sometime clients are fended to have accessing with open cloud servers due to some restrictions. To overcome the security issues and these restrictions related to storing, data sharing in an inter domain network and privacy checking, we propose a model in this paper which is based on an identity based cryptography in data transmission and intermediate entity which have client’s reference with identity that will take control handling of data transmission in an open cloud environment and an extended remote privacy checking technique which will work at admin side. On behalf of data owner’s authority this proposed model will give best options to have secure cryptography in data transmission and remote privacy checking either as private or public or instructed. The hardness of Computational Diffie-Hellman assumption algorithm for key exchange makes this proposed model more secure than existing models which are being used for public cloud environment.

  18. Technologies to counter aviation security threats

    NASA Astrophysics Data System (ADS)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  19. Reducing software security risk through an integrated approach

    NASA Technical Reports Server (NTRS)

    Gilliam, D.; Powell, J.; Kelly, J.; Bishop, M.

    2001-01-01

    The fourth quarter delivery, FY'01 for this RTOP is a Property-Based Testing (PBT), 'Tester's Assistant' (TA). The TA tool is to be used to check compiled and pre-compiled code for potential security weaknesses that could be exploited by hackers. The TA Instrumenter, implemented mostly in C++ (with a small part in Java), parsels two types of files: Java and TASPEC. Security properties to be checked are written in TASPEC. The Instrumenter is used in conjunction with the Tester's Assistant Specification (TASpec)execution monitor to verify the security properties of a given program.

  20. Clauser-Horne-Shimony-Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query

    NASA Astrophysics Data System (ADS)

    Basak, Jyotirmoy; Maitra, Subhamoy

    2018-04-01

    In device-independent (DI) paradigm, the trustful assumptions over the devices are removed and CHSH test is performed to check the functionality of the devices toward certifying the security of the protocol. The existing DI protocols consider infinite number of samples from theoretical point of view, though this is not practically implementable. For finite sample analysis of the existing DI protocols, we may also consider strategies for checking device independence other than the CHSH test. In this direction, here we present a comparative analysis between CHSH and three-party Pseudo-telepathy game for the quantum private query protocol in DI paradigm that appeared in Maitra et al. (Phys Rev A 95:042344, 2017) very recently.

  1. 49 CFR 1544.203 - Acceptance and screening of checked baggage.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Acceptance and screening of checked baggage. 1544... SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.203 Acceptance and screening of checked... its authorized aircraft operator representative. (c) Screening of checked baggage. Except as provided...

  2. 31 CFR 240.16 - Checks issued to minor payees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Checks issued to minor payees. 240.16... ON THE UNITED STATES TREASURY Indorsement of Checks § 240.16 Checks issued to minor payees. (a) Checks in payment of principal and/or interest on U.S. securities that are issued to minors may be...

  3. 31 CFR 240.16 - Checks issued to minor payees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Checks issued to minor payees. 240.16... ON THE UNITED STATES TREASURY Indorsement of Checks § 240.16 Checks issued to minor payees. (a) Checks in payment of principal and/or interest on U.S. securities that are issued to minors may be...

  4. On the verification of intransitive noninterference in mulitlevel security.

    PubMed

    Ben Hadj-Alouane, Nejib; Lafrance, Stéphane; Lin, Feng; Mullins, John; Yeddes, Mohamed Moez

    2005-10-01

    We propose an algorithmic approach to the problem of verification of the property of intransitive noninterference (INI), using tools and concepts of discrete event systems (DES). INI can be used to characterize and solve several important security problems in multilevel security systems. In a previous work, we have established the notion of iP-observability, which precisely captures the property of INI. We have also developed an algorithm for checking iP-observability by indirectly checking P-observability for systems with at most three security levels. In this paper, we generalize the results for systems with any finite number of security levels by developing a direct method for checking iP-observability, based on an insightful observation that the iP function is a left congruence in terms of relations on formal languages. To demonstrate the applicability of our approach, we propose a formal method to detect denial of service vulnerabilities in security protocols based on INI. This method is illustrated using the TCP/IP protocol. The work extends the theory of supervisory control of DES to a new application domain.

  5. 42 CFR 455.436 - Federal database checks.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 4 2012-10-01 2012-10-01 false Federal database checks. 455.436 Section 455.436....436 Federal database checks. The State Medicaid agency must do all of the following: (a) Confirm the... databases. (b) Check the Social Security Administration's Death Master File, the National Plan and Provider...

  6. 42 CFR 455.436 - Federal database checks.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Federal database checks. 455.436 Section 455.436....436 Federal database checks. The State Medicaid agency must do all of the following: (a) Confirm the... databases. (b) Check the Social Security Administration's Death Master File, the National Plan and Provider...

  7. 42 CFR 455.436 - Federal database checks.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 4 2014-10-01 2014-10-01 false Federal database checks. 455.436 Section 455.436....436 Federal database checks. The State Medicaid agency must do all of the following: (a) Confirm the... databases. (b) Check the Social Security Administration's Death Master File, the National Plan and Provider...

  8. 42 CFR 455.436 - Federal database checks.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 4 2013-10-01 2013-10-01 false Federal database checks. 455.436 Section 455.436....436 Federal database checks. The State Medicaid agency must do all of the following: (a) Confirm the... databases. (b) Check the Social Security Administration's Death Master File, the National Plan and Provider...

  9. Perpetual Model Validation

    DTIC Science & Technology

    2017-03-01

    models of software execution, for example memory access patterns, to check for security intrusions. Additional research was performed to tackle the...considered using indirect models of software execution, for example memory access patterns, to check for security intrusions. Additional research ...deterioration for example , no longer corresponds to the model used during verification time. Finally, the research looked at ways to combine hybrid systems

  10. Metro Optical Networks for Homeland Security

    NASA Astrophysics Data System (ADS)

    Bechtel, James H.

    Metro optical networks provide an enticing opportunity for strengthening homeland security. Many existing and emerging fiber-optic networks can be adapted for enhanced security applications. Applications include airports, theme parks, sports venues, and border surveillance systems. Here real-time high-quality video and captured images can be collected, transported, processed, and stored for security applications. Video and data collection are important also at correctional facilities, courts, infrastructure (e.g., dams, bridges, railroads, reservoirs, power stations), and at military and other government locations. The scaling of DWDM-based networks allows vast amounts of data to be collected and transported including biometric features of individuals at security check points. Here applications will be discussed along with potential solutions and challenges. Examples of solutions to these problems are given. This includes a discussion of metropolitan aggregation platforms for voice, video, and data that are SONET compliant for use in SONET networks and the use of DWDM technology for scaling and transporting a variety of protocols. Element management software allows not only network status monitoring, but also provides optimized allocation of network resources through the use of optical switches or electrical cross connects.

  11. Performance optimization of internet firewalls

    NASA Astrophysics Data System (ADS)

    Chiueh, Tzi-cker; Ballman, Allen

    1997-01-01

    Internet firewalls control the data traffic in and out of an enterprise network by checking network packets against a set of rules that embodies an organization's security policy. Because rule checking is computationally more expensive than routing-table look-up, it could become a potential bottleneck for scaling up the performance of IP routers, which typically implement firewall functions in software. in this paper, we analyzed the performance problems associated with firewalls, particularly packet filters, propose a good connection cache to amortize the costly security check over the packets in a connection, and report the preliminary performance results of a trace-driven simulation that show the average packet check time can be reduced by a factor of 2.5 at the least.

  12. A slippery molecular assembly allows water as a self-erasable security marker

    PubMed Central

    Thirumalai, Rajasekaran; Mukhopadhyay, Rahul Dev; Praveen, Vakayil K.; Ajayaghosh, Ayyappanpillai

    2015-01-01

    Protection of currency and valuable documents from counterfeit continues to be a challenge. While there are many embedded security features available for document safety, they are not immune to forgery. Fluorescence is a sensitive property, which responds to external stimuli such as solvent polarity, temperature or mechanical stress, however practical use in security applications is hampered due to several reasons. Therefore, a simple and specific stimuli responsive security feature that is difficult to duplicate is of great demand. Herein we report the design of a fluorescent molecular assembly on which water behaves as a self-erasable security marker for checking the authenticity of documents at point of care. The underlying principle involves the disciplined self-assembly of a tailor-made fluorescent molecule, which initially form a weak blue fluorescence (λem = 425 nm, Φf = 0.13) and changes to cyan emission (λem = 488 nm,Φf = 0.18) in contact with water due to a reversible molecular slipping motion. This simple chemical tool, based on the principles of molecular self-assembly and fluorescence modulation, allows creation of security labels and optically masked barcodes for multiple documents authentication. PMID:25940779

  13. A slippery molecular assembly allows water as a self-erasable security marker.

    PubMed

    Thirumalai, Rajasekaran; Mukhopadhyay, Rahul Dev; Praveen, Vakayil K; Ajayaghosh, Ayyappanpillai

    2015-05-05

    Protection of currency and valuable documents from counterfeit continues to be a challenge. While there are many embedded security features available for document safety, they are not immune to forgery. Fluorescence is a sensitive property, which responds to external stimuli such as solvent polarity, temperature or mechanical stress, however practical use in security applications is hampered due to several reasons. Therefore, a simple and specific stimuli responsive security feature that is difficult to duplicate is of great demand. Herein we report the design of a fluorescent molecular assembly on which water behaves as a self-erasable security marker for checking the authenticity of documents at point of care. The underlying principle involves the disciplined self-assembly of a tailor-made fluorescent molecule, which initially form a weak blue fluorescence (λem = 425 nm, Φf = 0.13) and changes to cyan emission (λem = 488 nm,Φf = 0.18) in contact with water due to a reversible molecular slipping motion. This simple chemical tool, based on the principles of molecular self-assembly and fluorescence modulation, allows creation of security labels and optically masked barcodes for multiple documents authentication.

  14. 32 CFR 253.6 - Procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... continuation of assignment is not clearly consistent with the national interest. (d) Completed security forms (DD Form 398, Personnel Security Questionnaire (BI/SBI), or 398-2, Personnel Security Questionnaire (National Agency Check)) shall be forwarded to the Defense Industrial Security Clearance Office (DISCO...

  15. Health information security: a case study of three selected medical centers in iran.

    PubMed

    Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas

    2013-03-01

    Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients' electronic records and health information systems have become a source for hackers. This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that security measures were identified, based on the research literature and decision making matrix using experts' points of view. Among the 27 indicators, seven indicators were selected as effective indicators and Fuzzy AHP technique was used to determine the importance of security indicators. Based on the comparisons made between the three selected medical centers to assess the security of health information, it is concluded that Chamran hospital has the most acceptable level of security and attention in three indicators of "verification and system design, user access management, access control system", Al Zahra Hospital in two indicators of "access management and network access control" and Amin Hospital in "equipment safety and system design". In terms of information security, Chamran Hospital ranked first, Al-Zahra Hospital ranked second and Al- Zahra hospital has the third place.

  16. Health Information Security: A Case Study of Three Selected Medical Centers in Iran

    PubMed Central

    Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas

    2013-01-01

    Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients’ electronic records and health information systems have become a source for hackers. Methods This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that security measures were identified, based on the research literature and decision making matrix using experts’ points of view. Results and discussion Among the 27 indicators, seven indicators were selected as effective indicators and Fuzzy AHP technique was used to determine the importance of security indicators. Based on the comparisons made between the three selected medical centers to assess the security of health information, it is concluded that Chamran hospital has the most acceptable level of security and attention in three indicators of “verification and system design, user access management, access control system”, Al Zahra Hospital in two indicators of “access management and network access control” and Amin Hospital in “equipment safety and system design”. In terms of information security, Chamran Hospital ranked first, Al-Zahra Hospital ranked second and Al- Zahra hospital has the third place. PMID:23572861

  17. 28 CFR 105.23 - Procedure for requesting criminal history record check.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Procedure for requesting criminal history... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal history record check. These procedures only apply to participating states. An authorized employer may...

  18. 28 CFR 105.23 - Procedure for requesting criminal history record check.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Procedure for requesting criminal history... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal history record check. These procedures only apply to participating states. An authorized employer may...

  19. 28 CFR 105.23 - Procedure for requesting criminal history record check.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Procedure for requesting criminal history... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal history record check. These procedures only apply to participating states. An authorized employer may...

  20. 28 CFR 105.23 - Procedure for requesting criminal history record check.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Procedure for requesting criminal history... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal history record check. These procedures only apply to participating states. An authorized employer may...

  1. 28 CFR 105.23 - Procedure for requesting criminal history record check.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Procedure for requesting criminal history... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal history record check. These procedures only apply to participating states. An authorized employer may...

  2. 49 CFR 1572.21 - Procedures for TWIC security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...

  3. 49 CFR 1572.21 - Procedures for TWIC security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...

  4. 49 CFR 1572.21 - Procedures for TWIC security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...

  5. 49 CFR 1572.21 - Procedures for TWIC security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...

  6. 49 CFR 1572.21 - Procedures for TWIC security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...

  7. 7 CFR 1951.15 - Return of paid-in-full or satisfied notes to borrower.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... HOUSING SERVICE, RURAL BUSINESS-COOPERATIVE SERVICE, RURAL UTILITIES SERVICE, AND FARM SERVICE AGENCY..., cashier's check, certified check, Postal or bank money order, bank draft, or a check issued by a... making marginal releases or satisfactions or security instruments, the notes will be held until the...

  8. 31 CFR 306.37 - Interest on registered securities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., owners should promptly notify the Bureau of any change of address. (Form PD 345 may be used.) The..., they are named in the registration. (c) Collection of interest checks—(1) General. Interest checks may... PD 1461.) (d) Nonreceipt, loss, theft, or destruction of interest checks. If an interest check is not...

  9. 31 CFR 306.37 - Interest on registered securities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., owners should promptly notify the Bureau of any change of address. (Form PD 345 may be used.) The..., they are named in the registration. (c) Collection of interest checks—(1) General. Interest checks may... PD 1461.) (d) Nonreceipt, loss, theft, or destruction of interest checks. If an interest check is not...

  10. 31 CFR 306.37 - Interest on registered securities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., owners should promptly notify the Bureau of any change of address. (Form PD 345 may be used.) The..., they are named in the registration. (c) Collection of interest checks—(1) General. Interest checks may... PD 1461.) (d) Nonreceipt, loss, theft, or destruction of interest checks. If an interest check is not...

  11. 31 CFR 306.37 - Interest on registered securities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., owners should promptly notify the Bureau of any change of address. (Form PD 345 may be used.) The..., they are named in the registration. (c) Collection of interest checks—(1) General. Interest checks may... PD 1461.) (d) Nonreceipt, loss, theft, or destruction of interest checks. If an interest check is not...

  12. 31 CFR 306.37 - Interest on registered securities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., owners should promptly notify the Bureau of any change of address. (Form PD 345 may be used.) The..., they are named in the registration. (c) Collection of interest checks—(1) General. Interest checks may... PD 1461.) (d) Nonreceipt, loss, theft, or destruction of interest checks. If an interest check is not...

  13. 49 CFR 1572.15 - Procedures for HME security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...

  14. 49 CFR 1572.15 - Procedures for HME security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...

  15. 49 CFR 1572.15 - Procedures for HME security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...

  16. 49 CFR 1572.15 - Procedures for HME security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...

  17. 49 CFR 1572.15 - Procedures for HME security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...

  18. 32 CFR 154.8 - Types and scope of personnel security investigations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... interview, NAC, LACs, credit checks, developed character references (3), employment records checks... interview. While the kind of coverage provided for by the SBI determines eligibility for access to SCI, DoD... requiring resolution in the case concerned and generally consist of record checks and/or interviews with...

  19. 32 CFR 154.8 - Types and scope of personnel security investigations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... interview, NAC, LACs, credit checks, developed character references (3), employment records checks... interview. While the kind of coverage provided for by the SBI determines eligibility for access to SCI, DoD... requiring resolution in the case concerned and generally consist of record checks and/or interviews with...

  20. TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks

    NASA Astrophysics Data System (ADS)

    Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree

    2014-06-01

    The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.

  1. 76 FR 65740 - Extension of Agency Information Collection Activity Under OMB Review: Employment Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-24

    ... standards. The collection also requires airport operators to comply with a security directive by maintaining... airport operators maintain records of criminal history records checks and security threat assessments in... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency...

  2. 31 CFR 597.307 - Financial institution.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Commission under 15 U.S.C. 78a et seq., securities or commodities brokers and dealers, investment bankers or investment companies, currency exchanges, issuers, redeemers, or cashiers of traveler's checks, checks, money...

  3. On determining specifications and selections of alternative technologies for airport checked-baggage security screening.

    PubMed

    Feng, Qianmei

    2007-10-01

    Federal law mandates that every checked bag at all commercial airports be screened by explosive detection systems (EDS), explosive trace detection systems (ETD), or alternative technologies. These technologies serve as critical components of airport security systems that strive to reduce security risks at both national and global levels. To improve the operational efficiency and airport security, emerging image-based technologies have been developed, such as dual-energy X-ray (DX), backscatter X-ray (BX), and multiview tomography (MVT). These technologies differ widely in purchasing cost, maintenance cost, operating cost, processing rate, and accuracy. Based on a mathematical framework that takes into account all these factors, this article investigates two critical issues for operating screening devices: setting specifications for continuous security responses by different technologies; and selecting technology or combination of technologies for efficient 100% baggage screening. For continuous security responses, specifications or thresholds are used for classifying threat items from nonthreat items. By investigating the setting of specifications on system security responses, this article assesses the risk and cost effectiveness of various technologies for both single-device and two-device systems. The findings provide the best selection of image-based technologies for both single-device and two-device systems. Our study suggests that two-device systems outperform single-device systems in terms of both cost effectiveness and accuracy. The model can be readily extended to evaluate risk and cost effectiveness of multiple-device systems for airport checked-baggage security screening.

  4. Secure Distributed Human Computation

    NASA Astrophysics Data System (ADS)

    Gentry, Craig; Ramzan, Zulfikar; Stubblebine, Stuart

    In Peha’s Financial Cryptography 2004 invited talk, he described the Cyphermint PayCash system (see www.cyphermint.com), which allows people without bank accounts or credit cards (a sizeable segment of the U.S. population) to automatically and instantly cash checks, pay bills, or make Internet transactions through publicly-accessible kiosks. Since PayCash offers automated financial transactions and since the system uses (unprotected) kiosks, security is critical. The kiosk must decide whether a person cashing a check is really the person to whom the check was made out, so it takes a digital picture of the person cashing the check and transmits this picture electronically to a central office, where a human worker compares the kiosk’s picture to one that was taken when the person registered with Cyphermint. If both pictures are of the same person, then the human worker authorizes the transaction.

  5. Sub-pixel analysis to support graphic security after scanning at low resolution

    NASA Astrophysics Data System (ADS)

    Haas, Bertrand; Cordery, Robert; Gou, Hongmei; Decker, Steve

    2006-02-01

    Whether in the domain of audio, video or finance, our world tends to become increasingly digital. However, for diverse reasons, the transition from analog to digital is often much extended in time, and proceeds by long steps (and sometimes never completes). One such step is the conversion of information on analog media to digital information. We focus in this paper on the conversion (scanning) of printed documents to digital images. Analog media have the advantage over digital channels that they can harbor much imperceptible information that can be used for fraud detection and forensic purposes. But this secondary information usually fails to be retrieved during the conversion step. This is particularly relevant since the Check-21 act (Check Clearing for the 21st Century act) became effective in 2004 and allows images of checks to be handled by banks as usual paper checks. We use here this situation of check scanning as our primary benchmark for graphic security features after scanning. We will first present a quick review of the most common graphic security features currently found on checks, with their specific purpose, qualities and disadvantages, and we demonstrate their poor survivability after scanning in the average scanning conditions expected from the Check-21 Act. We will then present a novel method of measurement of distances between and rotations of line elements in a scanned image: Based on an appropriate print model, we refine direct measurements to an accuracy beyond the size of a scanning pixel, so we can then determine expected distances, periodicity, sharpness and print quality of known characters, symbols and other graphic elements in a document image. Finally we will apply our method to fraud detection of documents after gray-scale scanning at 300dpi resolution. We show in particular that alterations on legitimate checks or copies of checks can be successfully detected by measuring with sub-pixel accuracy the irregularities inherently introduced by the illegitimate process.

  6. 46 CFR 503.59 - Safeguarding classified information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Information Security Program § 503.59 Safeguarding classified information. (a) All classified information... security; (2) Takes appropriate steps to protect classified information from unauthorized disclosure or... security check; (2) To protect the classified information in accordance with the provisions of Executive...

  7. 48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or currency...

  8. 48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or currency...

  9. 48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or currency...

  10. 48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or currency...

  11. 48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or currency...

  12. Examining Passenger Flow Choke Points at Airports Using Discrete Event Simulation

    NASA Technical Reports Server (NTRS)

    Brown, Jeremy R.; Madhavan, Poomima

    2011-01-01

    The movement of passengers through an airport quickly, safely, and efficiently is the main function of the various checkpoints (check-in, security. etc) found in airports. Human error combined with other breakdowns in the complex system of the airport can disrupt passenger flow through the airport leading to lengthy waiting times, missing luggage and missed flights. In this paper we present a model of passenger flow through an airport using discrete event simulation that will provide a closer look into the possible reasons for breakdowns and their implications for passenger flow. The simulation is based on data collected at Norfolk International Airport (ORF). The primary goal of this simulation is to present ways to optimize the work force to keep passenger flow smooth even during peak travel times and for emergency preparedness at ORF in case of adverse events. In this simulation we ran three different scenarios: real world, increased check-in stations, and multiple waiting lines. Increased check-in stations increased waiting time and instantaneous utilization. while the multiple waiting lines decreased both the waiting time and instantaneous utilization. This simulation was able to show how different changes affected the passenger flow through the airport.

  13. Design and Implementation of Secure and Reliable Communication using Optical Wireless Communication

    NASA Astrophysics Data System (ADS)

    Saadi, Muhammad; Bajpai, Ambar; Zhao, Yan; Sangwongngam, Paramin; Wuttisittikulkij, Lunchakorn

    2014-11-01

    Wireless networking intensify the tractability in the home and office environment to connect the internet without wires but at the cost of risks associated with stealing the data or threat of loading malicious code with the intention of harming the network. In this paper, we proposed a novel method of establishing a secure and reliable communication link using optical wireless communication (OWC). For security, spatial diversity based transmission using two optical transmitters is used and the reliability in the link is achieved by a newly proposed method for the construction of structured parity check matrix for binary Low Density Parity Check (LDPC) codes. Experimental results show that a successful secure and reliable link between the transmitter and the receiver can be achieved by using the proposed novel technique.

  14. Small Nations in Multinational Operations and Armenian Perspectives

    DTIC Science & Technology

    2014-12-12

    National Security Powers: Are the Checks in Balance?” In U.S. Army War College Guide to National Security Issues, Volume II: National Security Policy and...SMALL NATIONS IN MULTINATIONAL OPERATIONS AND ARMENIAN PERSPECTIVES A thesis presented to the Faculty of the U.S. Army

  15. 48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead of...

  16. 48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead of...

  17. 48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead of...

  18. 48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead of...

  19. 48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead of...

  20. Analysis of an ABE Scheme with Verifiable Outsourced Decryption.

    PubMed

    Liao, Yongjian; He, Yichuan; Li, Fagen; Jiang, Shaoquan; Zhou, Shijie

    2018-01-10

    Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users' data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their "verify-then-decrypt" skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user.

  1. Analysis of an ABE Scheme with Verifiable Outsourced Decryption

    PubMed Central

    He, Yichuan; Li, Fagen; Jiang, Shaoquan; Zhou, Shijie

    2018-01-01

    Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their “verify-then-decrypt” skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user. PMID:29320418

  2. 17 CFR 260.11b-4 - Definition of “cash transaction” in section 311(b)(4).

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Definition of âcash transactionâ in section 311(b)(4). 260.11b-4 Section 260.11b-4 Commodity and Securities Exchanges SECURITIES... securities sold is made within 7 days after delivery of the goods or securities in currency or in checks or...

  3. 20 CFR 410.505 - Payees.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, TITLE IV-BLACK... family, the Social Security Administration may, in its discretion, certify to any two or more of such... same household and one of them dies before the check is cashed, the Social Security Administration may...

  4. 76 FR 6199 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-03

    ... XI. Voluntary Consensus Standards XII. Finding of No Significant Environmental Impact XIII. Paperwork... potential advantages to NRC licensees and certificate holders to enhance security. The first advantage is... advantage is that security personnel of certain licensees or certificate holders will be permitted to...

  5. Robust and reliable banknote authentification and print flaw detection with opto-acoustical sensor fusion methods

    NASA Astrophysics Data System (ADS)

    Lohweg, Volker; Schaede, Johannes; Türke, Thomas

    2006-02-01

    The authenticity checking and inspection of bank notes is a high labour intensive process where traditionally every note on every sheet is inspected manually. However with the advent of more and more sophisticated security features, both visible and invisible, and the requirement of cost reduction in the printing process, it is clear that automation is required. As more and more print techniques and new security features will be established, total quality security, authenticity and bank note printing must be assured. Therefore, this factor necessitates amplification of a sensorial concept in general. We propose a concept for both authenticity checking and inspection methods for pattern recognition and classification for securities and banknotes, which is based on the concept of sensor fusion and fuzzy interpretation of data measures. In the approach different methods of authenticity analysis and print flaw detection are combined, which can be used for vending or sorting machines, as well as for printing machines. Usually only the existence or appearance of colours and their textures are checked by cameras. Our method combines the visible camera images with IR-spectral sensitive sensors, acoustical and other measurements like temperature and pressure of printing machines.

  6. New ways in creating pixelgram images

    NASA Astrophysics Data System (ADS)

    Malureanu, Radu; Di Fabrizio, Enzo

    2006-09-01

    Since the diffraction gratings were invented, their use in various security systems has been exploited. Their big advantage is the low production cost and, in the same time, the difficulty of replicating them. Most of the nowadays security systems are using those gratings to prove their originality. They can be seen on all the CDs, DVDs, most of the major credit cards and even on the wine bottles. In this article we present a new way of making such gratings without changing the production steps but generating an even more difficult to be replicated item. This new way consists not only in changing the grating period so that various false colours can be seen, but also their orientation so that for a complete check of the grating it should be seen under a certain solid angle. In the same time, one can also keep the possibility to change the grating period so this way various colours can be seen for each angle variation. By combining these two techniques (changing period and changing the angle ones) one can indeed create different images for each view angle and thus increasing the security of the object. In the same time, as can be seen, from the fabrication point of view no further complications appear. The production steps are identical, the only difference being the pattern. The resolution of the grating is not increased necessarily so neither from this point of view will complications appear.

  7. Security in Active Networks

    DTIC Science & Technology

    1999-01-01

    Some means currently under investigation include domain-speci c languages which are easy to check (e.g., PLAN), proof-carrying code [NL96, Nec97...domain-speci c language coupled to an extension system with heavyweight checks. In this way, the frequent (per- packet) dynamic checks are inexpensive...to CISC architectures remains problematic. Typed assembly language [MWCG98] propagates type safety information to the assembly language level, so

  8. 27 CFR 72.25 - Deposit of collateral.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...

  9. 27 CFR 72.25 - Deposit of collateral.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...

  10. 27 CFR 72.25 - Deposit of collateral.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...

  11. 27 CFR 72.25 - Deposit of collateral.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...

  12. 27 CFR 72.25 - Deposit of collateral.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...

  13. How to Be Safe and Secure against School Vandalism.

    ERIC Educational Resources Information Center

    Stover, Del

    1990-01-01

    During 1990-91, vandals will cost the public schools $250 million. To battle vandalism, school executives are relying on numerous security techniques that police use to foil burglaries, including locks, alarms, electronic security systems, and antivandalism programs. Tips are provided for enlisting others' aid and checking a school's security…

  14. 10 CFR 37.29 - Relief from fingerprinting, identification, and criminal history records checks and other...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... under 27 CFR part 555; (4) Health and Human Services security risk assessments for possession and use of...; (6) State Radiation Control Program Directors and State Homeland Security Advisors or their designated State employee representatives; (7) Agreement State employees conducting security inspections on...

  15. Toward realizing high power semiconductor terahertz laser sources at room temperature

    NASA Astrophysics Data System (ADS)

    Razeghi, Manijeh

    2011-05-01

    The terahertz (THz) spectral range offers promising applications in science, industry, and military. THz penetration through nonconductors (fabrics, wood, plastic) enables a more efficient way of performing security checks (for example at airports), as illegal drugs and explosives could be detected. Being a non-ionizing radiation, THz radiation is environment-friendly enabling a safer analysis environment than conventional X-ray based techniques. However, the lack of a compact room temperature THz laser source greatly hinders mass deployment of THz systems in security check points and medical centers. In the past decade, tremendous development has been made in GaAs/AlGaAs based THz Quantum Cascade Laser (QCLs), with maximum operating temperatures close to 200 K (without magnetic field). However, higher temperature operation is severely limited by a small LO-phonon energy (~ 36 meV) in this material system. With a much larger LO-phonon energy of ~ 90 meV, III-Nitrides are promising candidates for room temperature THz lasers. However, realizing high quality material for GaN-based intersubband devices presents a significant challenge. Advances with this approach will be presented. Alternatively, recent demonstration of InP based mid-infrared QCLs with extremely high peak power of 120 W at room temperature opens up the possibility of producing high power THz emission with difference frequency generation through two mid-infrared wavelengths.

  16. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  17. Electronic Life Safety and Security Systems Federal Background Check Act of 2013

    THOMAS, 113th Congress

    Rep. Luetkemeyer, Blaine [R-MO-3

    2013-04-09

    House - 04/30/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. 49 CFR 1570.13 - False statements regarding security background checks by public transportation agency or railroad...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii...

  19. 78 FR 2214 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-10

    .... Voluntary Consensus Standards XI. Finding of No Significant Environmental Impact XII. Paperwork Reduction... ML110480470 of Nuclear Energy Institute, on the proposed ``Enhanced Weapons, Firearms Background Checks and... consensus standards. XI. Finding of No Significant Environmental Impact In the proposed rule published on...

  20. 29 CFR 9.12 - Contractor requirements and prerogatives.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... utilize employment screening processes (i.e., drug tests, background checks, security clearance checks, and similar pre-employment screening mechanisms) only when such processes are provided for by the... example, if the contractor holds a meeting for a group of employees on the predecessor contract in order...

  1. 29 CFR 9.12 - Contractor requirements and prerogatives.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... utilize employment screening processes (i.e., drug tests, background checks, security clearance checks, and similar pre-employment screening mechanisms) only when such processes are provided for by the... example, if the contractor holds a meeting for a group of employees on the predecessor contract in order...

  2. 29 CFR 9.12 - Contractor requirements and prerogatives.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... utilize employment screening processes (i.e., drug tests, background checks, security clearance checks, and similar pre-employment screening mechanisms) only when such processes are provided for by the... example, if the contractor holds a meeting for a group of employees on the predecessor contract in order...

  3. 29 CFR 1918.83 - Stowed cargo; tiering and breaking down.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 1918.83 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR LONGSHORING Handling Cargo § 1918.83 Stowed... cargo shall be checked in and out by the job boss. Before securing any reefer compartment, a check shall...

  4. The ALL-OUT Library; A Design for Computer-Powered, Multidimensional Services.

    ERIC Educational Resources Information Center

    Sleeth, Jim; LaRue, James

    1983-01-01

    Preliminary description of design of electronic library and home information delivery system highlights potentials of personal computer interface program (applying for service, assuring that users are valid, checking for measures, searching, locating titles) and incorporation of concepts used in other information systems (security checks,…

  5. 75 FR 44974 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Sensitive...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-30

    ... TSA PRA Officer, Office of Information Technology (OIT), TSA-11, Transportation Security... technological collection techniques or other forms of information technology. Information Collection Requirement... history records check (CHRC), (2) a name-based check to determine whether the individual poses or is...

  6. 31 CFR 240.8 - Reclamation of amounts of paid checks.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    .../check_security_new.pdf. Institutions may contact the Fiscal Service Questioned Documents Branch at (202...) Reclamation debts are due to be paid upon receipt of the reclamation by the reclamation debtor. Interest, penalties, and administrative costs associated with unpaid balances will accrue as follows: (1) Interest...

  7. Nonimmigrant Overstays: Brief Synthesis of the Issue

    DTIC Science & Technology

    2010-01-15

    finger biometric system for immigration identification17 to the major identity management and screening... finger scans and digital photographs) to check identity. Enhanced Border Security and Visa Entry Reform Act of 2002 The Enhanced Border Security ...further provides: “A determination by the Secretary of Homeland Security that an alien who applied for authorization to travel to the United States

  8. 49 CFR 1570.13 - False statements regarding security background checks by public transportation agency or railroad...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...

  9. 49 CFR 1570.13 - False statements regarding security background checks by public transportation agency or railroad...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...

  10. 49 CFR 1570.13 - False statements regarding security background checks by public transportation agency or railroad...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...

  11. 49 CFR 1570.13 - False statements regarding security background checks by public transportation agency or railroad...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...

  12. Hot Stuff.

    ERIC Educational Resources Information Center

    Patterson, Kristin

    1996-01-01

    Property theft at schools is a problem districts are having to confront. Deterrents include inventory checks and etching equipment with inventory control numbers. In Washington, D.C., officials are installing high-security equipment such as closed-circuit television, fiber-optics lines to secure computers, and motion detectors. (MLF)

  13. 78 FR 2438 - Agency Information Collection Activities; Existing Collection, Comments Requested: The National...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-11

    ... Collection, Comments Requested: The National Instant Criminal Background Check System (NICS) Point-of-Contact... Background Check System (NICS) Point-of-Contact (POC) State Final Determination Electronic Submission. (3... required to respond, as well as a brief abstract: Primary: Full Point-of-Contact (POC) States; Partial POC...

  14. 76 FR 30280 - Public Meeting To Discuss the Proposed Rule on Enhanced Weapons, Firearms Background Checks, and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ... Proposed Rule on Enhanced Weapons, Firearms Background Checks, and Security Event Notifications AGENCY... the proposed enhanced weapons rule, the two draft regulatory guides, and the draft weapons safety.... No formal comments on the proposed enhanced weapons rule or the draft guidance documents will be...

  15. 32 CFR Appendix A to Part 86 - Criminal History Background Check Procedures

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... responsibility in ensuring a safe and secure environment for children within DoD activities or private... installation level. An IRC will be completed on individuals with a DoD affiliation such as living or working on... checks through the SCHR to personnel offices working with law enforcement or investigative agencies. They...

  16. 32 CFR Appendix A to Part 86 - Criminal History Background Check Procedures

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... residences in an employment or security application. It is deemed unnecessary to conduct checks before 18... information exists regarding residence by the individual in the United States for 1 year or more since age 18... video equipment is acceptable provided it is monitored by an individual who has successfully completed a...

  17. Terrorist Watchlist Checks and Air Passenger Prescreening

    DTIC Science & Technology

    2009-12-30

    U.S. port of entry or at airport security checkpoints prior U.S. air carrier flights. For these purposes, CBP administers the Automated Targeting...Passenger Screening at Airport Security Checkpoints ................................. 14 9/11 Commission Recommendations and CAPPS II...individuals at either international ports of entries upon arrival at a U.S. port of entry or at airport security checkpoints prior U.S. air carrier

  18. [Field 4. Environmental safety practice in the intensive care unit. French-speaking Society of Intensive Care. French Society of Anesthesia and Resuscitation].

    PubMed

    Fougère, S; Beydon, L; Saulnier, F

    2008-10-01

    Medical devices are known to carry risks from design to scrap. Accident reports in ICU show that medical device account for only 20% of accidents. Formation of users and providing a postmarketing incident reporting are thus essential in health institutions. Clinical and engineering departments should cooperate to produce and secure procedures which should be applied during the lifetime of each clinical device. Several points should be especially fulfilled: close cooperation between clinical departments and biomedical engineering departments with available technicians, computer-based inventory of all devices, evaluation of specifications required before purchasing a new device, education of users on utilisation and maintenance, technical follow-up of devices and keeping maintenance and repair logs, ability to provide users with replacement devices, provision of check-lists before use, forging criteria to decide when device should be discarded. These principles are simple and should be considered as mandatory in order to improve medical device related security.

  19. [Basic consideration on the security checking of sick travelers at airports].

    PubMed

    Felkai, Péter; Mártai, István

    2012-09-02

    The authorities guarantee the safety of passengers during air travel by strict ground security measures. All of these measures are restrictive and can affect the health status of both healthy and ill travelers. Patients who are in critical condition or confined to a stretcher and have to be repatriated by stretcher on a regular flight, must pass the airport security check as well. But the developers of security system should take into account the medical safety of patients during the procedure. The relevant medical principles are painfully missing not only in Hungary, but unfortunately also at most international airports. On the basis of principles reviewed in the present publication, an unambiguous, professionally reconciled regulation is necessary that would serve as a guideline for airport management and authorities, as well as for the involved medical personnel. Although setting principles into practice requires a different solution at each airport, yet, passenger safety and patient safety have to be harmonized as soon as possible.

  20. Autonomic Recovery: HyperCheck: A Hardware-Assisted Integrity Monitor

    DTIC Science & Technology

    2013-08-01

    system (OS). HyperCheck leverages the CPU System Management Mode ( SMM ), present in x86 systems, to securely generate and transmit the full state of the...HyperCheck harnesses the CPU System Management Mode ( SMM ) which is present in all x86 commodity systems to create a snapshot view of the current state of the...protect the software above it. Our assumptions are that the attacker does not have physical access to the machine and that the SMM BIOS is locked and

  1. Physician office readiness for managing Internet security threats.

    PubMed

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  2. Physician Office Readiness for Managing Internet Security Threats

    PubMed Central

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks. Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done. PMID:17238600

  3. 32 CFR 299.4 - Responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...

  4. 32 CFR 299.4 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...

  5. 32 CFR 299.4 - Responsibilities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...

  6. 32 CFR 299.4 - Responsibilities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...

  7. Dues Check-off and Union Security Study.

    ERIC Educational Resources Information Center

    National Center for the Study of Collective Bargaining in Higher Education Newsletter, 1974

    1974-01-01

    This document presents a review of what higher education agreements say about dues checkoff and union security. This study involved review of contracts negotiated by affiliates of the three national organizations, the American Association of University Professors (AAUP), the American Federation of Teachers (AFT), and the National Education…

  8. 17 CFR 260.11b-4 - Definition of “cash transaction” in section 311(b)(4).

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... transaction”, as used in section 311(b)(4), means any transaction in which full payment for goods or securities sold is made within 7 days after delivery of the goods or securities in currency or in checks or...

  9. 42 CFR 408.44 - Deduction from civil service annuities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... not entitled to railroad retirement benefits or social security benefits, and is receiving a civil... service annuity or to social security or railroad retirement benefits, and the annuitant gives written consent, OPM also deducts the spouse's premium from the annuitant's monthly check. (c) Withdrawal of...

  10. [Are the flight security measures good for the patients? The "sickurity" problem].

    PubMed

    Felkai, Péter

    2010-10-10

    Due to the stiffening requirements of security measures at the airports, prevention of air-travel related illnesses have become more difficult. The backlash effects of restrictions (e.g. fluid and movement restrictions) can trigger or even improve pathophysiological processes. The most advanced security check methods, the full body scan, besides ethical and moral considerations, may induce yet unknown pathological processes. We face the similar problem with the traveller, who becomes ill or injured during the trip. In this case, repatriation is often required, which is usually accomplished by commercial airlines. If patient should be transported by stretcher, it is also available on regular flight, but in this case he/she must be accompanied by a medical professional. This solution raises much more security problem: not only the sick person and the medical team, but even their medical equipments and medicines have to be checked. Due to the lack of standardised regulations the security staff solves the problem by various attempts from emphatic approach till refusal. For these reasons, a clear and exact regulation is needed, which must be based upon medical experts' opinion, and should deal not only with the flight security but with the patient's security, as well. This regulation can cease the patients and their medical accompanied persons' to be defencelessness against local authorities and security services. The same is true for handicapped persons. Author suggests solutions for the problem, balancing between flight security and the patient's "sickurity".

  11. 76 FR 58531 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Flight...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-21

    ... Aliens and Other Designated Individuals; Security Awareness Training for Flight School Employees AGENCY... checks for all aliens and other designated individuals seeking flight instruction (``candidates'') from... OMB Control Number 1652-0021, Flight Training for Aliens and Other Designated Individuals; Security...

  12. 28 CFR 105.11 - Individuals not requiring a security risk assessment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not...

  13. 28 CFR 105.11 - Individuals not requiring a security risk assessment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not...

  14. 28 CFR 105.11 - Individuals not requiring a security risk assessment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not...

  15. 28 CFR 105.11 - Individuals not requiring a security risk assessment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not...

  16. 28 CFR 105.11 - Individuals not requiring a security risk assessment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not...

  17. 20 CFR 403.150 - Is there a fee for our services?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Section 403.150 Employees' Benefits SOCIAL SECURITY ADMINISTRATION TESTIMONY BY EMPLOYEES AND THE PRODUCTION OF RECORDS AND INFORMATION IN LEGAL PROCEEDINGS § 403.150 Is there a fee for our services? (a..., or testimony. Make fees payable to the Social Security Administration by check or money order. (b...

  18. 75 FR 29568 - Extension of Agency Information Collection Activity Under OMB Review: Aircraft Operator Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-26

    ... Act (PRA) Officer, Office of Information Technology (OIT), TSA-11, Transportation Security..., electronic, mechanical, or other technological collection techniques or other forms of information technology... criminal history records check (CHRC). As part of the CHRC process, the individual must provide identifying...

  19. Homeland Security Department: FY2009 Appropriations

    DTIC Science & Technology

    2009-03-04

    security fees 2,113 2,329 TWIC 64 9 Hazmat 18 18 TSA Registered Traveler 4 10 FEMA/EPR National Flood Insurance Fund 111 157 CBP Small airports 7...Border. f. Fees include TWIC, HAZMAT, Registered Traveler , and Alien Flight School Checks. Homeland Security Department: FY2009 Appropriations CRS...unauthorized travelers and immigrants; and enforcing more than 400 laws and regulations at the border on behalf of more than 60 government agencies

  20. Security Controls in the Stockpoint Logistics Integrated Communications Environment (SPLICE).

    DTIC Science & Technology

    1985-03-01

    call programs as authorized after checks by the Terminal Management Subsystem on SAS databases . SAS overlays the TANDEM GUARDIAN operating system to...Security Access Profile database (SAP) and a query capability generating various security reports. SAS operates with the System Monitor (SMON) subsystem...system to DDN and other components. The first SAS component to be reviewed is the SAP database . SAP is organized into two types of files. Relational

  1. 2008 Homeland Security Symposium and Exposition

    DTIC Science & Technology

    2008-09-10

    Untitled Document 2008 Homeland Security Symposium and Exposition.html[5/19/2016 8:49:43 AM] 2008 Homeland Security Symposium and Exposition "New...national defenSe magazine Advertise in National Defense and increase your company exposure at this symposium! National Defense will be distributed to all...use the Internet Cafe to check their e-mail and search the Internet. Brand your name with maximum exposure at this high traffic area. Benefits

  2. Cryptanalysis of the Quantum Private Comparison Protocol Based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State

    NASA Astrophysics Data System (ADS)

    Gao, Xiang; Zhang, Shi-Bin; Chang, Yan; Yang, Fan; Zhang, Yan

    2018-02-01

    Recently, Li et al. (Int. J. Theor. Phys. 55, 1710-1718, 2016) proposed a Quantum Private Comparison (QPC) protocol based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State. Two parties can check whether their secret information is equal or not with the help of the semi-honest third party (TP). However in this paper, we will point out this kind of semi-honest TP is unreasonable. If we relax the constraint of the semi-honest TP, by using the fake signal attack, TP can know the whole secret information illegally. At last, we give our improvement, which can make this protocol more secure.

  3. Cryptanalysis of the Quantum Private Comparison Protocol Based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State

    NASA Astrophysics Data System (ADS)

    Gao, Xiang; Zhang, Shi-Bin; Chang, Yan; Yang, Fan; Zhang, Yan

    2018-06-01

    Recently, Li et al. (Int. J. Theor. Phys. 55, 1710-1718, 2016) proposed a Quantum Private Comparison (QPC) protocol based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State. Two parties can check whether their secret information is equal or not with the help of the semi-honest third party (TP). However in this paper, we will point out this kind of semi-honest TP is unreasonable. If we relax the constraint of the semi-honest TP, by using the fake signal attack, TP can know the whole secret information illegally. At last, we give our improvement, which can make this protocol more secure.

  4. Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet

    NASA Astrophysics Data System (ADS)

    Kataoka, Haruno; Utsumi, Akira; Hirose, Yuki; Yoshiura, Hiroshi

    Disclosure control of natural language information (DCNL), which we are trying to realize, is described. DCNL will be used for securing human communications over the internet, such as through blogs and social network services. Before sentences in the communications are disclosed, they are checked by DCNL and any phrases that could reveal sensitive information are transformed or omitted so that they are no longer revealing. DCNL checks not only phrases that directly represent sensitive information but also those that indirectly suggest it. Combinations of phrases are also checked. DCNL automatically learns the knowledge of sensitive phrases and the suggestive relations between phrases by using co-occurrence analysis and Web retrieval. The users' burden is therefore minimized, i.e., they do not need to define many disclosure control rules. DCNL complements the traditional access control in the fields where reliability needs to be balanced with enjoyment and objects classes for the access control cannot be predefined.

  5. 76 FR 6087 - Draft Weapons Safety Assessment on the Use of Enhanced Weapons; Notice of Availability and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-03

    ... holders, and other stakeholders on a draft guidance document entitled ``Weapons Safety Assessment'' (WSA... weapons under the NRC's proposed rule titled ``Enhanced Weapons, Firearms Background Checks, and Security.... You should not include any site-specific security information in your comments. Federal rulemaking Web...

  6. The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security

    DTIC Science & Technology

    2013-11-12

    information. It applies business rules to the data, produces a report that flags issues of potential security concern, and electronically transmits...Form 86 (SF- 86) to check these data sources, verify what has been submitted, and collect more information. It applies business rules to the data...subject information. It applies business rules to analyze the data returned, produces a report that flags issues of potential security concern, and

  7. Obsessive-compulsive disorder as a disturbance of security motivation: constraints on comorbidity.

    PubMed

    Szechtman, H; Woody, E Z

    2006-10-01

    Patients with OCD often meet criteria for additional psychiatric disorders, with the incidence of comorbidity being as high as 75% in some studies. Here we examine the theoretical plausibility that in OCD much of the domain of co-morbid presentations encompasses related perturbations of the security motivation system. According to a recent proposal, the security motivation system represents a biologically primitive special motivation that is activated by potential (as opposed to imminent) danger to self or intimate others and engages a set of specialized species-typical behaviors (such as checking and washing) to handle potential danger. Because the task of security motivation is open ended, in the sense that no consummatory stimuli can exist in the real world to indicate the absence of potential danger, the shutdown of security motivation is produced by a self-generated feeling of knowing, a satiety signal termed yedasentience. In this schema, OCD results from a failure to generate or respond to the yedasentience signal: without this negative feedback the patient persists abnormally long in a strong motivational state having to do with primal, basic threats to existence, a condition that leads to prolonged engagement in security-related behaviors, such as the checking and washing, characteristic of OCD compulsions and obsessions. Considering the proposed neuronatomy of security motivation system and OCD, we discuss the likelihood that the phenomenon of "spread of allied reflexes" can produce other security-related psychiatric conditions, as well as the possibility that disturbances along different pathways of the security motivation system can lead to apparently different disorders.

  8. REACH. Teacher's Guide Volume II. Check Points.

    ERIC Educational Resources Information Center

    Georgia Univ., Athens. Div. of Vocational Education.

    Designed for use with individualized instructional units (CE 026 345-347, CE 026 349-351) in the REACH (Refrigeration, Electro-Mechanical, Air-Conditioning, Heating) electromechanical cluster, this second volume of the postsecondary teacher guide contains the check points which the instructor may want to refer to when the unit sheet directs the…

  9. A review of X-ray explosives detection techniques for checked baggage.

    PubMed

    Wells, K; Bradley, D A

    2012-08-01

    In recent times, the security focus for civil aviation has shifted from hijacking in the 1980s, towards deliberate sabotage. X-ray imaging provides a major tool in checked baggage inspection, with various sensitive techniques being brought to bear in determining the form, and density of items within luggage as well as other material dependent parameters. This review first examines the various challenges to X-ray technology in securing a safe system of passenger transportation. An overview is then presented of the various conventional and less conventional approaches that are available to the airline industry, leading to developments in state-of-the-art imaging technology supported by enhanced machine and observer-based decision making principles. Copyright © 2012 Elsevier Ltd. All rights reserved.

  10. SAFER vehicle inspection: a multimodal robotic sensing platform

    NASA Astrophysics Data System (ADS)

    Page, David L.; Fougerolle, Yohan; Koschan, Andreas F.; Gribok, Andrei; Abidi, Mongi A.; Gorsich, David J.; Gerhart, Grant R.

    2004-09-01

    The current threats to U.S. security both military and civilian have led to an increased interest in the development of technologies to safeguard national facilities such as military bases, federal buildings, nuclear power plants, and national laboratories. As a result, the Imaging, Robotics, and Intelligent Systems (IRIS) Laboratory at The University of Tennessee (UT) has established a research consortium, known as SAFER (Security Automation and Future Electromotive Robotics), to develop, test, and deploy sensing and imaging systems for unmanned ground vehicles (UGV). The targeted missions for these UGV systems include -- but are not limited to --under vehicle threat assessment, stand-off check-point inspections, scout surveillance, intruder detection, obstacle-breach situations, and render-safe scenarios. This paper presents a general overview of the SAFER project. Beyond this general overview, we further focus on a specific problem where we collect 3D range scans of under vehicle carriages. These scans require appropriate segmentation and representation algorithms to facilitate the vehicle inspection process. We discuss the theory for these algorithms and present results from applying them to actual vehicle scans.

  11. Comment on id-based remote data integrity checking with data privacy preserving

    NASA Astrophysics Data System (ADS)

    Zhang, Jianhong; Meng, Hongxin

    2017-09-01

    Recently, an ID-based remote data integrity checking protocol with perfect data privacy preserving (IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS.2016.2615853) was proposed to achieve data privacy protection and integrity checking. Unfortunately, in this letter, we demonstrate that their protocol is insecure. An active hacker can modify the stored data without being detected by the verifier in the auditing. And we also show malicious cloud server can convince the verifier that the stored data are kept intact after the outsourced data blocks are deleted. Finally, the reasons to produce such attacks are given.

  12. 16 CFR 803.9 - Filing fee.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... securities of B, a non-publicly traded issuer. The agreed upon acquisition price is $99 million subject to... voting securities of B, a non-publicly traded issuer, but will accept up to 100 percent of the shares if... check or by electronic wire transfer (EWT). The fee must be paid in U.S. currency. (1) Fees paid by...

  13. [Development of operation patient security detection system].

    PubMed

    Geng, Shu-Qin; Tao, Ren-Hai; Zhao, Chao; Wei, Qun

    2008-11-01

    This paper describes a patient security detection system developed with two dimensional bar codes, wireless communication and removal storage technique. Based on the system, nurses and correlative personnel check code wait operation patient to prevent the defaults. The tests show the system is effective. Its objectivity and currency are more scientific and sophisticated than current traditional method in domestic hospital.

  14. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...

  15. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...

  16. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...

  17. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...

  18. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  19. Automated generation of a World Wide Web-based data entry and check program for medical applications.

    PubMed

    Kiuchi, T; Kaihara, S

    1997-02-01

    The World Wide Web-based form is a promising method for the construction of an on-line data collection system for clinical and epidemiological research. It is, however, laborious to prepare a common gateway interface (CGI) program for each project, which the World Wide Web server needs to handle the submitted data. In medicine, it is even more laborious because the CGI program must check deficits, type, ranges, and logical errors (bad combination of data) of entered data for quality assurance as well as data length and meta-characters of the entered data to enhance the security of the server. We have extended the specification of the hypertext markup language (HTML) form to accommodate information necessary for such data checking and we have developed software named AUTOFORM for this purpose. The software automatically analyzes the extended HTML form and generates the corresponding ordinary HTML form, 'Makefile', and C source of CGI programs. The resultant CGI program checks the entered data through the HTML form, records them in a computer, and returns them to the end-user. AUTOFORM drastically reduces the burden of development of the World Wide Web-based data entry system and allows the CGI programs to be more securely and reliably prepared than had they been written from scratch.

  20. Emergency Response Manual

    NASA Technical Reports Server (NTRS)

    Barnett, Traci M.

    2004-01-01

    Safety and security is very important at NASA. The Security Management and Safeguards Office goal is ensure safety and security for all NASA Lewis and Plum Brook Station visitors and workers. The office protects against theft, sabotage, malicious damage, espionage, and other threats or acts of violence. There are three types of security at NASA: physical, IT, and personnel. IT is concerned with sensitive and classified information and computers. Physical security includes the officers who check visitors and workers in and patrol the facility. Personnel security is concerned with background checks during hiring. During my internship, I met people from and gained knowledge about all three types of security. I primarily worked with Dr. Richard Soppet in physical security. During my experience with physical security, I observed and worked with many aspects of it. I attended various security meetings at both NASA Lewis and Plum Brook. The meetings were about homeland security and other improvements that will be made to both facilities. I also spent time with a locksmith. The locksmith makes copies of keys and unlocks doors for people who need them. I rode around in a security vehicle with an officer as he patrolled. I also observed the officer make a search of a visitor s vehicle. All visitors vehicles are searched upon entering NASA. I spent time and observed in the dispatch office. The officer answers calls and sends out officers when needed. The officer also monitors the security cameras. My primary task was completing an emergency response manual. This manual would assist local law enforcement and fire agencies in case of an emergency. The manual has pictures and descriptions of the buildings. It also contains the information about hazards inside of the buildings. This information will be very helpul to law enforcement so that when called upon during an emergency, they will not create an even bigger problem with collateral damage.

  1. The impact of joint responses of devices in an airport security system.

    PubMed

    Nie, Xiaofeng; Batta, Rajan; Drury, Colin G; Lin, Li

    2009-02-01

    In this article, we consider a model for an airport security system in which the declaration of a threat is based on the joint responses of inspection devices. This is in contrast to the typical system in which each check station independently declares a passenger as having a threat or not having a threat. In our framework the declaration of threat/no-threat is based upon the passenger scores at the check stations he/she goes through. To do this we use concepts from classification theory in the field of multivariate statistics analysis and focus on the main objective of minimizing the expected cost of misclassification. The corresponding correct classification and misclassification probabilities can be obtained by using a simulation-based method. After computing the overall false alarm and false clear probabilities, we compare our joint response system with two other independently operated systems. A model that groups passengers in a manner that minimizes the false alarm probability while maintaining the false clear probability within specifications set by a security authority is considered. We also analyze the staffing needs at each check station for such an inspection scheme. An illustrative example is provided along with sensitivity analysis on key model parameters. A discussion is provided on some implementation issues, on the various assumptions made in the analysis, and on potential drawbacks of the approach.

  2. Australian DefenceScience. Volume 16, Number 2, Winter

    DTIC Science & Technology

    2008-01-01

    Making Virtual Advisers speedily interactive To provide an authentically interactive experience for humans working with Virtual Advisers, the Virtual...peer trusted and strong authentication for checking of security credentials without recourse to third parties or infrastructure, thus eliminating...multiple passwords, or carry around multiple security tokens.” Each CodeStick device is readied for use with a biometric authentication process. Since

  3. [Airport security check of medical substances used during patient repatriation].

    PubMed

    Felkai, Péter

    2012-09-16

    During airport security check of passenger luggage, hazardous items and substances are prohibited to be taken into the restricted safety zone of the airport and the aircraft. Among equipment of the medical staff escorting the patient, there are several devices and materials which are considered hazardous for security reasons. However, medical equipment and substances are indispensable for treating patients during the flight. The aim of the author was to present his experience obtained with the use of an instrument developed for testing liquids, aerosols and gels for security reasons. An instrument based on Raman spectroscopy was used for the identification of medical substances. The results confirmed that the instrument was able to recognize the tested medical substances. The non-destructive testing maintained sample integrity and asepsis. The data indicate that the instrument has a promising utility for the identification of medical substances. It seems important that during repatriation medical substances should be selected not only on the ground of their medical necessity, but their packaging should be also taken into consideration. It is necessary to perform more tests on different medical substances used in emergency care in order to make the database of medical substances stored in the library of instrument more complete.

  4. Counterinsurgency After Afghanistan: A Concept in Crisis

    DTIC Science & Technology

    2011-12-01

    in strategy was undeniably stabilizing. This also explains the concrete walls, barriers, check- points, and other population-control measures...partnering with Sunni community leaders, Dagger Brigade was able to interpose itself—with concrete barriers, combined outposts, and checkpoints...local forces work together toward the same end. Also important in this regard are the aforementioned check- points, concrete barriers, and other

  5. U.S. National Security Strategy - The Magnitude of Second and Third-Order Effects on Smaller Nations: The Cases of Lebanon During the Cold War and Pakistan During the Global War on Terrorism

    DTIC Science & Technology

    2004-03-19

    informal management style used during the war years was not suited to the longer-term security issues of the post-war era. As US grand strategy became...Eisenhower Doctrine in 1957. THE CASE OF LEBANON Each of the above mentioned security policies were products of American diplomacy aimed at managing the...consisting of its East and West entities, found itself a principle player in the American-led security alliance structure designed to check Soviet

  6. Power Grid Maintenance Scheduling Intelligence Arrangement Supporting System Based on Power Flow Forecasting

    NASA Astrophysics Data System (ADS)

    Xie, Chang; Wen, Jing; Liu, Wenying; Wang, Jiaming

    With the development of intelligent dispatching, the intelligence level of network control center full-service urgent need to raise. As an important daily work of network control center, the application of maintenance scheduling intelligent arrangement to achieve high-quality and safety operation of power grid is very important. By analyzing the shortages of the traditional maintenance scheduling software, this paper designs a power grid maintenance scheduling intelligence arrangement supporting system based on power flow forecasting, which uses the advanced technologies in maintenance scheduling, such as artificial intelligence, online security checking, intelligent visualization techniques. It implements the online security checking of maintenance scheduling based on power flow forecasting and power flow adjusting based on visualization, in order to make the maintenance scheduling arrangement moreintelligent and visual.

  7. Privacy-preserving public auditing for data integrity in cloud

    NASA Astrophysics Data System (ADS)

    Shaik Saleem, M.; Murali, M.

    2018-04-01

    Cloud computing which has collected extent concentration from communities of research and with industry research development, a large pool of computing resources using virtualized sharing method like storage, processing power, applications and services. The users of cloud are vend with on demand resources as they want in the cloud computing. Outsourced file of the cloud user can easily tampered as it is stored at the third party service providers databases, so there is no integrity of cloud users data as it has no control on their data, therefore providing security assurance to the users data has become one of the primary concern for the cloud service providers. Cloud servers are not responsible for any data loss as it doesn’t provide the security assurance to the cloud user data. Remote data integrity checking (RDIC) licenses an information to data storage server, to determine that it is really storing an owners data truthfully. RDIC is composed of security model and ID-based RDIC where it is responsible for the security of every server and make sure the data privacy of cloud user against the third party verifier. Generally, by running a two-party Remote data integrity checking (RDIC) protocol the clients would themselves be able to check the information trustworthiness of their cloud. Within the two party scenario the verifying result is given either from the information holder or the cloud server may be considered as one-sided. Public verifiability feature of RDIC gives the privilege to all its users to verify whether the original data is modified or not. To ensure the transparency of the publicly verifiable RDIC protocols, Let’s figure out there exists a TPA who is having knowledge and efficiency to verify the work to provide the condition clearly by publicly verifiable RDIC protocols.

  8. Fix Gun Checks Act of 2013

    THOMAS, 113th Congress

    Rep. McCarthy, Carolyn [D-NY-4

    2013-01-03

    House - 01/25/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Strengthening Background Checks Act of 2013

    THOMAS, 113th Congress

    Rep. Fitzpatrick, Michael G. [R-PA-8

    2013-01-22

    House - 02/28/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Effect of Finite Particle Size on Convergence of Point Particle Models in Euler-Lagrange Multiphase Dispersed Flow

    NASA Astrophysics Data System (ADS)

    Nili, Samaun; Park, Chanyoung; Haftka, Raphael T.; Kim, Nam H.; Balachandar, S.

    2017-11-01

    Point particle methods are extensively used in simulating Euler-Lagrange multiphase dispersed flow. When particles are much smaller than the Eulerian grid the point particle model is on firm theoretical ground. However, this standard approach of evaluating the gas-particle coupling at the particle center fails to converge as the Eulerian grid is reduced below particle size. We present an approach to model the interaction between particles and fluid for finite size particles that permits convergence. We use the generalized Faxen form to compute the force on a particle and compare the results against traditional point particle method. We apportion the different force components on the particle to fluid cells based on the fraction of particle volume or surface in the cell. The application is to a one-dimensional model of shock propagation through a particle-laden field at moderate volume fraction, where the convergence is achieved for a well-formulated force model and back coupling for finite size particles. Comparison with 3D direct fully resolved numerical simulations will be used to check if the approach also improves accuracy compared to the point particle model. Work supported by the U.S. Department of Energy, National Nuclear Security Administration, Advanced Simulation and Computing Program, as a Cooperative Agreement under the Predictive Science Academic Alliance Program, under Contract No. DE-NA0002378.

  11. A New Security Paradigm for Anti-Counterfeiting: Guidelines and an Implementation Roadmap

    NASA Astrophysics Data System (ADS)

    Lehtonen, Mikko

    Product counterfeitingand piracy continue to plague brand and trademark owners across industry sectors. This chapter analyses the reasons for ineffectiveness of past technical anti-counterfeitingstrategies and formulates managerial guidelines for effective use of RFID in anti-counterfeiting. An implementation roadmap toward secure authentication of products tagged with EPC Gen-2 tags is proposed and possible supply chain locations for product checks are discussed.

  12. Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier

    NASA Astrophysics Data System (ADS)

    Liu, Ge; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-03-01

    In this paper, a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security, fairness, undeniability and so on, we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction, meanwhile, it can resist malicious attacks.

  13. Aviation security : TSA is enhancing its oversight of air carrier efforts to identify passengers on the No Fly and Selectee lists, but expects ultimate solution to be implementation of Secure Flight : report to congressional committees

    DOT National Transportation Integrated Search

    2008-09-01

    Air carriers remain a front-line defense against acts of terrorism that target the nations civil aviation system. A key responsibility of air carriers is to check passengers names against terrorist watch-list records to identify persons who sho...

  14. Dynamic Selective Exposure during Decision-Making.

    PubMed

    Phillips, James G; Hoon, Teressa; Landon, Jason

    2016-01-01

    To understand dynamic changes in the likelihood that people would access and selectively expose themselves to information online, the present study examined the checking of account balances during simulated gambling. Sixteen participants played 120 hands of computer Blackjack for points, at higher or lower levels of risk (different point multipliers), and after each win or loss the computer recorded if participants checked their account balances. There were individual differences in checking rates. Participants who were more likely to check balances exhibited a selectivity of exposure to decision consonant information after a win at low risk. Although it was expected that people would seek to maintain positive mood, data were better explained in terms of Cognitive Dissonance. The effects of Cognitive Dissonance are liable to extend beyond single static decisions into dynamic online environments.

  15. The postman always rings twice: two cases of shotgun deaths associated with an unconventional home security alarm system.

    PubMed

    Asirdizer, Mahmut; Turkmen, Nursel; Akan, Okan; Yavuz, Mehmet Sunay

    2014-06-01

    Injury and death cases caused by booby traps are not common in forensic medicine practice. Besides, installation of booby traps including firearms is generally for suicidal and rarely for homicidal purposes. Although few patents were described about home security alarm system that were created by firearms in the United States, 1 sample of injury with a similar unconventional mechanism of home safety system was reported by Asirdizer and Yavuz in 2009. In the published case report, the story of an electrical technician who was invited to a summer house by the homeowner to check the home security alarm system was reported. In the so-called report, he was stated to be injured by the shotgun attached to the unconventional home security alarm system while checking the system. As a result, the homeowner was convicted of a possible intent to cause a life-threatening injury to the technician.The so-called homeowner and his wife died by the same shotgun attached to the same unconventional home security alarm system 4 years on from the first event. In the present case report, we have aimed to present the findings of the crime scene and the autopsies of these unusual 2 deaths and to discuss individual and legal factors in paving the way for the deaths of 2 people.

  16. Employing the Intelligence Cycle Process Model Within the Homeland Security Enterprise

    DTIC Science & Technology

    2013-12-01

    the Iraq anti-war movement, a former U.S. Congresswoman, the U.S. Treasury Department and hip hop bands to spread Sharia law in the U.S. A Virginia...challenges remain with threat notification, access to information, and database management of information that may have contributed the 2013 Boston...The FBI said it took a number of investigative steps to check on the request, including looking at his travel history, checking databases for

  17. 31 CFR 103.39 - Person outside the United States.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... of currency, other monetary instruments, checks, investment securities, or credit to the domestic... transaction on the books of a domestic financial institution involving the account of a customer of such...

  18. The Need for an Implant Identification Card at Airport Security Check

    PubMed Central

    Kosuge, Dennis; MacDowell, Andrew

    2017-01-01

    Background Joint replacement surgery is having an increasing demand as national healthcare systems confront an ever ageing population. Surgical complications associated with lower limb arthroplasty are well known but less investigation has been performed examining its effect on air travel, more specifically, unwanted and significant inconvenience caused to travelers going through airport security. Methods In lower limb arthroplasty clinics, 50 patients who met our selection criteria were given questionnaires. Ten airport security officers from 4 international airports (London Stansted, London Gatwick, London Heathrow, and Amsterdam Schiphol International Airport) were also given a separate questionnaire. The opinion of the Civil Aviation Authority was also sought. Results All 50 patients (mean age, 70.4 years; range, 55 to 84 years) who were presenting in lower limb arthroplasty clinics and who met our selection criteria volunteered to enter the study. Twenty-eight of these patients were female (mean age, 69.1 years; range, 55 to 84 years) and 22 were male (mean age, 71.2 years; range, 58 to 81 years). Of the patients, 14% stated that their joint replacements did not set off the airport security alarm. Responses were received from 10 airport security officers as well. Six airport security officers were male and 4 were female. All of the airport officers were aware of some form of implant identification card with 90% stating that these were useful to them at airport security. Eight-four percent of the patients stated that an implant identification card outlining what joint replacement they possessed and when this had been done would be very useful. Sixteen percent of the patients did not think a card would be beneficial since all of them had set off the airport alarm system only once or less in their lifetime. Conclusions It is the opinion of airport security officers and patients that joint replacement implant identification cards streamline airport security checks and decrease the need for more invasive searches at airport security. PMID:28567216

  19. The Need for an Implant Identification Card at Airport Security Check.

    PubMed

    Ali, Erden; Kosuge, Dennis; MacDowell, Andrew

    2017-06-01

    Joint replacement surgery is having an increasing demand as national healthcare systems confront an ever ageing population. Surgical complications associated with lower limb arthroplasty are well known but less investigation has been performed examining its effect on air travel, more specifically, unwanted and significant inconvenience caused to travelers going through airport security. In lower limb arthroplasty clinics, 50 patients who met our selection criteria were given questionnaires. Ten airport security officers from 4 international airports (London Stansted, London Gatwick, London Heathrow, and Amsterdam Schiphol International Airport) were also given a separate questionnaire. The opinion of the Civil Aviation Authority was also sought. All 50 patients (mean age, 70.4 years; range, 55 to 84 years) who were presenting in lower limb arthroplasty clinics and who met our selection criteria volunteered to enter the study. Twenty-eight of these patients were female (mean age, 69.1 years; range, 55 to 84 years) and 22 were male (mean age, 71.2 years; range, 58 to 81 years). Of the patients, 14% stated that their joint replacements did not set off the airport security alarm. Responses were received from 10 airport security officers as well. Six airport security officers were male and 4 were female. All of the airport officers were aware of some form of implant identification card with 90% stating that these were useful to them at airport security. Eight-four percent of the patients stated that an implant identification card outlining what joint replacement they possessed and when this had been done would be very useful. Sixteen percent of the patients did not think a card would be beneficial since all of them had set off the airport alarm system only once or less in their lifetime. It is the opinion of airport security officers and patients that joint replacement implant identification cards streamline airport security checks and decrease the need for more invasive searches at airport security.

  20. 49 CFR 1018.29 - Payments.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... ownership of assets which are free and clear of liens or security interests, or assets in which the debtor... check, money order, or credit card payable to the Surface Transportation Board and mailed or delivered...

  1. 49 CFR 1018.29 - Payments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ownership of assets which are free and clear of liens or security interests, or assets in which the debtor... check, money order, or credit card payable to the Surface Transportation Board and mailed or delivered...

  2. 49 CFR 1018.29 - Payments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ownership of assets which are free and clear of liens or security interests, or assets in which the debtor... check, money order, or credit card payable to the Surface Transportation Board and mailed or delivered...

  3. 49 CFR 1018.29 - Payments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ownership of assets which are free and clear of liens or security interests, or assets in which the debtor... check, money order, or credit card payable to the Surface Transportation Board and mailed or delivered...

  4. 14 CFR 1260.35 - Investigative Requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...

  5. 14 CFR 1260.35 - Investigative Requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...

  6. 14 CFR § 1260.35 - Investigative Requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... January 2004 (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate...

  7. 14 CFR 1260.35 - Investigative Requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...

  8. 14 CFR 1260.35 - Investigative Requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...

  9. A model of airport security work flow based on petri net

    NASA Astrophysics Data System (ADS)

    Dong, Xinming

    2017-09-01

    Extremely long lines at airports in the United States have been sharply criticized. In order to find out the bottleneck in the existing security system and put forward reasonable improvement plans and proposal, the Petri net model and the Markov Chain are introduced in this paper. This paper uses data collected by transportation Security Agency (TSA), assuming the data can represent the average level of all airports in the Unites States, to analysis the performance of security check system. By calculating the busy probabilities and the utilization probabilities, the bottleneck is found. Moreover, recommendation is given based on the parameters’ modification in Petri net model.

  10. The relationship of point-of-sale tobacco advertising and neighborhood characteristics to underage sales of tobacco.

    PubMed

    Widome, Rachel; Brock, Betsy; Noble, Petra; Forster, Jean L

    2012-09-01

    Our objective was to determine how point-of-sale tobacco marketing may relate to sales to minors. The authors used data from a 2007 cross-sectional study of the retail tobacco marketing environments in the St. Paul, MN metropolitan area matched with a database of age-of-sale compliance checks (random, covert test purchases by a minor, coordinated by law enforcement) of tobacco retailers and U.S. Census data to test whether certain characteristics of advertising or neighborhoods were associated with compliance check failure. The authors found that tobacco stores were the most likely type of store to fail compliance checks (44% failure), supermarkets were least likely (3%). Aside from a marginally significant association with Hispanic population proportion, there was no other association between either store advertising characteristics or neighborhood demographics and stores' compliance check failure. Though our findings were null, the relationship between advertising and real youth sales may be more nuanced as compliance checks do not perfectly simulate the way youth attempt to purchase cigarettes.

  11. Security Awareness Bulletin. Number 2-91, September 1991

    DTIC Science & Technology

    1991-09-01

    governments, competitors, In our rapidly changing workplace, computers and those having criminal intent, that uncontrolled access routinely communicate with...same as above; rental fee is slightly higher. Securily A wareness Bulletin 10 Number 2-91 New AIS Requirements in the Defense Industrial Security...original file copy. But remember, check the original for viruses 6. Files grow in size. Infamous to the Nvir, this before locking and relying upon it as a

  12. Case Study Application of the Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers

    DTIC Science & Technology

    2016-04-01

    determinations are more common for certain invertebrates , such as gastropods (snails), but the taxonomy is improving rapidly. The RSI approach to resource...arrow for invertebrate animals. Check the box for Mollusca. Then check to make sure your status and location criteria remain the same, search for the...mollusk list and store. Go back to invertebrate animals and select the down arrow for “Crustacea”. Then select crayfish, isopods, amphipods, and

  13. Automatic Rail Extraction and Celarance Check with a Point Cloud Captured by Mls in a Railway

    NASA Astrophysics Data System (ADS)

    Niina, Y.; Honma, R.; Honma, Y.; Kondo, K.; Tsuji, K.; Hiramatsu, T.; Oketani, E.

    2018-05-01

    Recently, MLS (Mobile Laser Scanning) has been successfully used in a road maintenance. In this paper, we present the application of MLS for the inspection of clearance along railway tracks of West Japan Railway Company. Point clouds around the track are captured by MLS mounted on a bogie and rail position can be determined by matching the shape of the ideal rail head with respect to the point cloud by ICP algorithm. A clearance check is executed automatically with virtual clearance model laid along the extracted rail. As a result of evaluation, the accuracy of extracting rail positions is less than 3 mm. With respect to the automatic clearance check, the objects inside the clearance and the ones related to a contact line is successfully detected by visual confirmation.

  14. 33 CFR 165.1102 - Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone; Naval Base Point... Guard District § 165.1102 Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA. (a) Location. The following area is a security zone: The water adjacent to the Naval Base Point Loma, San Diego...

  15. Fairness and Accuracy in Employment Background Checks Act of 2013

    THOMAS, 113th Congress

    Rep. Scott, Robert C. "Bobby" [D-VA-3

    2013-07-30

    House - 09/13/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. [Advanced information technologies for financial services industry]. Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    The project scope is to develop an advanced user interface utilizing speech and/or handwriting recognition technology that will improve the accuracy and speed of recording transactions in the dynamic environment of a foreign exchange (FX) trading floor. The project`s desired result is to improve the base technology for trader`s workstations on FX trading floors. Improved workstation effectiveness will allow vast amounts of complex information and events to be presented and analyzed, thus increasing the volume of money and other assets to be exchanged at an accelerated rate. The project scope is to develop and demonstrate technologies that advance interbank checkmore » imaging and paper check truncation. The following describes the tasks to be completed: (1) Identify the economics value case, the legal and regulatory issues, the business practices that are affected, and the effects upon settlement. (2) Familiarization with existing imaging technology. Develop requirements for image quality, security, and interoperability. Adapt existing technologies to meet requirements. (3) Define requirements for the imaging laboratory and design its architecture. Integrate and test technology from task 2 with equipment in the laboratory. (4) Develop and/or integrate and test remaining components; includes security, storage, and communications. (5) Build a prototype system and test in a laboratory. Install and run in two or more banks. Develop documentation. Conduct training. The project`s desired result is to enable a proof-of-concept trial in which multiple banks will exchange check images, exhibiting operating conditions which a check experiences as it travels through the payments/clearing system. The trial should demonstrate the adequacy of digital check images instead of paper checks.« less

  17. Forensic patients--who is watching them?

    PubMed

    White, John M

    2012-01-01

    Does your hospital security department have the right and/or responsibility for checking out the qualifications and practices of private contractors hired by law enforcement to guard forensic patients? In this article, the author explains why you should.

  18. 19 CFR 123.76 - Authorization by Customs for participants to use certain drivers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS RELATIONS WITH CANADA AND MEXICO Land Border Carrier... part, to conduct, to the extent allowed by law, employment and criminal history checks on all personnel...

  19. Best Way to Get Rid of Used Needles and Other Sharps

    MedlinePlus

    ... other options are not available. If traveling by plane, check the Transportation Security Administration (TSA) website for ... be thrown away in the common trash. Additional Consumer Information How to Get Rid of a Sharps ...

  20. National Wind Technology Center | NREL

    Science.gov Websites

    driver's license, passport, or military ID) to obtain a security badge before entering the site. Foreign nationals must check with their host prior to their visit to make sure that a Foreign National Data Card has

  1. Exploring Hardware-Based Primitives to Enhance Parallel Security Monitoring in a Novel Computing Architecture

    DTIC Science & Technology

    2007-03-01

    software level retrieve state information that can inherently contain more contextual information . As a result, such mechanisms can be applied in more...ease by which state information can be gathered for monitoring purposes. For example, we consider soft security to allow for easier state retrieval ...files are to be checked and what parameters are to be verified. The independent auditor periodically retrieves information pertaining to the files in

  2. Specifying and Verifying Organizational Security Properties in First-Order Logic

    NASA Astrophysics Data System (ADS)

    Brandt, Christoph; Otten, Jens; Kreitz, Christoph; Bibel, Wolfgang

    In certain critical cases the data flow between business departments in banking organizations has to respect security policies known as Chinese Wall or Bell-La Padula. We show that these policies can be represented by formal requirements and constraints in first-order logic. By additionally providing a formal model for the flow of data between business departments we demonstrate how security policies can be applied to a concrete organizational setting and checked with a first-order theorem prover. Our approach can be applied without requiring a deep formal expertise and it therefore promises a high potential of usability in the business.

  3. 33 CFR 165.102 - Security Zone: Walkers Point, Kennebunkport ME.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone: Walkers Point, Kennebunkport ME. 165.102 Section 165.102 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Zone: Walkers Point, Kennebunkport ME. (a) Location. The following area is a security zone: From point...

  4. 33 CFR 165.102 - Security Zone: Walkers Point, Kennebunkport ME.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zone: Walkers Point, Kennebunkport ME. 165.102 Section 165.102 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Zone: Walkers Point, Kennebunkport ME. (a) Location. The following area is a security zone: From point...

  5. 33 CFR 165.102 - Security Zone: Walkers Point, Kennebunkport ME.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zone: Walkers Point, Kennebunkport ME. 165.102 Section 165.102 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Zone: Walkers Point, Kennebunkport ME. (a) Location. The following area is a security zone: From point...

  6. 33 CFR 165.102 - Security Zone: Walkers Point, Kennebunkport ME.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone: Walkers Point, Kennebunkport ME. 165.102 Section 165.102 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Zone: Walkers Point, Kennebunkport ME. (a) Location. The following area is a security zone: From point...

  7. A methodology for secure recovery of spacecrafts based on a trusted hardware platform

    NASA Astrophysics Data System (ADS)

    Juliato, Marcio; Gebotys, Catherine

    2017-02-01

    This paper proposes a methodology for the secure recovery of spacecrafts and the recovery of its cryptographic capabilities in emergency scenarios recurring from major unintentional failures and malicious attacks. The proposed approach employs trusted modules to achieve higher reliability and security levels in space missions due to the presence of integrity check capabilities as well as secure recovery mechanisms. Additionally, several recovery protocols are thoroughly discussed and analyzed against a wide variety of attacks. Exhaustive search attacks are shown in a wide variety of contexts and are shown to be infeasible and totally independent of the computational power of attackers. Experimental results have shown that the proposed methodology allows for the fast and secure recovery of spacecrafts, demanding minimum implementation area, power consumption and bandwidth.

  8. 29 CFR 1915.71 - Scaffolds or staging.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... large, loose or dead knots. It shall also be free from dry rot, large checks, worm holes or other... shall have a loop or eye at the top for securing the supporting hook on the block. (7) Two or more...

  9. Console test report for shuttle task 501 shuttle carrier aircraft transceiver console (SED 36115353-301)

    NASA Technical Reports Server (NTRS)

    Lane, J. H.

    1976-01-01

    Performance tests completed on the Space Shuttle Carrier Aircraft (SCA) transceiver console, verifying its design objectives, were described. These tests included: (1) check of power supply voltages for correct output voltage and energization at the proper point in the turn on sequence, (2) check of cooling system (LRU blower, overload sensors and circuitry, and thermocouple probe), (3) check of control circuits logic, including the provisions for remote control and display, (4) check of the LRU connector for presence of correct voltages and absence of incorrect voltages under both energized and deenergized conditions, and (5) check of the AGC and power output monitor circuits.

  10. A digital system for surface reconstruction

    USGS Publications Warehouse

    Zhou, Weiyang; Brock, Robert H.; Hopkins, Paul F.

    1996-01-01

    A digital photogrammetric system, STEREO, was developed to determine three dimensional coordinates of points of interest (POIs) defined with a grid on a textureless and smooth-surfaced specimen. Two CCD cameras were set up with unknown orientation and recorded digital images of a reference model and a specimen. Points on the model were selected as control or check points for calibrating or assessing the system. A new algorithm for edge-detection called local maximum convolution (LMC) helped extract the POIs from the stereo image pairs. The system then matched the extracted POIs and used a least squares “bundle” adjustment procedure to solve for the camera orientation parameters and the coordinates of the POIs. An experiment with STEREO found that the standard deviation of the residuals at the check points was approximately 24%, 49% and 56% of the pixel size in the X, Y and Z directions, respectively. The average of the absolute values of the residuals at the check points was approximately 19%, 36% and 49% of the pixel size in the X, Y and Z directions, respectively. With the graphical user interface, STEREO demonstrated a high degree of automation and its operation does not require special knowledge of photogrammetry, computers or image processing.

  11. SU-F-T-238: Analyzing the Performance of MapCHECK2 and Delta4 Quality Assurance Phantoms in IMRT and VMAT Plans

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lu, SH; Tsai, YC; Lan, HT

    2016-06-15

    Purpose: Intensity-modulated radiotherapy (IMRT) and volumetric modulated arc therapy (VMAT) have been widely investigated for use in radiotherapy and found to have a highly conformal dose distribution. Delta{sup 4} is a novel cylindrical phantom consisting of 1069 p-type diodes with true treatments measured in the 3D target volume. The goal of this study was to compare the performance of a Delta{sup 4} diode array for IMRT and VMAT planning with ion chamber and MapCHECK2. Methods: Fifty-four IMRT (n=9) and VMAT (n=45) plans were imported to Philips Pinnacle Planning System 9.2 for recalculation with a solid water phantom, MapCHECK2, and themore » Delta4 phantom. To evaluate the difference between the measured and calculated dose, we used MapCHECK2 and Delta{sup 4} for a dose-map comparison and an ion chamber (PTW 31010 Semiflex 0.125 cc) for a point-dose comparison. Results: All 54 plans met the criteria of <3% difference for the point dose (at least two points) by ion chamber. The mean difference was 0.784% with a standard deviation of 1.962%. With a criteria of 3 mm/3% in a gamma analysis, the average passing rates were 96.86%±2.19% and 98.42%±1.97% for MapCHECK2 and Delta{sup 4}, respectively. The student t-test of MapCHECK2/Delta{sup 4}, ion chamber/Delta{sup 4}, and ion chamber/MapCHECK2 were 0.0008, 0.2944, and 0.0002, respectively. There was no significant difference in passing rates between MapCHECK2 and Delta{sup 4} for the IMRT plan (p = 0.25). However, a higher pass rate was observed in Delta{sup 4} (98.36%) as compared to MapCHECK2 (96.64%, p < 0.0001) for the VMAT plan. Conclusion: The Pinnacle planning system can accurately calculate doses for VMAT and IMRT plans. The Delta{sup 4} shows a similar result when compared to ion chamber and MapCHECK2, and is an efficient tool for patient-specific quality assurance, especially for rotation therapy.« less

  12. Comparing the effectiveness of monetary versus moral motives in environmental campaigning

    NASA Astrophysics Data System (ADS)

    Bolderdijk, J. W.; Steg, L.; Geller, E. S.; Lehman, P. K.; Postmes, T.

    2013-04-01

    Environmental campaigns often promote energy conservation by appealing to economic (for example, lower electricity bills) rather than biospheric concerns (for example, reduced carbon emissions), assuming that people are primarily motivated by economic self-interest. However, people also care about maintaining a favourable view of themselves (they want to maintain a `positive self-concept'), and may prefer to see themselves as `green' rather than `greedy'. Consequently, people may find economic appeals less attractive than biospheric appeals. Across two studies, participants indicated feeling better about biospheric (`Want to protect the environment? Check your car's tire pressure') than economic (`Want to save money? Check your car's tire pressure') tyre-check appeals. In a field experiment, we found that an economic tyre-check appeal (`Do you care about your finances? Get a free tire check') elicited significantly less compliance than parallel biospheric and neutral appeals. Together, these studies discredit the conventional wisdom that appealing to economic self-interest is the best way to secure behaviour change. At least in some cases, our studies suggest, this strategy is not effective.

  13. Performance of Compiler-Assisted Memory Safety Checking

    DTIC Science & Technology

    2014-08-01

    software developer has in mind a particular object to which the pointer should point, the intended referent. A memory access error occurs when an ac...Performance of Compiler-Assisted Memory Safety Checking David Keaton Robert C. Seacord August 2014 TECHNICAL NOTE CMU/SEI-2014-TN...based memory safety checking tool and the performance that can be achieved with two such tools whose source code is freely available. The note then

  14. 2009 Homeland Security Symposium and Exhibition

    DTIC Science & Technology

    2009-09-10

    electronified check, ACH or Draft • Opportunity for Merchant and Merchant employee collusion • Remote Deposit Collection (RDC) • eCommerce – a world of new...police _$; _ Units US Coast Guard _$; _ Units Urban Search & Rescue _$; _ Units Rural Search & Rescue _$; _ Units Public/ University hospitals

  15. 25 CFR 63.18 - Are the requirements for Bureau of Indian Affairs adjudication different from the requirements...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... FAMILY VIOLENCE PREVENTION Minimum Standards of Character and Suitability for Employment § 63.18 Are the... Check and Inquiries which includes a search of the OPM Security/Suitability Investigations Index (SII...

  16. 25 CFR 63.18 - Are the requirements for Bureau of Indian Affairs adjudication different from the requirements...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... FAMILY VIOLENCE PREVENTION Minimum Standards of Character and Suitability for Employment § 63.18 Are the... Check and Inquiries which includes a search of the OPM Security/Suitability Investigations Index (SII...

  17. 25 CFR 63.18 - Are the requirements for Bureau of Indian Affairs adjudication different from the requirements...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... FAMILY VIOLENCE PREVENTION Minimum Standards of Character and Suitability for Employment § 63.18 Are the... Check and Inquiries which includes a search of the OPM Security/Suitability Investigations Index (SII...

  18. 25 CFR 63.18 - Are the requirements for Bureau of Indian Affairs adjudication different from the requirements...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... FAMILY VIOLENCE PREVENTION Minimum Standards of Character and Suitability for Employment § 63.18 Are the... Check and Inquiries which includes a search of the OPM Security/Suitability Investigations Index (SII...

  19. 25 CFR 63.18 - Are the requirements for Bureau of Indian Affairs adjudication different from the requirements...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... FAMILY VIOLENCE PREVENTION Minimum Standards of Character and Suitability for Employment § 63.18 Are the... Check and Inquiries which includes a search of the OPM Security/Suitability Investigations Index (SII...

  20. 32 CFR 50.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... private business or trade. Securities. Mutual funds, stocks, bonds, or any product registered with the... fund employees and special Government employees, of the Department of Defense. Financial services... banking (e.g., ATMs), in-store banking, checking, share and savings accounts, fund transfers, sale of...

  1. 32 CFR 50.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... private business or trade. Securities. Mutual funds, stocks, bonds, or any product registered with the... fund employees and special Government employees, of the Department of Defense. Financial services... banking (e.g., ATMs), in-store banking, checking, share and savings accounts, fund transfers, sale of...

  2. 77 FR 58848 - Prescription Drug User Fee Act V Patient-Focused Drug Development; Consultation Meetings; Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-24

    ...' participants (non- FDA employees) is through Building 1 where routine security check procedures will be... headquarters versus those in other locations who have less physical access. 4. How to support engagement of...

  3. Asynchronous error-correcting secure communication scheme based on fractional-order shifting chaotic system

    NASA Astrophysics Data System (ADS)

    Chao, Luo

    2015-11-01

    In this paper, a novel digital secure communication scheme is firstly proposed. Different from the usual secure communication schemes based on chaotic synchronization, the proposed scheme employs asynchronous communication which avoids the weakness of synchronous systems and is susceptible to environmental interference. Moreover, as to the transmission errors and data loss in the process of communication, the proposed scheme has the ability to be error-checking and error-correcting in real time. In order to guarantee security, the fractional-order complex chaotic system with the shifting of order is utilized to modulate the transmitted signal, which has high nonlinearity and complexity in both frequency and time domains. The corresponding numerical simulations demonstrate the effectiveness and feasibility of the scheme.

  4. SSC Geopositional Assessment of the Advanced Wide Field Sensor

    NASA Technical Reports Server (NTRS)

    Ross, Kenton

    2007-01-01

    The objective is to provide independent verification of IRS geopositional accuracy claims and of the internal geopositional characterization provided by Lutes (2005). Six sub-scenes (quads) were assessed; Three from each AWiFS camera. Check points were manually matched to digital orthophoto quarter quadrangle (DOQQ) reference (assumed accuracy approx. 5 m, RMSE) Check points were selected to meet or exceed Federal Geographic Data Committee's guidelines. Used ESRI ArcGIS for data collection and SSC-written MATLAB scripts for data analysis.

  5. Security in the CernVM File System and the Frontier Distributed Database Caching System

    NASA Astrophysics Data System (ADS)

    Dykstra, D.; Blomer, J.

    2014-06-01

    Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.

  6. IT Security Standards and Legal Metrology - Transfer and Validation

    NASA Astrophysics Data System (ADS)

    Thiel, F.; Hartmann, V.; Grottker, U.; Richter, D.

    2014-08-01

    Legal Metrology's requirements can be transferred into the IT security domain applying a generic set of standardized rules provided by the Common Criteria (ISO/IEC 15408). We will outline the transfer and cross validation of such an approach. As an example serves the integration of Legal Metrology's requirements into a recently developed Common Criteria based Protection Profile for a Smart Meter Gateway designed under the leadership of the Germany's Federal Office for Information Security. The requirements on utility meters laid down in the Measuring Instruments Directive (MID) are incorporated. A verification approach to check for meeting Legal Metrology's requirements by their interpretation through Common Criteria's generic requirements is also presented.

  7. Program Model Checking: A Practitioner's Guide

    NASA Technical Reports Server (NTRS)

    Pressburger, Thomas T.; Mansouri-Samani, Masoud; Mehlitz, Peter C.; Pasareanu, Corina S.; Markosian, Lawrence Z.; Penix, John J.; Brat, Guillaume P.; Visser, Willem C.

    2008-01-01

    Program model checking is a verification technology that uses state-space exploration to evaluate large numbers of potential program executions. Program model checking provides improved coverage over testing by systematically evaluating all possible test inputs and all possible interleavings of threads in a multithreaded system. Model-checking algorithms use several classes of optimizations to reduce the time and memory requirements for analysis, as well as heuristics for meaningful analysis of partial areas of the state space Our goal in this guidebook is to assemble, distill, and demonstrate emerging best practices for applying program model checking. We offer it as a starting point and introduction for those who want to apply model checking to software verification and validation. The guidebook will not discuss any specific tool in great detail, but we provide references for specific tools.

  8. Copper Soldiers: Forging New Roles for the Chilean Military

    DTIC Science & Technology

    2005-09-01

    post of the Chief of Staff of the Armed Forces and Carabineros.” Finally, articles 95 and 96 created a National Security Council which included the...Nacional (RN) and the Unión Demócrata Independiente (UDI), felt an “independent security power”129 such as the military served as a check on the...Democracy: Latin America and the Caribbean in the Post -Cold War Era, ed. Jorge I. Domínguez (Pittsburgh: University of Pittsburgh Press, 1998), 131

  9. Design of an autonomous exterior security robot

    NASA Technical Reports Server (NTRS)

    Myers, Scott D.

    1994-01-01

    This paper discusses the requirements and preliminary design of robotic vehicle designed for performing autonomous exterior perimeter security patrols around warehouse areas, ammunition supply depots, and industrial parks for the U.S. Department of Defense. The preliminary design allows for the operation of up to eight vehicles in a six kilometer by six kilometer zone with autonomous navigation and obstacle avoidance. In addition to detection of crawling intruders at 100 meters, the system must perform real-time inventory checking and database comparisons using a microwave tags system.

  10. From a Proven Correct Microkernel to Trustworthy Large Systems

    NASA Astrophysics Data System (ADS)

    Andronick, June

    The seL4 microkernel was the world's first general-purpose operating system kernel with a formal, machine-checked proof of correctness. The next big step in the challenge of building truly trustworthy systems is to provide a framework for developing secure systems on top of seL4. This paper first gives an overview of seL4's correctness proof, together with its main implications and assumptions, and then describes our approach to provide formal security guarantees for large, complex systems.

  11. Problems of collaborative work of the automated process control system (APCS) and the its information security and solutions.

    NASA Astrophysics Data System (ADS)

    Arakelyan, E. K.; Andryushin, A. V.; Mezin, S. V.; Kosoy, A. A.; Kalinina, Ya V.; Khokhlov, I. S.

    2017-11-01

    The principle of interaction of the specified systems of technological protections by the Automated process control system (APCS) and information safety in case of incorrect execution of the algorithm of technological protection is offered. - checking the correctness of the operation of technological protection in each specific situation using the functional relationship between the monitored parameters. The methodology for assessing the economic feasibility of developing and implementing an information security system.

  12. 10 CFR 73.57 - Requirements for criminal history records checks of individuals granted unescorted access to a...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Web site. (To find the current fee amount, go to the Electronic Submittals page at http://www.nrc.gov... licensee verifies information such as name, date of birth, social security number, sex, and other...

  13. 10 CFR 73.57 - Requirements for criminal history records checks of individuals granted unescorted access to a...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Web site. (To find the current fee amount, go to the Electronic Submittals page at http://www.nrc.gov... licensee verifies information such as name, date of birth, social security number, sex, and other...

  14. NOAA - National Oceanic and Atmospheric Administration - Information

    Science.gov Websites

    Council Committees Services & Programs Freedom of Information Act (FOIA) Commerce Geospatial Resources Homeland Security and Employee Check-In Information Quality NOAA Libraries NOAALink Paperwork Reduction & Information Collection Privacy Radio Frequency Management Contact Us Staff Directory IT Workforce

  15. Truth of Varying Shades: Analyzing Language in Fake News and Political Fact-Checking

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rashkin, Hannah J.; Choi, Eunsol; Jang, Jin Yea

    We present an analytic study on the language of news media in the context of political fact-checking and fake news detection. We compare the language of real news with that of satire, hoax, and propaganda to find linguistic cues for untruthful text. To probe the feasibility of automatic political fact-checking, we present a case study based on PolitiFact.com using their factuality judgments on a 6-point scale. Experimental results show that while media fact-checking remains to be an open research question, stylistic cues can help determine the truthfulness of text.

  16. Security Management and Safeguards Office

    NASA Technical Reports Server (NTRS)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are in a safe environment.

  17. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks.

    PubMed

    Park, YoHan; Park, YoungHo

    2016-12-14

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.

  18. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Park, YoHan; Park, YoungHo

    2016-01-01

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment. PMID:27983616

  19. 28 CFR 105.24 - Employee's rights.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Employee's rights. 105.24 Section 105.24 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.24 Employee's rights. An employee is entitled to: (a) Obtain a copy from...

  20. 28 CFR 105.24 - Employee's rights.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Employee's rights. 105.24 Section 105.24 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.24 Employee's rights. An employee is entitled to: (a) Obtain a copy from...

  1. 28 CFR 105.24 - Employee's rights.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Employee's rights. 105.24 Section 105.24 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.24 Employee's rights. An employee is entitled to: (a) Obtain a copy from...

  2. 28 CFR 105.24 - Employee's rights.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Employee's rights. 105.24 Section 105.24 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.24 Employee's rights. An employee is entitled to: (a) Obtain a copy from...

  3. 28 CFR 105.24 - Employee's rights.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Employee's rights. 105.24 Section 105.24 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.24 Employee's rights. An employee is entitled to: (a) Obtain a copy from...

  4. Doing Our Homework: A Pre-Employment Screening Checklist for Better Head Start Hiring.

    ERIC Educational Resources Information Center

    McSherry, Jim; Caruso, Karen; Cagnetta, Mary

    1999-01-01

    Provides a checklist for screening potential Head Start employees. Components include checks for criminal record, credit history, motor vehicle records, social security number tracing, previous address research, education verification, work and personal reference interview, and professional license verification. (KB)

  5. Verification and Planning Based on Coinductive Logic Programming

    NASA Technical Reports Server (NTRS)

    Bansal, Ajay; Min, Richard; Simon, Luke; Mallya, Ajay; Gupta, Gopal

    2008-01-01

    Coinduction is a powerful technique for reasoning about unfounded sets, unbounded structures, infinite automata, and interactive computations [6]. Where induction corresponds to least fixed point's semantics, coinduction corresponds to greatest fixed point semantics. Recently coinduction has been incorporated into logic programming and an elegant operational semantics developed for it [11, 12]. This operational semantics is the greatest fix point counterpart of SLD resolution (SLD resolution imparts operational semantics to least fix point based computations) and is termed co- SLD resolution. In co-SLD resolution, a predicate goal p( t) succeeds if it unifies with one of its ancestor calls. In addition, rational infinite terms are allowed as arguments of predicates. Infinite terms are represented as solutions to unification equations and the occurs check is omitted during the unification process. Coinductive Logic Programming (Co-LP) and Co-SLD resolution can be used to elegantly perform model checking and planning. A combined SLD and Co-SLD resolution based LP system forms the common basis for planning, scheduling, verification, model checking, and constraint solving [9, 4]. This is achieved by amalgamating SLD resolution, co-SLD resolution, and constraint logic programming [13] in a single logic programming system. Given that parallelism in logic programs can be implicitly exploited [8], complex, compute-intensive applications (planning, scheduling, model checking, etc.) can be executed in parallel on multi-core machines. Parallel execution can result in speed-ups as well as in larger instances of the problems being solved. In the remainder we elaborate on (i) how planning can be elegantly and efficiently performed under real-time constraints, (ii) how real-time systems can be elegantly and efficiently model- checked, as well as (iii) how hybrid systems can be verified in a combined system with both co-SLD and SLD resolution. Implementations of co-SLD resolution as well as preliminary implementations of the planning and verification applications have been developed [4]. Co-LP and Model Checking: The vast majority of properties that are to be verified can be classified into safety properties and liveness properties. It is well known within model checking that safety properties can be verified by reachability analysis, i.e, if a counter-example to the property exists, it can be finitely determined by enumerating all the reachable states of the Kripke structure.

  6. Optical-electronic device based on diffraction optical element for control of special protective tags executed from luminophor

    NASA Astrophysics Data System (ADS)

    Polyakov, M.; Odinokov, S.

    2017-05-01

    The report focuses on special printing industry, which is called secure printing, which uses printing techniques to prevent forgery or falsification of security documents. The report considered the possibility of establishing a spectral device for determining the authenticity of certain documents that are protected by machine-readable luminophor labels. The device works in two spectral ranges - visible and near infrared that allows to register Stokes and anti-Stokes spectral components of protective tags. The proposed device allows verification of the authenticity of security documents based on multiple criteria in different spectral ranges. It may be used at enterprises related to the production of security printing products, expert units of law enforcement bodies at check of authenticity of banknotes and other structures.

  7. Security bound of cheat sensitive quantum bit commitment.

    PubMed

    He, Guang Ping

    2015-03-23

    Cheat sensitive quantum bit commitment (CSQBC) loosens the security requirement of quantum bit commitment (QBC), so that the existing impossibility proofs of unconditionally secure QBC can be evaded. But here we analyze the common features in all existing CSQBC protocols, and show that in any CSQBC having these features, the receiver can always learn a non-trivial amount of information on the sender's committed bit before it is unveiled, while his cheating can pass the security check with a probability not less than 50%. The sender's cheating is also studied. The optimal CSQBC protocols that can minimize the sum of the cheating probabilities of both parties are found to be trivial, as they are practically useless. We also discuss the possibility of building a fair protocol in which both parties can cheat with equal probabilities.

  8. 40 CFR 86.540-90 - Exhaust sample analysis.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., if appropriate, NOX: (1) Zero the analyzers and obtain a stable zero reading. Recheck after tests. (2... actual concentrations on chart. (3) Check zeros; repeat the procedure in paragraphs (a) (1) and (2) of... appropriate, NOX. concentrations of samples. (6) Check zero and span points. If difference is greater than 2...

  9. Security Considerations and Recommendations in Computer-Based Testing

    PubMed Central

    Al-Saleem, Saleh M.

    2014-01-01

    Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT). However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system (username/password) in order to check the identity and authenticity of the examinee. PMID:25254250

  10. Security considerations and recommendations in computer-based testing.

    PubMed

    Al-Saleem, Saleh M; Ullah, Hanif

    2014-01-01

    Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT). However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system (username/password) in order to check the identity and authenticity of the examinee.

  11. 49 CFR Appendix A to Part 1511 - Aviation Security Infrastructure Fee

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... costs of checkpoint screening personnel. 2. Salary, benefits, overtime, retirement and other costs of exit lane monitors. 3. Salary, benefits, overtime, retirement and other costs of cargo screeners. 4. Salary, benefits, overtime, retirement and other costs of checked baggage screeners. 5. Salary, benefits...

  12. 46 CFR 111.60-21 - Cable insulation tests.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Cable insulation tests. 111.60-21 Section 111.60-21 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS... electric power and lighting and associated equipment must be checked for proper insulation resistance to...

  13. 46 CFR 111.60-21 - Cable insulation tests.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Cable insulation tests. 111.60-21 Section 111.60-21 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS... electric power and lighting and associated equipment must be checked for proper insulation resistance to...

  14. 46 CFR 111.60-21 - Cable insulation tests.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Cable insulation tests. 111.60-21 Section 111.60-21 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS... electric power and lighting and associated equipment must be checked for proper insulation resistance to...

  15. 46 CFR 111.60-21 - Cable insulation tests.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Cable insulation tests. 111.60-21 Section 111.60-21 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS... electric power and lighting and associated equipment must be checked for proper insulation resistance to...

  16. 46 CFR 111.60-21 - Cable insulation tests.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Cable insulation tests. 111.60-21 Section 111.60-21 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS... electric power and lighting and associated equipment must be checked for proper insulation resistance to...

  17. 38 CFR 21.4153 - Reimbursement of expenses.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., such as social security, retirement, and health, accident, or life insurance, that are payable to all... of a contract must be supported by factual vouchers and all transportation allowances must be supported by detailed claims which can be checked against work assignments in the office of the State...

  18. 78 FR 32417 - Intent To Request Renewal From OMB of One Current Public Collection of Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-30

    ... Officer, Office of Information Technology (OIT), TSA-11, Transportation Security Administration, 601 South... technological collection techniques or other forms of information technology. Information Collection Requirement... provide fingerprints and undergo a criminal history records check. The program implements authorities set...

  19. 33 CFR 165.502 - Safety and Security Zone; Cove Point Liquefied Natural Gas Terminal, Chesapeake Bay, Maryland.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone; Cove Point Liquefied Natural Gas Terminal, Chesapeake Bay, Maryland. 165.502 Section 165.502 Navigation and... Areas Fifth Coast Guard District § 165.502 Safety and Security Zone; Cove Point Liquefied Natural Gas...

  20. 33 CFR 165.502 - Safety and Security Zone; Cove Point Liquefied Natural Gas Terminal, Chesapeake Bay, Maryland.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Safety and Security Zone; Cove Point Liquefied Natural Gas Terminal, Chesapeake Bay, Maryland. 165.502 Section 165.502 Navigation and... Areas Fifth Coast Guard District § 165.502 Safety and Security Zone; Cove Point Liquefied Natural Gas...

  1. 33 CFR 165.1102 - Security Zone; Naval Base Point Loma; San Diego Bay, CA.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Loma; San Diego Bay, CA. 165.1102 Section 165.1102 Navigation and Navigable Waters COAST GUARD... § 165.1102 Security Zone; Naval Base Point Loma; San Diego Bay, CA. (a) Location. The following area is a security zone: The water adjacent to the Naval Base Point Loma, San Diego, CA, enclosed by the...

  2. Wildlife on the Nevada National Security Site

    USGS Publications Warehouse

    Longshore, Kathleen M.; Wessells, Stephen M.

    2017-09-05

    Mountain lions, desert bighorn sheep, mule deer, and a variety of other wildlife live on and pass through the Nevada National Security Site each day. It is a highly restricted area that is free of hunting and has surprisingly pristine areas. This 22-minute program highlights an extraordinary study on how mountain lions interact with their prey. It shows how the scientists use helicopters and classical lion tracking to check on these animals' health, follow their movements, and fit them with GPS collars. Results from this work provide impressive insight into how these animals survive. The video is also available at the following YouTube link: Wildlife on the Nevada National Security Site.

  3. 40 CFR Appendix A-1 to Part 60 - Test Methods 1 through 2F

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... points are combined to form a single adjusted traverse point, treat the adjusted point as two separate... checks during the traverse (at least once per hour). Record all necessary data on a form similar to that...

  4. 40 CFR Appendix A-1 to Part 60 - Test Methods 1 through 2F

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... points are combined to form a single adjusted traverse point, treat the adjusted point as two separate... checks during the traverse (at least once per hour). Record all necessary data on a form similar to that...

  5. 40 CFR Appendix A-1 to Part 60 - Test Methods 1 through 2F

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... points are combined to form a single adjusted traverse point, treat the adjusted point as two separate... checks during the traverse (at least once per hour). Record all necessary data on a form similar to that...

  6. 40 CFR Appendix A-1 to Part 60 - Test Methods 1 through 2F

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... points are combined to form a single adjusted traverse point, treat the adjusted point as two separate... checks during the traverse (at least once per hour). Record all necessary data on a form similar to that...

  7. Decision Engines for Software Analysis Using Satisfiability Modulo Theories Solvers

    NASA Technical Reports Server (NTRS)

    Bjorner, Nikolaj

    2010-01-01

    The area of software analysis, testing and verification is now undergoing a revolution thanks to the use of automated and scalable support for logical methods. A well-recognized premise is that at the core of software analysis engines is invariably a component using logical formulas for describing states and transformations between system states. The process of using this information for discovering and checking program properties (including such important properties as safety and security) amounts to automatic theorem proving. In particular, theorem provers that directly support common software constructs offer a compelling basis. Such provers are commonly called satisfiability modulo theories (SMT) solvers. Z3 is a state-of-the-art SMT solver. It is developed at Microsoft Research. It can be used to check the satisfiability of logical formulas over one or more theories such as arithmetic, bit-vectors, lists, records and arrays. The talk describes some of the technology behind modern SMT solvers, including the solver Z3. Z3 is currently mainly targeted at solving problems that arise in software analysis and verification. It has been applied to various contexts, such as systems for dynamic symbolic simulation (Pex, SAGE, Vigilante), for program verification and extended static checking (Spec#/Boggie, VCC, HAVOC), for software model checking (Yogi, SLAM), model-based design (FORMULA), security protocol code (F7), program run-time analysis and invariant generation (VS3). We will describe how it integrates support for a variety of theories that arise naturally in the context of the applications. There are several new promising avenues and the talk will touch on some of these and the challenges related to SMT solvers. Proceedings

  8. Aerial surveillance vehicles augment security at shipping ports

    NASA Astrophysics Data System (ADS)

    Huck, Robert C.; Al Akkoumi, Muhammad K.; Cheng, Samuel; Sluss, James J., Jr.; Landers, Thomas L.

    2008-10-01

    With the ever present threat to commerce, both politically and economically, technological innovations provide a means to secure the transportation infrastructure that will allow efficient and uninterrupted freight-flow operations for trade. Currently, freight coming into United States ports is "spot checked" upon arrival and stored in a container yard while awaiting the next mode of transportation. For the most part, only fences and security patrols protect these container storage yards. To augment these measures, the authors propose the use of aerial surveillance vehicles equipped with video cameras and wireless video downlinks to provide a birds-eye view of port facilities to security control centers and security patrols on the ground. The initial investigation described in this paper demonstrates the use of unmanned aerial surveillance vehicles as a viable method for providing video surveillance of container storage yards. This research provides the foundation for a follow-on project to use autonomous aerial surveillance vehicles coordinated with autonomous ground surveillance vehicles for enhanced port security applications.

  9. SU-E-T-117: Analysis of the ArcCHECK Dosimetry Gamma Failure Using the 3DVH System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cho, S; Choi, W; Lee, H

    2015-06-15

    Purpose: To evaluate gamma analysis failure for the VMAT patient specific QA using ArcCHECK cylindrical phantom. The 3DVH system(Sun Nuclear, FL) was used to analyze the dose difference statistic between measured dose and treatment planning system calculated dose. Methods: Four case of gamma analysis failure were selected retrospectively. Our institution gamma analysis indexes were absolute dose, 3%/3mm and 90%pass rate in the ArcCHECK dosimetry. The collapsed cone convolution superposition (CCCS) dose calculation algorithm for VMAT was used. Dose delivery was performed with Elekta Agility. The A1SL(standard imaging, WI) and cavity plug were used for point dose measurement. Delivery QA plansmore » and images were used for 3DVH Reference data instead of patient plan and image. The measured data of ‘.txt’ file was used for comparison at diodes to acquire a global dose level. The,.acml’ file was used for AC-PDP and to calculated point dose. Results: The global dose of 3DVH was calculated as 1.10 Gy, 1.13, 1.01 and 0.2 Gy respectively. The global dose of 0.2 Gy case was induced by distance discrepancy. The TPS calculated point dose of was 2.33 Gy to 2.77 Gy and 3DVH calculated dose was 2.33 Gy to 2.68 Gy. The maximum dose differences were −2.83% and −3.1% for TPS vs. measured dose and TPS vs. 3DVH calculated respectively in the same case. The difference between measured and 3DVH was 0.1% in that case. The 3DVH gamma pass rate was 98% to 99.7%. Conclusion: We found the TPS calculation error by 3DVH calculation using ArcCHECK measured dose. It seemed that our CCCS algorithm RTP system over estimated at the central region and underestimated scattering at the peripheral diode detector point. The relative gamma analysis and point dose measurement would be recommended for VMAT DQA in the gamma failure case of ArcCHECK dosimetry.« less

  10. Strategy optimization for mask rule check in wafer fab

    NASA Astrophysics Data System (ADS)

    Yang, Chuen Huei; Lin, Shaina; Lin, Roger; Wang, Alice; Lee, Rachel; Deng, Erwin

    2015-07-01

    Photolithography process is getting more and more sophisticated for wafer production following Moore's law. Therefore, for wafer fab, consolidated and close cooperation with mask house is a key to achieve silicon wafer success. However, generally speaking, it is not easy to preserve such partnership because many engineering efforts and frequent communication are indispensable. The inattentive connection is obvious in mask rule check (MRC). Mask houses will do their own MRC at job deck stage, but the checking is only for identification of mask process limitation including writing, etching, inspection, metrology, etc. No further checking in terms of wafer process concerned mask data errors will be implemented after data files of whole mask are composed in mask house. There are still many potential data errors even post-OPC verification has been done for main circuits. What mentioned here are the kinds of errors which will only occur as main circuits combined with frame and dummy patterns to form whole reticle. Therefore, strategy optimization is on-going in UMC to evaluate MRC especially for wafer fab concerned errors. The prerequisite is that no impact on mask delivery cycle time even adding this extra checking. A full-mask checking based on job deck in gds or oasis format is necessary in order to secure acceptable run time. Form of the summarized error report generated by this checking is also crucial because user friendly interface will shorten engineers' judgment time to release mask for writing. This paper will survey the key factors of MRC in wafer fab.

  11. A new approach for willingness test in biometric systems

    NASA Astrophysics Data System (ADS)

    Yang, Kai; Du, Yingzi; Zhou, Zhi

    2011-06-01

    Biometrics identifies/verifies a person using his/her physiological or behavioral characteristics. It is becoming an important ally for law enforcement and homeland security. However, there are some safety and privacy concerns: biometric based systems can be accessed when users are under threat, reluctant or even unconscious states. In this paper, we introduce a new method which can identify a person and detect his/her willingness. Our experimental results show that the new approach can enhance the security by checking the consent signature while achieving very high recognition accuracy.

  12. 32 CFR Appendix B to Part 154 - Request Procedures

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Request Procedures B Appendix B to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE... Center, Defense Investigative Service, P.O. Box 1083, Baltimore, Maryland 21203. C. National Agency Check...

  13. 32 CFR Appendix B to Part 154 - Request Procedures

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Request Procedures B Appendix B to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE... Center, Defense Investigative Service, P.O. Box 1083, Baltimore, Maryland 21203. C. National Agency Check...

  14. 46 CFR 61.30-20 - Automatic control and safety tests.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 2 2013-10-01 2013-10-01 false Automatic control and safety tests. 61.30-20 Section 61.30-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PERIODIC... and safety tests. Operational tests and checks of all safety and limit controls, combustion controls...

  15. 46 CFR 61.30-20 - Automatic control and safety tests.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 2 2014-10-01 2014-10-01 false Automatic control and safety tests. 61.30-20 Section 61.30-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PERIODIC... and safety tests. Operational tests and checks of all safety and limit controls, combustion controls...

  16. 46 CFR 61.30-20 - Automatic control and safety tests.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 2 2011-10-01 2011-10-01 false Automatic control and safety tests. 61.30-20 Section 61.30-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PERIODIC... and safety tests. Operational tests and checks of all safety and limit controls, combustion controls...

  17. 17 CFR 230.419 - Offerings by blank check companies.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...) Deposit of securities and proceeds in escrow or trust account—(1) General. (i) Except as otherwise...: (A) An escrow account maintained by an “insured depository institution,” as that term is defined in... account established by a broker or dealer registered under the Exchange Act maintaining net capital equal...

  18. 40 CFR 63.1046 - Test methods and procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... vapor leakage could occur) on the cover and associated closure devices shall be checked. Potential leak... test, the cover and closure devices shall be secured in the closed position. (3) The detection... constituent. (4) The detection instrument shall be calibrated before use on each day of its use by the...

  19. Shutting Out Child-Snatchers.

    ERIC Educational Resources Information Center

    Trotter, Andrew

    1993-01-01

    Parental kidnapping could lead to a lawsuit against the school or principal. After general building security, schools need to check on custody status, network with the courts, and convince both custodial and noncustodial parents that schools are on the children's side. A summary provides 14 steps to safeguard against parental kidnapping. (MLF)

  20. Security Protocol Verification and Optimization by Epistemic Model Checking

    DTIC Science & Technology

    2010-11-05

    Three cryptographers are sitting down to dinner at their favourite restau- rant. Their waiter informs them that arrangements have been made with the...Unfortunately, the protocol cannot be expected to satisfy this: suppose that all agents manage to broadcast their mes- sage and all messages have the

  1. Golden Laboratories and Offices | NREL

    Science.gov Websites

    most research laboratories are located at our campus in Golden, Colorado, north of highway I-70 and Renewable Energy Laboratory 15013 Denver West Parkway Golden, CO 80401 303-275-3000 GPS Coordinates 39 your trip. Security Procedures Visitors must check in at the Site Entrance Building. Please see

  2. 20 CFR 410.505 - Payees.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Payees. 410.505 Section 410.505 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, TITLE IV-BLACK... for benefits for a month after the month of death, authority to cash the check will not be given to...

  3. Ethnic Fraud?

    ERIC Educational Resources Information Center

    Pember, Mary Annette

    2007-01-01

    For American Indian scholars, securing a job in higher education can sometimes be as simple as checking a box. Most of the country's colleges and universities do not require proof of tribal enrollment from faculty or staff who identify themselves as American Indians. Students looking to receive financial aid, however, must submit proof that they…

  4. Science and Public Policy since World War II.

    ERIC Educational Resources Information Center

    Rossiter, Margaret W.

    1985-01-01

    Discusses: material/personnel shortages and surpluses around 1950; federal aid to nonmilitary research; loyalty oaths and security checks; rise of the behavioral sciences; science education, from the Cold War to creationism; antinuclear protests and the limited test ban treaty, 1954-1963; Sputnik and the space program; and health, safety, and…

  5. Too Many Kids Are Getting Killed.

    ERIC Educational Resources Information Center

    Molnar, Alex

    1992-01-01

    For too many children, our society is a fearful wasteland that mocks adult pieties and nurtures nihilism. The threat of violence cannot be dispelled with metal detectors, weapons checks, and secured hallways. Educators must adopt classroom practices that promote and strengthen peaceful relations among students and become more effective advocates…

  6. 76 FR 22399 - HIT Policy Committee's Workgroup Meetings; Notice of Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-21

    ...: Meaningful Use, Privacy & Security Tiger Team, Quality Measures, Governance, Adoption/Certification, and... with the Federal Health IT Strategic Plan and that includes recommendations on the areas in which...://healthit.hhs.gov . Please check the ONC Web site for additional information or revised schedules as it...

  7. Arms Control and National Security.

    ERIC Educational Resources Information Center

    Graham, Daniel O.

    1985-01-01

    From the Soviet perspective arms control agreements merely hold the United States in check while the Soviets, who don't feel bound by such agreements, obtain military advantages. The United States must move quickly to redress the strategic military balance that now favors the Soviets. We must emphasize areas like space. (RM)

  8. 19 CFR 122.182 - Security provisions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... port director may require the applicant to submit fingerprints on form FD-258 or on any other approved... fingerprint checks and the Customs administrative processing fee, the total of which must be tendered by, or... require the submission of fingerprints as provided in paragraph (c)(1)(i) of this section. The new...

  9. 19 CFR 122.182 - Security provisions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... port director may require the applicant to submit fingerprints on form FD-258 or on any other approved... fingerprint checks and the Customs administrative processing fee, the total of which must be tendered by, or... require the submission of fingerprints as provided in paragraph (c)(1)(i) of this section. The new...

  10. 78 FR 72025 - Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-02

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay... establishing a new security zone at the Naval Mine and Anti-Submarine Warfare Command to protect the relocated... Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine Warfare Command, and the...

  11. 33 CFR 165.1102 - Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Loma; San Diego Bay, San Diego, CA. 165.1102 Section 165.1102 Navigation and Navigable Waters COAST... Guard District § 165.1102 Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA. (a) Location. The following area is a security zone: The water adjacent to the Naval Base Point Loma, San Diego...

  12. 33 CFR 165.1102 - Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Loma; San Diego Bay, San Diego, CA. 165.1102 Section 165.1102 Navigation and Navigable Waters COAST... Guard District § 165.1102 Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA. (a) Location. The following area is a security zone: The water adjacent to the Naval Base Point Loma, San Diego...

  13. 33 CFR 165.1102 - Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Loma; San Diego Bay, San Diego, CA. 165.1102 Section 165.1102 Navigation and Navigable Waters COAST... Guard District § 165.1102 Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA. (a) Location. The following area is a security zone: The water adjacent to the Naval Base Point Loma, San Diego...

  14. Immunotherapy targeting immune check-point(s) in brain metastases.

    PubMed

    Di Giacomo, Anna Maria; Valente, Monica; Covre, Alessia; Danielli, Riccardo; Maio, Michele

    2017-08-01

    Immunotherapy with monoclonal antibodies (mAb) directed to different immune check-point(s) is showing a significant clinical impact in a growing number of human tumors of different histotype, both in terms of disease response and long-term survival patients. In this rapidly changing scenario, treatment of brain metastases remains an high unmeet medical need, and the efficacy of immunotherapy in these highly dismal clinical setting remains to be largely demonstrated. Nevertheless, up-coming observations are beginning to suggest a clinical potential of cancer immunotherapy also in brain metastases, regardless the underlying tumor histotype. These observations remain to be validated in larger clinical trials eventually designed also to address the efficacy of therapeutic mAb to immune check-point(s) within multimodality therapies for brain metastases. Noteworthy, the initial proofs of efficacy on immunotherapy in central nervous system metastases are already fostering clinical trials investigating its therapeutic potential also in primary brain tumors. We here review ongoing immunotherapeutic approaches to brain metastases and primary brain tumors, and the foreseeable strategies to overcome their main biologic hurdles and clinical challenges. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Towards a Certified Lightweight Array Bound Checker for Java Bytecode

    NASA Technical Reports Server (NTRS)

    Pichardie, David

    2009-01-01

    Dynamic array bound checks are crucial elements for the security of a Java Virtual Machines. These dynamic checks are however expensive and several static analysis techniques have been proposed to eliminate explicit bounds checks. Such analyses require advanced numerical and symbolic manipulations that 1) penalize bytecode loading or dynamic compilation, 2) complexify the trusted computing base. Following the Foundational Proof Carrying Code methodology, our goal is to provide a lightweight bytecode verifier for eliminating array bound checks that is both efficient and trustable. In this work, we define a generic relational program analysis for an imperative, stackoriented byte code language with procedures, arrays and global variables and instantiate it with a relational abstract domain as polyhedra. The analysis has automatic inference of loop invariants and method pre-/post-conditions, and efficient checking of analysis results by a simple checker. Invariants, which can be large, can be specialized for proving a safety policy using an automatic pruning technique which reduces their size. The result of the analysis can be checked efficiently by annotating the program with parts of the invariant together with certificates of polyhedral inclusions. The resulting checker is sufficiently simple to be entirely certified within the Coq proof assistant for a simple fragment of the Java bytecode language. During the talk, we will also report on our ongoing effort to scale this approach for the full sequential JVM.

  16. Experimentally feasible security check for n-qubit quantum secret sharing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schauer, Stefan; Huber, Marcus; Hiesmayr, Beatrix C.

    In this article we present a general security strategy for quantum secret sharing (QSS) protocols based on the scheme presented by Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59, 1829 (1999)]. We focus on a generalization of the HBB protocol to n communication parties thus including n-partite Greenberger-Horne-Zeilinger states. We show that the multipartite version of the HBB scheme is insecure in certain settings and impractical when going to large n. To provide security for such QSS schemes in general we use the framework presented by some of the authors [M. Huber, F. Mintert, A. Gabriel, B. C. Hiesmayr,more » Phys. Rev. Lett. 104, 210501 (2010)] to detect certain genuine n-partite entanglement between the communication parties. In particular, we present a simple inequality which tests the security.« less

  17. A demonstration of a low cost approach to security at shipping facilities and ports

    NASA Astrophysics Data System (ADS)

    Huck, Robert C.; Al Akkoumi, Mouhammad K.; Herath, Ruchira W.; Sluss, James J., Jr.; Radhakrishnan, Sridhar; Landers, Thomas L.

    2010-04-01

    Government funding for the security at shipping facilities and ports is limited so there is a need for low cost scalable security systems. With over 20 million sea, truck, and rail containers entering the United States every year, these facilities pose a large risk to security. Securing these facilities and monitoring the variety of traffic that enter and leave is a major task. To accomplish this, the authors have developed and fielded a low cost fully distributed building block approach to port security at the inland Port of Catoosa in Oklahoma. Based on prior work accomplished in the design and fielding of an intelligent transportation system in the United States, functional building blocks, (e.g. Network, Camera, Sensor, Display, and Operator Console blocks) can be assembled, mixed and matched, and scaled to provide a comprehensive security system. The following functions are demonstrated and scaled through analysis and demonstration: Barge tracking, credential checking, container inventory, vehicle tracking, and situational awareness. The concept behind this research is "any operator on any console can control any device at any time."

  18. Some attributes of a language for property-based testing.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neagoe, Vicentiu; Bishop, Matt

    Property-based testing is a testing technique that evaluates executions of a program. The method checks that specifications, called properties, hold throughout the execution of the program. TASpec is a language used to specify these properties. This paper compares some attributes of the language with the specification patterns used for model-checking languages, and then presents some descriptions of properties that can be used to detect common security flaws in programs. This report describes the results of a one year research project at the University of California, Davis, which was funded by a University Collaboration LDRD entitled ''Property-based Testing for Cyber Securitymore » Assurance''.« less

  19. Probabilistic Priority Message Checking Modeling Based on Controller Area Networks

    NASA Astrophysics Data System (ADS)

    Lin, Cheng-Min

    Although the probabilistic model checking tool called PRISM has been applied in many communication systems, such as wireless local area network, Bluetooth, and ZigBee, the technique is not used in a controller area network (CAN). In this paper, we use PRISM to model the mechanism of priority messages for CAN because the mechanism has allowed CAN to become the leader in serial communication for automobile and industry control. Through modeling CAN, it is easy to analyze the characteristic of CAN for further improving the security and efficiency of automobiles. The Markov chain model helps us to model the behaviour of priority messages.

  20. Self-authentication of value documents

    NASA Astrophysics Data System (ADS)

    Hayosh, Thomas D.

    1998-04-01

    To prevent fraud it is critical to distinguish an authentic document from a counterfeit or altered document. Most current technologies rely on difficult-to-print human detectable features which are added to a document to prevent illegal reproduction. Fraud detection is mostly accomplished by human observation and is based upon the examiner's knowledge, experience and time allotted for examination of a document. Another approach to increasing the security of a value document is to add a unique property to each document. Data about that property is then encoded on the document itself and finally secured using a public key based digital signature. In such a scheme, machine readability of authenticity is possible. This paper describes a patent-applied-for methodology using the unique property of magnetic ink printing, magnetic remanence, that provides for full self- authentication when used with a recordable magnetic stripe for storing a digital signature and other document data. Traditionally the authenticity of a document is determined by physical examination for color, background printing, paper texture, printing resolution, and ink characteristics. On an initial level, there may be numerous security features present on a value document but only a few can be detected and evaluated by the untrained individual. Because security features are normally not standardized except on currency, training tellers and cashiers to do extensive security evaluation is not practical, even though these people are often the only people who get a chance to closely examine the document in a payment system which is back-end automated. In the context of this paper, one should be thinking about value documents such as commercial and personal checks although the concepts presented here can easily be applied to travelers cheques, credit cards, event tickets, passports, driver's licenses, motor vehicle titles, and even currency. For a practical self-authentication system, the false alarms should be less than 1% on the first read pass. Causes of false alarms could be the lack of robustness of the taggant discrimination algorithm, excessive document skew as it is being read, or errors in reading the recordable stripe. The false alarm rate is readily tested by reading the magnetic tags and digitally signing documents in one reader and performing authentication in at least two other reading devices. When reading the same check in the same reader where signed, the error metric is typically in the range of 0.0600. When comparing different checks in different readers, the error metric generally reports values in the range of 0.3930. It is clear from tests to date that the taggant patterns are randomly different for checks even when printed serially one after another using the same printing process. Testing results to date on the robustness of the taggant comparison and discrimination algorithms indicate that it is probable that low false alarms and very low false accept rates will be achieved.

  1. Installation and first operation of the International Fusion Materials Irradiation Facility injector at the Rokkasho site

    NASA Astrophysics Data System (ADS)

    Gobin, Raphael; Bogard, Daniel; Bolzon, Benoit; Bourdelle, Gilles; Chauvin, Nicolas; Chel, Stéphane; Girardot, Patrick; Gomes, Adelino; Guiho, Patrice; Harrault, Francis; Loiseau, Denis; Lussignol, Yves; Misiara, Nicolas; Roger, Arnaud; Senée, Franck; Valette, Matthieu; Cara, Philippe; Duglué, Daniel; Gex, Dominique; Okumura, Yoshikazu; Marcos Ayala, Juan; Knaster, Juan; Marqueta, Alvaro; Kasugai, Atsushi; O'Hira, Shigeru; Shinto, Katsuhiro; Takahashi, Hiroki

    2016-02-01

    The International Fusion Materials Irradiation Facility (IFMIF) linear IFMIF prototype accelerator injector dedicated to high intensity deuteron beam production has been designed, built, and tested at CEA/Saclay between 2008 and 2012. After the completion of the acceptance tests at Saclay, the injector has been fully sent to Japan. The re-assembly of the injector has been performed between March and May 2014. Then after the check-out phase, the production of the first proton beam occurred in November 2014. Hydrogen and deuteron beam commissioning is now in progress after having proceeded with the final tests on the entire injector equipment including high power diagnostics. This article reports the different phases of the injector installation pointing out the safety and security needs, as well as the first beam production results in Japan and chopper tests. Detailed operation and commissioning results (with H+ and D+ 100 keV beams) are reported in a second article.

  2. Immunotherapy in Merkel cell carcinoma: role of Avelumab.

    PubMed

    Palla, Amruth R; Doll, Donald

    2018-01-01

    Merkel cell carcinoma (MCC), a rare skin cancer, is associated with high mortality, especially in a metastatic setting. Though conventional chemotherapy with platinum and etoposide has had high response rates, many of the patients have had early relapse without any effective therapy thereafter. Recently, immune check point inhibitors have shown very good durable responses, leading to the approval of a programmed death-ligand 1 inhibitor Avelumab for these patients. We briefly review the epidemiology and immune basis of the pathogenesis of MCC, which therefore explains the excellent response to check point inhibitors, and throw light on future directions of immunotherapy for this cancer.

  3. [The mechanical behavior and biocompatibility of different modern ideas of partial fixed free-end saddle dentures].

    PubMed

    Lubespere, A; Lebig, A; Jourdan, P

    1992-01-01

    This research is aimed to check the mechanical holding and the biocompatibility at various conceptions of removable partial dentures with free saddles, constituted from satellite alloys. As a matter of fact, the duality of the supporting surface in this kind of dental prosthesis sets biological problems, that one must try to sort out in the best way. It consists of three in vitro experimentations to point out the type or the types of framework answering in the best way to biomechanical and biological requirements. The very same equipment has been used on that three experimentations adapting it to the needs. It's "a machine to overdrive", imagined into the building of "L'Ecole supérieure d'Aéronautique de Toulouse"; this machine is made of an electric engine with an axis of rotation, of two speed reducers giving a motion, of one turn by second, of a knee-joint converting a rotary motion to an alternating motion, of a lever-arm enclosing supporting the weights, of a needle with a foam point which secure the saddles or the strategic zones, of two supporting mandibular and maxillary framework resin patterns, and on the areas representing the osteo-mucosa support capped uniformly with a compressible silicone material of on millimetre thick, of one dynamometer and of an accurate comparator to check the strength used, and the displacement tested zones. The first part consists in testing the amplitude of the saddle displacement and the mobilization of strategic joining areas from various frameworks used. So we can infer the impact on the mucosa during the function. That is why six types of frameworks have been achieved in Wironit satellite alloy showing mechanical qualities admitted to be excellent and to be subject to very accurate experiment conditions with 30 Kz strength (Lundeen and Gibbs, 1982). The results are interpreted through the reading of histograms which X-AXIS represent the points where motions have been located and the Y-AXIS represent the motion at 1/100th millimetre. It allows to show the existence more or less important of the saddle displacement which is not far from the mucosa one and constitute therefore on the biological view point a favourable component but also the existence of tensions in level of some strategic zones which let foresee, for same, a risk of weariness.(ABSTRACT TRUNCATED AT 400 WORDS)

  4. 10 Quick Ways to Analyze Children's Books for Racism and Sexism.

    ERIC Educational Resources Information Center

    Racism and Sexism Resource Center for Educators, New York, NY.

    The 10 guidelines in this guide to analyzing children's books serve as a starting point for evaluating children's literature from the perspective of racist and sexist attitudes. (1) Check the illustrations. Look for stereotypes, for tokenism, and for who's doing what. (2) Check the story lines. Look for subtle forms of bias in such approaches as…

  5. SFTP: A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET

    NASA Astrophysics Data System (ADS)

    KumarRout, Jitendra; Kumar Bhoi, Sourav; Kumar Panda, Sanjaya

    2013-02-01

    Security issues in MANET are a challenging task nowadays. MANETs are vulnerable to passive attacks and active attacks because of a limited number of resources and lack of centralized authority. Blackhole attack is an attack in network layer which degrade the network performance by dropping the packets. In this paper, we have proposed a Secure Fault-Tolerant Paradigm (SFTP) which checks the Blackhole attack in the network. The three phases used in SFTP algorithm are designing of coverage area to find the area of coverage, Network Connection algorithm to design a fault-tolerant model and Route Discovery algorithm to discover the route and data delivery from source to destination. SFTP gives better network performance by making the network fault free.

  6. The charging security study of electric vehicle charging spot based on automatic testing platform

    NASA Astrophysics Data System (ADS)

    Li, Yulan; Yang, Zhangli; Zhu, Bin; Ran, Shengyi

    2018-03-01

    With the increasing of charging spots, the testing of charging security and interoperability becomes more and more urgent and important. In this paper, an interface simulator for ac charging test is designed, the automatic testing platform for electric vehicle charging spots is set up and used to test and analyze the abnormal state during the charging process. On the platform, the charging security and interoperability of ac charging spots and IC-CPD can be checked efficiently, the test report can be generated automatically with No artificial reading error. From the test results, the main reason why the charging spot is not qualified is that the power supply cannot be cut off in the prescribed time when the charging anomaly occurs.

  7. A secure operational model for mobile payments.

    PubMed

    Chang, Tao-Ku

    2014-01-01

    Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service.

  8. A Secure Operational Model for Mobile Payments

    PubMed Central

    2014-01-01

    Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service. PMID:25386607

  9. 32 CFR Appendix C to Part 86 - State Information

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false State Information C Appendix C to Part 86... 86—State Information All SCHR checks should be accompanied by the following: 1. State form, if... information, such as: Name, date of birth, social security number, complete addresses, etc. 2. Fingerprint set...

  10. 46 CFR 35.05-15 - Tank vessel security-TB/ALL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... scuppers, if any, unobstructed; meets any loadline or freeboard requirements; and neither leaks cargo into the water, voids, or cofferdams nor leaks water into the tanks, voids, or cofferdams; (ii) Ensuring... checks are made of every tank barge in the tow for leakage of cargo into the water, voids, or cofferdams...

  11. Expedition 19 Soyuz Rollout

    NASA Image and Video Library

    2009-03-23

    A Russian security member and his dog check the railroad tracks ahead of the Soyuz rocket roll out to the launch pad Tuesday, March 24, 2009 at the Baikonur Cosmodrome in Kazakhstan. The Soyuz is scheduled to launch the crew of Expedition 19 and a spaceflight participant on March 26, 2009. Photo Credit: (NASA/Bill Ingalls)

  12. 77 FR 35681 - Formations of, Acquisitions by, and Mergers of Bank Holding Companies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-14

    ...)(12); and issuing and selling money orders, savings bonds, traveler's checks and similar consumer... Securities, FSB, both in Dallas, Texas, and thereby engage in the operation of a savings association pursuant..., pursuant to section 225.28(b)(7); underwriting and dealing in government obligations and money market...

  13. The Street Stops Here.

    ERIC Educational Resources Information Center

    Murphy, Nora Sharkey

    2000-01-01

    States that schools should be a safe haven for children and urges society to return schools to the safe, secure places they once were. Discusses the need to keep media far away from children in the event of a campus emergency and perform full background checks on all potential school employees. Reports that Catholic schools are providing…

  14. 32 CFR Appendix C to Part 86 - State Information

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false State Information C Appendix C to Part 86... 86—State Information All SCHR checks should be accompanied by the following: 1. State form, if... information, such as: Name, date of birth, social security number, complete addresses, etc. 2. Fingerprint set...

  15. 45 CFR 234.11 - Assistance in the form of money payments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 2 2014-10-01 2012-10-01 true Assistance in the form of money payments. 234.11 Section 234.11 Public Welfare Regulations Relating to Public Welfare OFFICE OF FAMILY ASSISTANCE... Social Security Act to eligible families and individuals. Money payments are payments in cash, checks, or...

  16. 45 CFR 234.11 - Assistance in the form of money payments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 2 2011-10-01 2011-10-01 false Assistance in the form of money payments. 234.11 Section 234.11 Public Welfare Regulations Relating to Public Welfare OFFICE OF FAMILY ASSISTANCE... Social Security Act to eligible families and individuals. Money payments are payments in cash, checks, or...

  17. 76 FR 66618 - Airworthiness Directives; Eurocopter France (Eurocopter) Model EC225LP Helicopters

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-27

    ... tightening torque of the screws which secure the assembly. Since then, Eurocopter has developed a.... EASB 05A005 specifies checking the dome fairing support for a crack and readjusting the tightening torque of the dome fairing-to-dome fairing support attachment screws. If a crack is found, the EASB...

  18. 44 CFR 5.45 - Form of payment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Form of payment. 5.45 Section... SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Fees § 5.45 Form of payment. Payment shall be by check or money order payable to the Federal Emergency Management Agency and shall be addressed to the...

  19. 44 CFR 6.84 - Form of payment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Form of payment. 6.84 Section... SECURITY GENERAL IMPLEMENTATION OF THE PRIVACY ACT OF 1974 Fees § 6.84 Form of payment. Payment shall be by check or money order payable to The Federal Emergency Management Agency and shall be addressed to the...

  20. 76 FR 35169 - Validation of Merchant Mariners' Vital Information and Issuance of Coast Guard Merchant Mariner's...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-16

    ... both temporary and permanent. Locations such as post offices can take secure fingerprints for purposes... large number of applicants might require fingerprints and identification checks, and that the Coast... interim rule and work with industry to come up with a better system for fingerprint and identification...

  1. 46 CFR 108.151 - Two means required.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... following must have at least 2 means of escape: (1) Each accommodation space with a deck area of at least 27 sq. meters (300 sq. ft.). (2) Each space, other than an accommodation space, that is continuously manned or used on a regular working basis except for routine security checks. (3) Weather deck areas...

  2. 46 CFR 108.151 - Two means required.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... following must have at least 2 means of escape: (1) Each accommodation space with a deck area of at least 27 sq. meters (300 sq. ft.). (2) Each space, other than an accommodation space, that is continuously manned or used on a regular working basis except for routine security checks. (3) Weather deck areas...

  3. 46 CFR 108.151 - Two means required.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... following must have at least 2 means of escape: (1) Each accommodation space with a deck area of at least 27 sq. meters (300 sq. ft.). (2) Each space, other than an accommodation space, that is continuously manned or used on a regular working basis except for routine security checks. (3) Weather deck areas...

  4. 46 CFR 108.151 - Two means required.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... following must have at least 2 means of escape: (1) Each accommodation space with a deck area of at least 27 sq. meters (300 sq. ft.). (2) Each space, other than an accommodation space, that is continuously manned or used on a regular working basis except for routine security checks. (3) Weather deck areas...

  5. 46 CFR 108.151 - Two means required.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... following must have at least 2 means of escape: (1) Each accommodation space with a deck area of at least 27 sq. meters (300 sq. ft.). (2) Each space, other than an accommodation space, that is continuously manned or used on a regular working basis except for routine security checks. (3) Weather deck areas...

  6. 40 CFR 63.148 - Leak inspection provisions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...

  7. 40 CFR 63.148 - Leak inspection provisions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...

  8. 40 CFR 63.148 - Leak inspection provisions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...

  9. 40 CFR 63.148 - Leak inspection provisions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...

  10. KSC01pp0735

    NASA Image and Video Library

    2001-04-05

    KENNEDY SPACE CENTER, FLA. -- During a staged mass casualty exercise in the Launch Complex 39 area, a paramedic checks an injured woman on the ground. Employees are playing the role of victims during a sniper scenario. The exercise is being staged to validate capabilities of KSC’ fire, medical, helicopter transport and security personnel to respond to such an event.

  11. An Artificially Intelligent Physical Model-Checking Approach to Detect Switching-Related Attacks on Power Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    El Hariri, Mohamad; Faddel, Samy; Mohammed, Osama

    Decentralized and hierarchical microgrid control strategies have lain the groundwork for shaping the future smart grid. Such control approaches require the cooperation between microgrid operators in control centers, intelligent microcontrollers, and remote terminal units via secure and reliable communication networks. In order to enhance the security and complement the work of network intrusion detection systems, this paper presents an artificially intelligent physical model-checking that detects tampered-with circuit breaker switching control commands whether, due to a cyber-attack or human error. In this technique, distributed agents, which are monitoring sectionalized areas of a given microgrid, will be trained and continuously adapted tomore » verify that incoming control commands do not violate the physical system operational standards and do not put the microgrid in an insecure state. The potential of this approach has been tested by deploying agents that monitor circuit breakers status commands on a 14-bus IEEE benchmark system. The results showed the accuracy of the proposed framework in characterizing the power system and successfully detecting malicious and/or erroneous control commands.« less

  12. Hydrogen Fire in a Storage Vessel

    NASA Technical Reports Server (NTRS)

    Hester, Zena M.

    2010-01-01

    On October 23, 2007, the operations team began a procedure to sample the Liquid Hydrogen (LH2) storage vessels ("tanks"), and associated transfer system. This procedure was being performed to determine the conditions within the system, and if necessary, to purge the system of any excess Gaseous Hydrogen (GH2) in preparation for reactivation of the system. The system had not been used since 2003. The LH2 storage system contains two (2) spherical pressure vessels of 225,000 gallons in volume, with a maximum working pressure (MAWP) of 50 psig. Eight inch transfer piping connects them to the usage point. Operations began with activation of the burnstack for the LH2 storage area. Pneumatic (GN2) systems in the storage area were then activated and checked. Pressurization of storage tank number 1 with gaseous nitrogen (GN2) was initiated, with a target pressure of 10 psig, at which point samples were planned to be taken. At 5 psig, a loud noise was heard in the upper area of tank number 2. Smoke was seen exiting the burnstack and from the insulation on vent lines for both tanks. At this time tank number 1 was vented and the pressurization system was secured. The mishap resulted in physical damage to both storage tanks, as well as to some of the piping for both tanks. Corrective action included repair of the damaged hardware by a qualified contractor. Preventive action included documented organizational policy and procedures for establishing standby and mothball conditions for facilities and equipment, including provisions as detailed in the investigation report recommendations: Recommendation 1: The using organization should define necessary activities in order to place hydrogen systems in long term periods of inactivity. The defined activities should address requirements for rendering inert, isolation (i.e., physical disconnect, double block and bleed, etc.) and periodic monitoring. Recommendation 2: The using organization should develop a process to periodically monitor hazardous systems for proper configuration (i.e., a daily/weekly/monthly check sheet to verify critical purges are active).

  13. Collaborating toward improving food security in Nunavut.

    PubMed

    Wakegijig, Jennifer; Osborne, Geraldine; Statham, Sara; Issaluk, Michelle Doucette

    2013-01-01

    Community members, Aboriginal organizations, public servants and academics have long been describing a desperate situation of food insecurity in the Eastern Canadian Arctic. The Nunavut Food Security Coalition, a partnership of Inuit Organizations and the Government of Nunavut, is collaborating to develop a territorial food security strategy to address pervasive food insecurity in the context of poverty reduction. The Nunavut Food Security Coalition has carried out this work using a community consultation model. The research was collected through community visits, stakeholder consultation and member checking at the Nunavut Food Security Symposium. In this paper, we describe a continuous course of action, based on community engagement and collective action, that has led to sustained political interest in and public mobilization around the issue of food insecurity in Nunavut. The process described in this article is a unique collaboration between multiple organizations that has led to the development of a sustainable partnership that will inform policy development while representing the voice of Nunavummiut.

  14. Collaborating toward improving food security in Nunavut

    PubMed Central

    Wakegijig, Jennifer; Osborne, Geraldine; Statham, Sara; Issaluk, Michelle Doucette

    2013-01-01

    Background Community members, Aboriginal organizations, public servants and academics have long been describing a desperate situation of food insecurity in the Eastern Canadian Arctic. Objective The Nunavut Food Security Coalition, a partnership of Inuit Organizations and the Government of Nunavut, is collaborating to develop a territorial food security strategy to address pervasive food insecurity in the context of poverty reduction. Design The Nunavut Food Security Coalition has carried out this work using a community consultation model. The research was collected through community visits, stakeholder consultation and member checking at the Nunavut Food Security Symposium. Results In this paper, we describe a continuous course of action, based on community engagement and collective action, that has led to sustained political interest in and public mobilization around the issue of food insecurity in Nunavut. Conclusions The process described in this article is a unique collaboration between multiple organizations that has led to the development of a sustainable partnership that will inform policy development while representing the voice of Nunavummiut. PMID:23984307

  15. Derived virtual devices: a secure distributed file system mechanism

    NASA Technical Reports Server (NTRS)

    VanMeter, Rodney; Hotz, Steve; Finn, Gregory

    1996-01-01

    This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dykstra, D.; Blomer, J.

    Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFSmore » and Frontier.« less

  17. An approach to geotracking patients with Alzheimer's disease.

    PubMed

    Yuce, Yilmaz Kemal; Gulkesen, Kemal Hakan; Barcin, Ebru Nur

    2012-01-01

    Recently, numerous systems for geo-tracking Alzheimer's patients with dementia have been developed and reported to be functional for the purposes of security and data collection. However, studies stated possible loss of freedom and autonomy for patients, along with violations of their privacy, which may lead to loss of prestige/dignity. In this study, a geotracking system that aims to balance patients' security and their need for privacy and autonomy is proposed. The system introduces a personalized, four-level temporal geofence based tracking, warning and notification protocol that incorporates a safety check mechanism operating over Global System for Mobile Communications network.

  18. A novel quantum scheme for secure two-party distance computation

    NASA Astrophysics Data System (ADS)

    Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun

    2017-12-01

    Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.

  19. Sex Differences in Health Care Requirements Aboard U.S. Navy Ships

    DTIC Science & Technology

    1990-03-20

    nervous system symptoms (almost entirely headache), and then psychological symptoms (tension, nervousness). After that point, genitourinary problems...variable in accordance with procedures described by Lilienfeld and Lilienfeld .6 In those occupational specialties in which the confidence intervals do not...services such as inoculation, physical examination (e.g., check in, check out, reenlistment), pregnancy test , birth control prescription, Pap test

  20. Immunotherapy in Merkel cell carcinoma: role of Avelumab

    PubMed Central

    Palla, Amruth R; Doll, Donald

    2018-01-01

    Merkel cell carcinoma (MCC), a rare skin cancer, is associated with high mortality, especially in a metastatic setting. Though conventional chemotherapy with platinum and etoposide has had high response rates, many of the patients have had early relapse without any effective therapy thereafter. Recently, immune check point inhibitors have shown very good durable responses, leading to the approval of a programmed death-ligand 1 inhibitor Avelumab for these patients. We briefly review the epidemiology and immune basis of the pathogenesis of MCC, which therefore explains the excellent response to check point inhibitors, and throw light on future directions of immunotherapy for this cancer. PMID:29535979

  1. Optimal message log reclamation for independent checkpointing

    NASA Technical Reports Server (NTRS)

    Wang, Yi-Min; Fuchs, W. Kent

    1993-01-01

    Independent (uncoordinated) check pointing for parallel and distributed systems allows maximum process autonomy but suffers from possible domino effects and the associated storage space overhead for maintaining multiple checkpoints and message logs. In most research on check pointing and recovery, it was assumed that only the checkpoints and message logs older than the global recovery line can be discarded. It is shown how recovery line transformation and decomposition can be applied to the problem of efficiently identifying all discardable message logs, thereby achieving optimal garbage collection. Communication trace-driven simulation for several parallel programs is used to show the benefits of the proposed algorithm for message log reclamation.

  2. 78 FR 53109 - Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-28

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay... Anti-Submarine Warfare Command to protect the relocated marine mammal program. These security zone... Warfare Command, the Commander of Naval Region Southwest, or a designated representative of those...

  3. 26 CFR 301.7505-1 - Sale of personal property acquired by the United States.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Sale of personal property acquired by the... Actions by the United States § 301.7505-1 Sale of personal property acquired by the United States. (a) Sale—(1) In general. Any personal property (except bonds, notes, checks, and other securities) acquired...

  4. 26 CFR 301.7505-1 - Sale of personal property acquired by the United States.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 26 Internal Revenue 18 2011-04-01 2011-04-01 false Sale of personal property acquired by the... Actions by the United States § 301.7505-1 Sale of personal property acquired by the United States. (a) Sale—(1) In general. Any personal property (except bonds, notes, checks, and other securities) acquired...

  5. 17 CFR 230.430B - Prospectus in a registration statement after effective date.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... during the past three years neither the issuer nor any of its predecessors was: (A) A blank check company... purpose of section 5(b)(1) thereof. This provision shall not limit the information required to be... EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Form and Content of Prospectuses...

  6. 75 FR 41254 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Order Approving a...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-15

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62476; File No. SR-FINRA-2010-012] Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Order Approving a Proposed Rule Change To Amend FINRA Rule 8312 (FINRA BrokerCheck Disclosure) July 8, 2010. I. Introduction On March 30, 2010, the Financial Industry Regulatory...

  7. 46 CFR 61.30-20 - Automatic control and safety tests.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 2 2012-10-01 2012-10-01 false Automatic control and safety tests. 61.30-20 Section 61.30-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PERIODIC TESTS AND INSPECTIONS Tests and Inspections of Fired Thermal Fluid Heaters § 61.30-20 Automatic control and safety tests. Operational tests and check...

  8. 76 FR 57097 - Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-15

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65310; File No. SR-CBOE-2011-082] Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Opening and Complex Order Price Check Parameter Features September 9, 2011. Pursuant to Section 19(b)(1)...

  9. 77 FR 4073 - Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-26

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66207; File No. SR-CBOE-2012-004] Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Automatic Execution and Complex Order Price Check Parameter Features January 20, 2012. Pursuant to Sectio...

  10. Toward Practical Verification of Outsourced Computations Using Probabilistically Checkable Proofs (PCPs)

    DTIC Science & Technology

    2010-07-12

    Germany, 1999. [8] L. Babai, L. Fortnow, L. A. Levin, and M. Szegedy. Checking Computations in Polylogarithmic Time. In STOC, 1991. [9] A. Ben- David ...their work. J. ACM, 42(1):269–291, 1995. [12] D. Chaum , C. Crépeau, and I. Damgard. Multiparty unconditionally secure protocols. In STOC, 1988. [13

  11. 78 FR 69732 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70880; File No. SR-FINRA-2013-047] Self... Change To Amend FINRA Rule 8312 (FINRA BrokerCheck Disclosure) To Include Information About Members and... (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on November 1, 2013, the...

  12. To direct the Attorney General to provide State officials with access to criminal history information with respect to certain financial service providers required to undergo State criminal background checks, and for other purposes.

    THOMAS, 113th Congress

    Rep. Bachus, Spencer [R-AL-6

    2014-07-31

    House - 09/26/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. 26 CFR 301.7506-1 - Administration of real estate acquired by the United States.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... methods will enhance the possibility of obtaining a higher price for the property. (3) Time and place of... cases, the district director may also require such persons to make deposits to secure the performance of... treasurer's check drawn on any bank or trust company incorporated under the laws of the United States or...

  14. 78 FR 32527 - Agency Information Collection Activities: Proposed Request and Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-30

    ... online review. Respondents are current Social Security claimants who wish to check the status of their... a decision on a claim, we post a copy of the decision notice online for the user to view. There are some exceptions to posting a copy online, such as disability denial notices (even if filed...

  15. Trusted computation through biologically inspired processes

    NASA Astrophysics Data System (ADS)

    Anderson, Gustave W.

    2013-05-01

    Due to supply chain threats it is no longer a reasonable assumption that traditional protections alone will provide sufficient security for enterprise systems. The proposed cognitive trust model architecture extends the state-of-the-art in enterprise anti-exploitation technologies by providing collective immunity through backup and cross-checking, proactive health monitoring and adaptive/autonomic threat response, and network resource diversity.

  16. Data security: an update.

    PubMed

    1997-05-01

    Safeguarding patient records has always been a major concern for hospitals, but it has taken on added importance with increasing computerization that makes it easier for employees to browse medical charts, usually to check on the condition of a fellow worker, friend, or neighbor. In an effort to make records more secure, two hospitals--the University of Wisconsin Hospital and Clinics, Madison, and Beth Israel-Deaconess Medical Center, Boston, MA--have included an audit trail in their computer security systems to let them know who is accessing them. Such methods to safeguard electronic records and better protect patients' privacy were strongly recommended in March 1997 by a panel of the National Research Council, an arm of the National Academy of Sciences. In this report, we'll present details of how these hospitals are proceeding.

  17. Arms Control and National Security: Revealed through Two Case Studies

    DTIC Science & Technology

    1988-03-01

    national security. Those in the service, while charged to carry out the orders of those appointed over them, possess a potential to influence national...the sixth point , of the stated six major national security goals of the present Administration. Not everyone would [ agree with such a placement...the other side concede some point at the bargaining table. 0 A defense bargain is a relative term relating to how much security or strength a

  18. Continuous Security and Configuration Monitoring of HPC Clusters

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Garcia-Lomeli, H. D.; Bertsch, A. D.; Fox, D. M.

    Continuous security and configuration monitoring of information systems has been a time consuming and laborious task for system administrators at the High Performance Computing (HPC) center. Prior to this project, system administrators had to manually check the settings of thousands of nodes, which required a significant number of hours rendering the old process ineffective and inefficient. This paper explains the application of Splunk Enterprise, a software agent, and a reporting tool in the development of a user application interface to track and report on critical system updates and security compliance status of HPC Clusters. In conjunction with other configuration managementmore » systems, the reporting tool is to provide continuous situational awareness to system administrators of the compliance state of information systems. Our approach consisted of the development, testing, and deployment of an agent to collect any arbitrary information across a massively distributed computing center, and organize that information into a human-readable format. Using Splunk Enterprise, this raw data was then gathered into a central repository and indexed for search, analysis, and correlation. Following acquisition and accumulation, the reporting tool generated and presented actionable information by filtering the data according to command line parameters passed at run time. Preliminary data showed results for over six thousand nodes. Further research and expansion of this tool could lead to the development of a series of agents to gather and report critical system parameters. However, in order to make use of the flexibility and resourcefulness of the reporting tool the agent must conform to specifications set forth in this paper. This project has simplified the way system administrators gather, analyze, and report on the configuration and security state of HPC clusters, maintaining ongoing situational awareness. Rather than querying each cluster independently, compliance checking can be managed from one central location.« less

  19. When Too Much Is Not Enough: Obsessive-Compulsive Disorder as a Pathology of Stopping, Rather than Starting

    PubMed Central

    Hinds, Andrea L.; Woody, Erik Z.; Van Ameringen, Michael; Schmidt, Louis A.; Szechtman, Henry

    2012-01-01

    Background In obsessive-compulsive disorder (OCD), individuals feel compelled to repeatedly perform security-related behaviors, even though these behaviours seem excessive and unwarranted to them. The present research investigated two alternative ways of explaining such behavior: (1) a dysfunction of activation—a starting problem—in which the level of excitation in response to stimuli suggesting potential danger is abnormally strong; versus (2) a dysfunction of termination—a stopping problem—in which the satiety-like process for shutting down security-related thoughts and actions is abnormally weak. Method In two experiments, 70 patients with OCD (57 with washing compulsions, 13 with checking compulsions) and 72 controls were exposed to contamination cues—immersing a hand in wet diapers —and later allowed to wash their hands, first limited to 30 s and then for as long as desired. The intensity of activation of security motivation was measured objectively by change in respiratory sinus arrythmia. Subjective ratings (e.g., contamination) and behavioral measures (e.g., duration of hand washing) were also collected. Results Compared to controls, OCD patients with washing compulsions did not differ significantly in their levels of initial activation to the threat of contamination; however, they were significantly less able to reduce this activation by engaging in the corrective behavior of hand-washing. Further, the deactivating effect of hand-washing in OCD patients with checking compulsions was similar to that for controls, indicating that the dysfunction of termination in OCD is specific to the patient's symptom profile. Conclusions These results are the first to show that OCD is characterized by a reduced ability of security-related behavior to terminate motivation evoked by potential danger, rather than a heightened initial sensitivity to potential threat. They lend support to the security-motivation theory of OCD (Szechtman & Woody, 2004) and have important implications both for research into the biological mechanisms underlying OCD and for the development of new treatment approaches. PMID:22291994

  20. Fostering E-Mail Security Awareness: The West Point Carronade

    ERIC Educational Resources Information Center

    Ferguson, Aaron J.

    2005-01-01

    The United States Military Academy (USMA) at West Point had a problem with some cadets clicking on suspicious attachments and embedded links, significantly affecting network performance and resource availability. West Point information technology leadership needed a way to increase e-mail security awareness in hopes of maintaining a strong…

  1. Secure video communications system

    DOEpatents

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  2. Prediction Interval Development for Wind-Tunnel Balance Check-Loading

    NASA Technical Reports Server (NTRS)

    Landman, Drew; Toro, Kenneth G.; Commo, Sean A.; Lynn, Keith C.

    2014-01-01

    Results from the Facility Analysis Verification and Operational Reliability project revealed a critical gap in capability in ground-based aeronautics research applications. Without a standardized process for check-loading the wind-tunnel balance or the model system, the quality of the aerodynamic force data collected varied significantly between facilities. A prediction interval is required in order to confirm a check-loading. The prediction interval provides an expected upper and lower bound on balance load prediction at a given confidence level. A method has been developed which accounts for sources of variability due to calibration and check-load application. The prediction interval method of calculation and a case study demonstrating its use is provided. Validation of the methods is demonstrated for the case study based on the probability of capture of confirmation points.

  3. Method of validating measurement data of a process parameter from a plurality of individual sensor inputs

    DOEpatents

    Scarola, Kenneth; Jamison, David S.; Manazir, Richard M.; Rescorl, Robert L.; Harmon, Daryl L.

    1998-01-01

    A method for generating a validated measurement of a process parameter at a point in time by using a plurality of individual sensor inputs from a scan of said sensors at said point in time. The sensor inputs from said scan are stored and a first validation pass is initiated by computing an initial average of all stored sensor inputs. Each sensor input is deviation checked by comparing each input including a preset tolerance against the initial average input. If the first deviation check is unsatisfactory, the sensor which produced the unsatisfactory input is flagged as suspect. It is then determined whether at least two of the inputs have not been flagged as suspect and are therefore considered good inputs. If two or more inputs are good, a second validation pass is initiated by computing a second average of all the good sensor inputs, and deviation checking the good inputs by comparing each good input including a present tolerance against the second average. If the second deviation check is satisfactory, the second average is displayed as the validated measurement and the suspect sensor as flagged as bad. A validation fault occurs if at least two inputs are not considered good, or if the second deviation check is not satisfactory. In the latter situation the inputs from each of all the sensors are compared against the last validated measurement and the value from the sensor input that deviates the least from the last valid measurement is displayed.

  4. The changing face of Hanford security 1990--1994

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thielman, J.

    The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almostmore » literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.« less

  5. A novel quantum solution to secure two-party distance computation

    NASA Astrophysics Data System (ADS)

    Peng, Zhen-wan; Shi, Run-hua; Wang, Pan-hong; Zhang, Shun

    2018-06-01

    Secure Two-Party Distance Computation is an important primitive of Secure Multiparty Computational Geometry that it involves two parties, where each party has a private point, and the two parties want to jointly compute the distance between their points without revealing anything about their respective private information. Secure Two-Party Distance Computation has very important and potential applications in settings of high secure requirements, such as privacy-preserving Determination of Spatial Location-Relation, Determination of Polygons Similarity, and so on. In this paper, we present a quantum protocol for Secure Two-Party Distance Computation by using QKD-based Quantum Private Query. The security of the protocol is based on the physical principles of quantum mechanics, instead of difficulty assumptions, and therefore, it can ensure higher security than the classical related protocols.

  6. General A Scheme to Share Information via Employing Discrete Algorithm to Quantum States

    NASA Astrophysics Data System (ADS)

    Kang, Guo-Dong; Fang, Mao-Fa

    2011-02-01

    We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid.

  7. The SERENITY Runtime Monitoring Framework

    NASA Astrophysics Data System (ADS)

    Spanoudakis, George; Kloukinas, Christos; Mahbub, Khaled

    This chapter describes SERENITY’s approach to runtime monitoring and the framework that has been developed to support it. Runtime monitoring is required in SERENITY in order to check for violations of security and dependability properties which are necessary for the correct operation of the security and dependability solutions that are available from the SERENITY framework. This chapter discusses how such properties are specified and monitored. The chapter focuses on the activation and execution of monitoring activities using S&D Patterns and the actions that may be undertaken following the detection of property violations. The approach is demonstrated in reference to one of the industrial case studies of the SERENITY project.

  8. 77 FR 5864 - BluePoint Linux Software Corp., China Bottles Inc., Long-e International, Inc., and Nano...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-06

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] BluePoint Linux Software Corp., China Bottles Inc., Long-e International, Inc., and Nano Superlattice Technology, Inc.; Order of Suspension of... current and accurate information concerning the securities of BluePoint Linux Software Corp. because it...

  9. 77 FR 2453 - Security Zone; 24th Annual North American International Auto Show, Detroit River, Detroit, MI

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-18

    ... Docket Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room.... The security zone will encompass an area of the Detroit River beginning at a point of origin on land... shoreline to connect back to the point of origin. Vessels in close proximity to the security zone will be...

  10. 33 CFR 165.809 - Security Zones; Port of Port Lavaca-Point Comfort, Point Comfort, TX and Port of Corpus Christi...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Specific Regulated Navigation Areas and Limited Access Areas Eighth Coast Guard District § 165.809 Security Zones; Port of Port...) Location. The following area is designated as a security zone: all waters of the Corpus Christi Inner...

  11. 78 FR 48758 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-09

    ... designated by the entering party, without checking the NASDAQ book. If unexecuted, the order (or unexecuted... respect to BX and NYSE. The fee level is consistent with NASDAQ's long-standing practice of charging a..., regardless of the activity level of the member, the listing venue of the security, or the venue to which the...

  12. 76 FR 57094 - Self-Regulatory Organizations; C2 Options Exchange, Incorporated; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-15

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65311; File No. SR-C2-2011-018] Self-Regulatory Organizations; C2 Options Exchange, Incorporated; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Opening and Complex Order Price Check Parameter Features September 9, 2011. Pursuant to Section 19(b)(1) of the...

  13. CAPTCHA: Impact on User Experience of Users with Learning Disabilities

    ERIC Educational Resources Information Center

    Gafni, Ruti; Nagar, Idan

    2016-01-01

    CAPTCHA is one of the most common solutions to check if the user trying to enter a Website is a real person or an automated piece of software. This challenge-response test, implemented in many Internet Websites, emphasizes the gaps between accessibility and security on the Internet, as it poses an obstacle for the learning-impaired in the reading…

  14. 10 CFR 37.27 - Requirements for criminal history records checks of individuals granted unescorted access to...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... licensee subject to the provisions of this subpart shall fingerprint each individual who is to be permitted... all collected fingerprints to the Commission for transmission to the FBI. The licensee shall use the... fingerprints will be used to secure a review of his or her criminal history record, and shall inform him or her...

  15. Lessons learned in the execution of advanced x-ray material discrimination (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Young, Sharene

    2017-05-01

    Advanced X-ray Material Discrimination (AXMD) or BAA 13-05 was a broad agency announcement which was initiated in order to develop solutions to the following problem. The emergence of improvised explosive threats and their use by terrorists has placed many challenges on the aviation security screening layers. EDS and AT X-ray equipment have been presented with considerable challenges in developing a broad detection capability for improvised explosive threats during security screening of checked bags and carry-on items. Technologies are needed that increase the measurement or mathematical discrimination between improvised explosive threats and stream-of-commerce clutter in checked baggage and carry-on items. Conventional EDS utilizes two basic discriminating signatures: effective atomic number and density of screened objects. R and D is needed to identify additional discriminating signatures between improvised explosive threats and stream-of commerce clutter to improve detection capability with reduced false alarm rates. DHS S and T EXD along with stakeholders at the TSA, TSL, and the UK Home Office have been successful in funding efforts to address and potentially provide operational solutions which can be deployed as part of the Next Generation of X-ray Technologies.

  16. Analysis of information security management systems at 5 domestic hospitals with more than 500 beds.

    PubMed

    Park, Woo-Sung; Seo, Sun-Won; Son, Seung-Sik; Lee, Mee-Jeong; Kim, Shin-Hyo; Choi, Eun-Mi; Bang, Ji-Eon; Kim, Yea-Eun; Kim, Ok-Nam

    2010-06-01

    The information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on information security and security countermeasures which meet both international standards and the needs of individual hospitals. The ISMS check-list derived from international/domestic standards was distributed to each hospital to complete and the staff of each hospital was interviewed. Information Security Indicator and Information Security Values were used to estimate the present security levels and evaluate the application of each hospital's current system. With regard to the moderate clause of the ISMS, the hospitals were determined to be in compliance. The most vulnerable clause was asset management, in particular, information asset classification guidelines. The clauses of information security incident management and business continuity management were deemed necessary for the establishment of successful ISMS. The level of current ISMS in the hospitals evaluated was determined to be insufficient. Establishment of adequate ISMS is necessary to ensure patient privacy and the safe use of medical records for various purposes. Implementation of ISMS which meet international standards with a long-term and comprehensive perspective is of prime importance. To reflect the requirements of the varied interests of medical staff, consumers, and institutions, the establishment of political support is essential to create suitable hospital ISMS.

  17. Improved dewpoint-probe calibration

    NASA Technical Reports Server (NTRS)

    Stephenson, J. G.; Theodore, E. A.

    1978-01-01

    Relatively-simple pressure-control apparatus calibrates dewpoint probes considerably faster than conventional methods, with no loss of accuracy. Technique requires only pressure measurement at each calibration point and single absolute-humidity measurement at beginning of run. Several probes can be calibrated simultaneously and points can be checked above room temperature.

  18. 46 CFR 197.450 - Breathing gas tests.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... taken at the connection point to the distribution system— (1) Every 6 months; and (2) After every repair or modification. (b) Purchased supplies of breathing mixtures supplied to a diver are checked before... commencement of diving operations, at the umbilical or underwater breathing apparatus connection point for the...

  19. Developing Telecommunication Linkages for Microcomputer-Aided Instruction. TDC Research Report No. 1.

    ERIC Educational Resources Information Center

    Blinn, Charles R.; And Others

    A project undertaken at the University of Minnesota evaluated two microcomputer teletraining systems (audiographic conferencing) to determine the effectiveness of this technology for point-to-point and multipoint distance education. System design requirements included broadcast keystrokes, error checking, master-slave linkages, simultaneous voice…

  20. Expected Paradigm Shift in Brain Metastases Therapy-Immune Checkpoint Inhibitors.

    PubMed

    Jindal, Vishal; Gupta, Sorab

    2018-01-30

    Brain metastasis (BM) is one of the dreadful complications of malignancies. The prognosis after BM is extremely poor and life expectancy is meager. Currently, our treatment modalities are limited to radiotherapy and surgical resection, which also has poor outcomes and leads to various neurological deficits and affects the quality of life of patients. New treatment modality, i.e., immune checkpoint inhibitors, has brought revolution in management of melanoma, renal cancer, and non-small cell lung cancer (NSCLC). Immune checkpoint inhibitors basically enhance the immune response of the body to fight against cancers. Immune response in the brain is highly regulated; therefore, it is challenging to use immune-modulator drugs in BM. The microenvironment of BM is rich in cytotoxic T lymphocytes and which is the target of immune checkpoint inhibitors. Few studies have shown some hope regarding use of immune checkpoint inhibitors in management of BM. It works through inhibiting immune check point gates, i.e., CTLA-4 (cytotoxic T-lymphocyte-associated protein) and PD-1/PD-L1 (programmed cell death protein-1/program death ligand-1). This article explains the basic mechanism of immune check point inhibitors, rationale behind their usage in BM, and some of the clinical studies which have shown the efficacy of immune check point inhibitors in BM.

  1. Faithful One-way Trip Deterministic Secure Quantum Communication Scheme Against Collective Rotating Noise Based on Order Rearrangement of Photon Pairs

    NASA Astrophysics Data System (ADS)

    Yuan, Hao; Zhang, Qin; Hong, Liang; Yin, Wen-jie; Xu, Dong

    2014-08-01

    We present a novel scheme for deterministic secure quantum communication (DSQC) over collective rotating noisy channel. Four special two-qubit states are found can constitute a noise-free subspaces, and so are utilized as quantum information carriers. In this scheme, the information carriers transmite over the quantum channel only one time, which can effectively reduce the influence of other noise existing in quantum channel. The information receiver need only perform two single-photon collective measurements to decode the secret messages, which can make the present scheme more convenient in practical application. It will be showed that our scheme has a relatively high information capacity and intrisic efficiency. Foremostly, the decoy photon pair checking technique and the order rearrangement of photon pairs technique guarantee that the present scheme is unconditionally secure.

  2. High performance reconciliation for continuous-variable quantum key distribution with LDPC code

    NASA Astrophysics Data System (ADS)

    Lin, Dakai; Huang, Duan; Huang, Peng; Peng, Jinye; Zeng, Guihua

    2015-03-01

    Reconciliation is a significant procedure in a continuous-variable quantum key distribution (CV-QKD) system. It is employed to extract secure secret key from the resulted string through quantum channel between two users. However, the efficiency and the speed of previous reconciliation algorithms are low. These problems limit the secure communication distance and the secure key rate of CV-QKD systems. In this paper, we proposed a high-speed reconciliation algorithm through employing a well-structured decoding scheme based on low density parity-check (LDPC) code. The complexity of the proposed algorithm is reduced obviously. By using a graphics processing unit (GPU) device, our method may reach a reconciliation speed of 25 Mb/s for a CV-QKD system, which is currently the highest level and paves the way to high-speed CV-QKD.

  3. A Machine-Checked Proof of A State-Space Construction Algorithm

    NASA Technical Reports Server (NTRS)

    Catano, Nestor; Siminiceanu, Radu I.

    2010-01-01

    This paper presents the correctness proof of Saturation, an algorithm for generating state spaces of concurrent systems, implemented in the SMART tool. Unlike the Breadth First Search exploration algorithm, which is easy to understand and formalise, Saturation is a complex algorithm, employing a mutually-recursive pair of procedures that compute a series of non-trivial, nested local fixed points, corresponding to a chaotic fixed point strategy. A pencil-and-paper proof of Saturation exists, but a machine checked proof had never been attempted. The key element of the proof is the characterisation theorem of saturated nodes in decision diagrams, stating that a saturated node represents a set of states encoding a local fixed-point with respect to firing all events affecting only the node s level and levels below. For our purpose, we have employed the Prototype Verification System (PVS) for formalising the Saturation algorithm, its data structures, and for conducting the proofs.

  4. Behavioral analysis of use personal service e-balance Indonesian social security

    NASA Astrophysics Data System (ADS)

    Wang, Gunawan; Fitriani, Novi; Nurul Fajar, Ahmad

    2017-09-01

    Indonesian Social Security is the one of the government agencies that is trusted to organize social security. With help of Information technology that growing these day, Indonesian Social Security is also developing E-Balance application, where previously all activities for checking balance is done by giving their slip details through the nearest branch to be distributed to each company. So far there is no research that reviewing e-Balance. Hence, the authors is interested to do research related factors that influence the behavior of the use of E-Balance Indonesian Social Security in the Jakarta area and model that can describe those factors Authors distributing questioners to 193 respondents and perform data processing. The result of this study is to know the factors that influence the behavior of use Personal Service E-Balance Indonesian Social Security and model that can describe those factors. The result shows that UTAUT 2 model is not match with this research and need to be enhanced. After enhancement, there are 3 factors that being significant. Such as Behavioral Intention, Effort Expectancy and Social Influence while the others are not supported and need to be customize.

  5. Check Calibration of the NASA Glenn 10- by 10-Foot Supersonic Wind Tunnel (2014 Test Entry)

    NASA Technical Reports Server (NTRS)

    Johnson, Aaron; Pastor-Barsi, Christine; Arrington, E. Allen

    2016-01-01

    A check calibration of the 10- by 10-Foot Supersonic Wind Tunnel (SWT) was conducted in May/June 2014 using an array of five supersonic wedge probes to verify the 1999 Calibration. This check calibration was necessary following a control systems upgrade and an integrated systems test (IST). This check calibration was required to verify the tunnel flow quality was unchanged by the control systems upgrade prior to the next test customer beginning their test entry. The previous check calibration of the tunnel occurred in 2007, prior to the Mars Science Laboratory test program. Secondary objectives of this test entry included the validation of the new Cobra data acquisition system (DAS) against the current Escort DAS and the creation of statistical process control (SPC) charts through the collection of series of repeated test points at certain predetermined tunnel parameters. The SPC charts secondary objective was not completed due to schedule constraints. It is hoped that this effort will be readdressed and completed in the near future.

  6. SU-E-T-762: Toward Volume-Based Independent Dose Verification as Secondary Check

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tachibana, H; Tachibana, R

    2015-06-15

    Purpose: Lung SBRT plan has been shifted to volume prescription technique. However, point dose agreement is still verified using independent dose verification at the secondary check. The volume dose verification is more affected by inhomogeneous correction rather than point dose verification currently used as the check. A feasibility study for volume dose verification was conducted in lung SBRT plan. Methods: Six SBRT plans were collected in our institute. Two dose distributions with / without inhomogeneous correction were generated using Adaptive Convolve (AC) in Pinnacle3. Simple MU Analysis (SMU, Triangle Product, Ishikawa, JP) was used as the independent dose verification softwaremore » program, in which a modified Clarkson-based algorithm was implemented and radiological path length was computed using CT images independently to the treatment planning system. The agreement in point dose and mean dose between the AC with / without the correction and the SMU were assessed. Results: In the point dose evaluation for the center of the GTV, the difference shows the systematic shift (4.5% ± 1.9 %) in comparison of the AC with the inhomogeneous correction, on the other hands, there was good agreement of 0.2 ± 0.9% between the SMU and the AC without the correction. In the volume evaluation, there were significant differences in mean dose for not only PTV (14.2 ± 5.1 %) but also GTV (8.0 ± 5.1 %) compared to the AC with the correction. Without the correction, the SMU showed good agreement for GTV (1.5 ± 0.9%) as well as PTV (0.9% ± 1.0%). Conclusion: The volume evaluation for secondary check may be possible in homogenous region. However, the volume including the inhomogeneous media would make larger discrepancy. Dose calculation algorithm for independent verification needs to be modified to take into account the inhomogeneous correction.« less

  7. Options for Synthetic DNA Order Screening, Revisited.

    PubMed

    DiEuliis, Diane; Carter, Sarah R; Gronvall, Gigi Kwik

    2017-01-01

    Gene synthesis providers affiliated with the International Gene Synthesis Consortium (IGSC) voluntarily screen double-stranded DNA (dsDNA) synthesis orders over 200 bp to check for matches to regulated pathogens and to screen customers. Questions have been raised, however, about the continuing feasibility and effectiveness of screening. There are technical challenges (e.g., oligonucleotides and tracts of DNA less than 200 bp are not screened) and corporate challenges (e.g., the costs of screening are high, but other costs are dropping, so screening is an increasing portion of operating costs). In this article, we describe tangible actions that should be taken to (i) preserve the effectiveness of DNA order screening as a security tool and (ii) develop additional mechanisms to increase the safety and security of DNA synthesis technologies. Screening is not a perfect solution to DNA synthesis security challenges, but we believe it is still a valuable addition to security, and it can remain effective for some time.

  8. Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.

    PubMed

    Keys, Yolanda; Stichler, Jaynelle F

    Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.

  9. 33 CFR 165.1101 - Security Zone: San Diego Bay, CA.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zone: San Diego Bay, CA... Navigation Areas and Limited Access Areas Eleventh Coast Guard District § 165.1101 Security Zone: San Diego... Diego enclosed by the following points: Beginning at 32°41′16.5″ N, 117°08′01″ W (Point A); thence...

  10. 33 CFR 165.1101 - Security Zone: San Diego Bay, CA.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zone: San Diego Bay, CA... Navigation Areas and Limited Access Areas Eleventh Coast Guard District § 165.1101 Security Zone: San Diego... Diego enclosed by the following points: Beginning at 32°41′16.5″ N, 117°08′01″ W (Point A); thence...

  11. 33 CFR 165.1101 - Security Zone: San Diego Bay, CA.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zone: San Diego Bay, CA... Navigation Areas and Limited Access Areas Eleventh Coast Guard District § 165.1101 Security Zone: San Diego... Diego enclosed by the following points: Beginning at 32°41′16.5″ N, 117°08′01″ W (Point A); thence...

  12. 33 CFR 165.1101 - Security Zone: San Diego Bay, CA.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone: San Diego Bay, CA... Navigation Areas and Limited Access Areas Eleventh Coast Guard District § 165.1101 Security Zone: San Diego... Diego enclosed by the following points: Beginning at 32°41′16.5″ N, 117°08′01″ W (Point A); thence...

  13. PF-WFS Shell Inspection Update December 2016

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vigil, Anthony Eugene; Ledoux, Reina Rebecca; Gonzales, Antonio R.

    Since the last project update in FY16:Q2, PF-WFS personnel have advanced in understanding of shell inspection on Coordinate Measuring Machines {CMM} and refined the PF-WFS process to the point it was decided to convert shell inspection from the Sheffield #1 gage to Lietz CM Ms. As a part of introspection on the quality of this process many sets of data have been reviewed and analyzed. This analysis included Sheffield to CMM comparisons, CMM inspection repeatability, fixturing differences, quality check development, probing approach changes. This update report will touch on these improvements that have built the confidence in this process tomore » mainstream it inspecting shells. In addition to the CMM programming advancements, the continuation in refinement of input and outputs for the CMM program has created an archiving scheme, input spline files, an output metafile, and inspection report package. This project will continue to mature. Part designs may require program modifications to accommodate "new to this process" part designs. Technology limitations tied to security and performance are requiring possible changes to computer configurations to support an automated process.« less

  14. Symbolic LTL Compilation for Model Checking: Extended Abstract

    NASA Technical Reports Server (NTRS)

    Rozier, Kristin Y.; Vardi, Moshe Y.

    2007-01-01

    In Linear Temporal Logic (LTL) model checking, we check LTL formulas representing desired behaviors against a formal model of the system designed to exhibit these behaviors. To accomplish this task, the LTL formulas must be translated into automata [21]. We focus on LTL compilation by investigating LTL satisfiability checking via a reduction to model checking. Having shown that symbolic LTL compilation algorithms are superior to explicit automata construction algorithms for this task [16], we concentrate here on seeking a better symbolic algorithm.We present experimental data comparing algorithmic variations such as normal forms, encoding methods, and variable ordering and examine their effects on performance metrics including processing time and scalability. Safety critical systems, such as air traffic control, life support systems, hazardous environment controls, and automotive control systems, pervade our daily lives, yet testing and simulation alone cannot adequately verify their reliability [3]. Model checking is a promising approach to formal verification for safety critical systems which involves creating a formal mathematical model of the system and translating desired safety properties into a formal specification for this model. The complement of the specification is then checked against the system model. When the model does not satisfy the specification, model-checking tools accompany this negative answer with a counterexample, which points to an inconsistency between the system and the desired behaviors and aids debugging efforts.

  15. Automated survey of 8000 plan checks at eight facilities.

    PubMed

    Halabi, Tarek; Lu, Hsiao-Ming; Bernard, Damian A; Chu, James C H; Kirk, Michael C; Hamilton, Russell J; Lei, Yu; Driewer, Joseph

    2016-09-01

    To identify policy and system related weaknesses in treatment planning and plan check work-flows. The authors' web deployed plan check automation solution, PlanCheck, which works with all major planning and record and verify systems (demonstrated here for mosaiq only), allows them to compute violation rates for a large number of plan checks across many facilities without requiring the manual data entry involved with incident filings. Workflows and failure modes are heavily influenced by the type of record and verify system used. Rather than tackle multiple record and verify systems at once, the authors restricted the present survey to mosaiq facilities. Violations were investigated by sending inquiries to physicists running the program. Frequent violations included inadequate tracking in the record and verify system of total and prescription doses. Infrequent violations included incorrect setting of patient orientation in the record and verify system. Peaks in the distribution, over facilities, of violation frequencies pointed to suboptimal policies at some of these facilities. Correspondence with physicists often revealed incomplete knowledge of settings at their facility necessary to perform thorough plan checks. The survey leads to the identification of specific and important policy and system deficiencies that include: suboptimal timing of initial plan checks, lack of communication or agreement on conventions surrounding prescription definitions, and lack of automation in the transfer of some parameters.

  16. Extensions to the visual predictive check to facilitate model performance evaluation.

    PubMed

    Post, Teun M; Freijer, Jan I; Ploeger, Bart A; Danhof, Meindert

    2008-04-01

    The Visual Predictive Check (VPC) is a valuable and supportive instrument for evaluating model performance. However in its most commonly applied form, the method largely depends on a subjective comparison of the distribution of the simulated data with the observed data, without explicitly quantifying and relating the information in both. In recent adaptations to the VPC this drawback is taken into consideration by presenting the observed and predicted data as percentiles. In addition, in some of these adaptations the uncertainty in the predictions is represented visually. However, it is not assessed whether the expected random distribution of the observations around the predicted median trend is realised in relation to the number of observations. Moreover the influence of and the information residing in missing data at each time point is not taken into consideration. Therefore, in this investigation the VPC is extended with two methods to support a less subjective and thereby more adequate evaluation of model performance: (i) the Quantified Visual Predictive Check (QVPC) and (ii) the Bootstrap Visual Predictive Check (BVPC). The QVPC presents the distribution of the observations as a percentage, thus regardless the density of the data, above and below the predicted median at each time point, while also visualising the percentage of unavailable data. The BVPC weighs the predicted median against the 5th, 50th and 95th percentiles resulting from a bootstrap of the observed data median at each time point, while accounting for the number and the theoretical position of unavailable data. The proposed extensions to the VPC are illustrated by a pharmacokinetic simulation example and applied to a pharmacodynamic disease progression example.

  17. What is a good health check? An interview study of health check providers' views and practices.

    PubMed

    Stol, Yrrah H; Asscher, Eva C A; Schermer, Maartje H N

    2017-10-02

    Health checks identify (risk factors for) disease in people without symptoms. They may be offered by the government through population screenings and by other providers to individual users as 'personal health checks'. Health check providers' perspective of 'good' health checks may further the debate on the ethical evaluation and possible regulation of these personal health checks. In 2015, we interviewed twenty Dutch health check providers on criteria for 'good' health checks, and the role these criteria play in their practices. Providers unanimously formulate a number of minimal criteria: Checks must focus on (risk factors for) treatable/preventable disease; Tests must be reliable and clinically valid; Participation must be informed and voluntary; Checks should provide more benefits than harms; Governmental screenings should be cost-effective. Aspirational criteria mentioned were: Follow-up care should be provided; Providers should be skilled and experienced professionals that put the benefit of (potential) users first; Providers should take time and attention. Some criteria were contested: People should be free to test on any (risk factor for) disease; Health checks should only be performed in people at high risk for disease that are likely to implement health advice; Follow up care of privately funded tests should not drain on collective resources. Providers do not always fulfil their own criteria. Their reasons reveal conflicts between criteria, conflicts between criteria and other ethical values, and point to components in the (Dutch) organisation of health care that hinder an ethical provision of health checks. Moreover, providers consider informed consent a criterion that is hard to establish in practice. According to providers, personal health checks should meet the same criteria as population screenings, with the exception of cost-effectiveness. Providers do not always fulfil their own criteria. Results indicate that in thinking about the ethics of health checks potential conflicts between criteria and underlying values should be explicated, guidance in weighing of criteria should be provided and the larger context should be taken into account: other actors than providers need to take up responsibility, and ideally benefits and harms of health checks should be weighed against other measures targeting (risk factors for) disease.

  18. Temporally Aware Reactive Systems

    DTIC Science & Technology

    2005-03-01

    programming language , as does O’Haskell. However, there are signi cant di erences. In Ocaml , state, objects and concurrency are orthogonal aspects. They...dif- ference between the two languages is that Ocaml is strict, while expression evaluation in O’Haskell is lazy. That dif- ference, however, is not... languages ; Static Checking; Overload tolerance; Graceful degradation 16. SECURITY CLASSIFICATION OF: 19a. NAME OF RESPONSIBLE PERSON (Monitor) a

  19. Experience with Adaptive Security Policies.

    DTIC Science & Technology

    1998-03-01

    3.1 Introduction r: 3.2 Logical Groupings of audited permission checks 29 3.3 Auditing of system servers via microkernel snooping 31 3.4...performed by servers other than the microkernel . Since altering each server to audit events would complicate the integration of new servers, a...modification to the microkernel was implemented to allow the microkernel to audit the requests made of other servers. Both methods for enhancing audit

  20. Security and Privacy Assurance Research (SPAR) Pilot Final Report

    DTIC Science & Technology

    2015-11-30

    for a single querier interacting with a single encrypted database. In order to deploy the technology, the underlying cryptography must support multiple...underlying cryptography . A full SPAR system should be evaluated too including the software itself. Software should be checked for consistency with...ESPADA included cryptography libraries (e.g., gnutls, nettle, and openssl). Consider a hypothetical scenario in which a vulnerability is discovered in

  1. Methodology to Improve Aviation Security With Terrorist Using Aircraft as a Weapon

    DTIC Science & Technology

    2013-09-01

    STATEMENT Approval for public release;distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words ) The aviation industry... Electronic Baggage Screening Program EDS Explosive Detection System EMMI Energy, Matter, Material wealth, and Information ETD Explosives Trace...12 All checked baggage in the United States has been subjected to 100% screening since December 2003 under TSA’s Electronic Baggage Screening

  2. Group Key Agreement Efficient in Communication

    DTIC Science & Technology

    2003-10-14

    Selected Areas in Communications, 17(9), September 1999. [13] David Chaum . Zero-knowledge undeniable signatures . In I.B. Damgard, editor, Advances in...sender with some sufficiently strong public key signature method such as DSA or RSA (and using a long-term private key).1 All receivers are required...to verify signatures on all received messages and check the aforementioned fields. Consequently, our security model is different from some recent

  3. Development and testing of a passive check valve for cryogenic applications

    NASA Astrophysics Data System (ADS)

    Moore, B. D.; Maddocks, J. R.; Miller, F. K.

    2014-11-01

    Several cryogenic technologies use check valves, such as the Cold Cycle Dilution Refrigerator (CCDR) and the Hybrid Pulse-Tube/Reverse-Brayton Cryocooler. This paper details the development of a reed-style passive check valve with a PTFE seat for cryogenic applications. The experimental results of tests on the valve using helium gas at temperatures from 293 K down to 5.2 K, verify a scaling argument based on fundamental fluid dynamics that allows results from 78 K to be used in predicting valve performance at much lower temperatures. The scaling argument is then applied to a test conducted at the normal boiling point of Nitrogen to examine the results of improved fabrication methods.

  4. Proof Compression and the Mobius PCC Architecture for Embedded Devices

    NASA Technical Reports Server (NTRS)

    Jensen, Thomas

    2009-01-01

    The EU Mobius project has been concerned with the security of Java applications, and of mobile devices such as smart phones that execute such applications. In this talk, I'll give a brief overview of the results obtained on on-device checking of various security-related program properties. I'll then describe in more detail how the concept of certified abstract interpretation and abstraction-carrying code can be applied to polyhedral-based analysis of Java byte code in order to verify properties pertaining to the usage of resources of a down-loaded application. Particular emphasis has been on finding ways of reducing the size of the certificates that accompany a piece of code.

  5. A Design of a Surgical Site Verification System.

    PubMed

    Shen, Biyu; He, Yan; Chen, Haoyang

    2017-01-01

    Patient security is a significant issue in medical research and clinical practice at present. The Surgical Verification System (Patent Number: ZL 201420079273.5) is designed to recognize and check surgical sites of patients so as to ensure operation security and decrease the risk for practitioners. Composition: (1) Operating Room Server, (2) Label Reader, (3) E-Label, (4) Surgical Site Display, (5) Ward Client, (6) Label Rader-Writer, and (7) Acousto-Optic Alarm. If the Surgical identification, the surgical site, and so on are incorrect, a flashing label control will appear when the alarm rings. You can specify a sound to play for the alarm, a picture to draw, and a message to send. It is a user-friendly system.

  6. Cache as point of coherence in multiprocessor system

    DOEpatents

    Blumrich, Matthias A.; Ceze, Luis H.; Chen, Dong; Gara, Alan; Heidelberger, Phlip; Ohmacht, Martin; Steinmacher-Burow, Burkhard; Zhuang, Xiaotong

    2016-11-29

    In a multiprocessor system, a conflict checking mechanism is implemented in the L2 cache memory. Different versions of speculative writes are maintained in different ways of the cache. A record of speculative writes is maintained in the cache directory. Conflict checking occurs as part of directory lookup. Speculative versions that do not conflict are aggregated into an aggregated version in a different way of the cache. Speculative memory access requests do not go to main memory.

  7. Test Operations Procedure (TOP) 4-2-013 Commodity Engineering Test Procedures, Recoilless Rifle Ammunition

    DTIC Science & Technology

    2009-09-22

    test officer). At a minimum, the CIL will be conducted at the operator level (often referred to as “field strip and clean”). More detailed...is checked before each shot is fired. Use a boresight (optical or laser ) as necessary to check alignment to the target aiming point if the barrel is...for this test should be representative of production. All components must be present, including projectile paint and markings, fuzes, any tool

  8. Congress, NRC mull utility access to FBI criminal files

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ultroska, D.

    1984-08-01

    Experiences at Alabama Power Company and other nuclear utilities have promped a request for institutionalizing security checks of personnel in order to eliminated convicted criminals and drug users. The Nuclear Regulatory Commission (NRC), which could provide FBI criminal history information by submitting fingerprints, does not do so, and would require new legislation to take on that duty. Believing that current malevolent employees can be managed with existing procedures, NRC allows criminal background checks only on prospective employees in order to avoid a negative social impact on personnel. Legislation to transfer criminal histories to nuclear facilities is now pending, and NRCmore » is leaning toward a request for full disclosure, partly because of terrorist threats and partly to save manpower time and costs in reviewing case histories.« less

  9. Intentional cargo disruption by nefarious means: Examining threats, systemic vulnerabilities and securitisation measures in complex global supply chains.

    PubMed

    McGreevy, Conor; Harrop, Wayne

    2015-01-01

    Global trade and commerce requires products to be securely contained and transferred in a timely way across great distances and between national boundaries. Throughout the process, cargo and containers are stored, handled and checked by a range of authorities and authorised agents. Intermodal transportation involves the use of container ships, planes, railway systems, land bridges, road networks and barges. This paper examines the the nefarious nature of intentional disruption and nefarious risks associated with the movement of cargo and container freight. The paper explores main threats, vulnerabilities and security measures relevant to significant intermodal transit risk issues such as theft, piracy, terrorism, contamination, counterfeiting and product tampering. Three risk and vulnerability models are examined and basic standards and regulations that are relevant to safe and secure transit of container goods across international supply networks are outlined.

  10. Security solutions: strategy and architecture

    NASA Astrophysics Data System (ADS)

    Seto, Myron W. L.

    2002-04-01

    Producers of banknotes, other documents of value and brand name goods are being presented constantly with new challenges due to the ever increasing sophistication of easily-accessible desktop publishing and color copying machines, which can be used for counterfeiting. Large crime syndicates have also shown that they have the means and the willingness to invest large sums of money to mimic security features. To ensure sufficient and appropriate protection, a coherent security strategy has to be put into place. The feature has to be appropriately geared to fight against the different types of attacks and attackers, and to have the right degree of sophistication or ease of authentication depending upon by whom or where a check is made. Furthermore, the degree of protection can be considerably increased by taking a multi-layered approach and using an open platform architecture. Features can be stratified to encompass overt, semi-covert, covert and forensic features.

  11. A Policy Language for Modelling Recommendations

    NASA Astrophysics Data System (ADS)

    Abou El Kalam, Anas; Balbiani, Philippe

    While current and emergent applications become more and more complex, most of existing security policies and models only consider a yes/no response to the access requests. Consequently, modelling, formalizing and implementing permissions, obligations and prohibitions do not cover the richness of all the possible scenarios. In fact, several applications have access rules with the recommendation access modality. In this paper we focus on the problem of formalizing security policies with recommendation needs. The aim is to provide a generic domain-independent formal system for modelling not only permissions, prohibitions and obligations, but also recommendations. In this respect, we present our logic-based language, the semantics, the truth conditions, our axiomatic as well as inference rules. We also give a representative use case with our specification of recommendation requirements. Finally, we explain how our logical framework could be used to query the security policy and to check its consistency.

  12. 40 CFR 90.320 - Carbon dioxide analyzer calibration.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... (64 percent) is required (see following table). Example calibration points (%) Acceptable for... periodic interference, system check, and calibration test procedures specified in 40 CFR part 1065...

  13. 40 CFR 90.320 - Carbon dioxide analyzer calibration.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... (64 percent) is required (see following table). Example calibration points (%) Acceptable for... periodic interference, system check, and calibration test procedures specified in 40 CFR part 1065...

  14. 40 CFR 90.320 - Carbon dioxide analyzer calibration.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... (64 percent) is required (see following table). Example calibration points (%) Acceptable for... periodic interference, system check, and calibration test procedures specified in 40 CFR part 1065...

  15. Metasemantics: On the Limits of Semantic Theory

    ERIC Educational Resources Information Center

    Parent, T.

    2009-01-01

    METASEMANTICS is a wake-up call for semantic theory: It reveals that some semantic questions have no adequate answer. (This is meant to be the "epistemic" point that certain semantic questions cannot be "settled"--not a metaphysical point about whether there is a fact-of-the-matter.) METASEMANTICS thus checks our default "optimism" that any…

  16. CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 4

    DTIC Science & Technology

    2005-04-01

    older automated cost- estimating tools are no longer being actively marketed but are still in use such as CheckPoint, COCOMO, ESTIMACS, REVIC, and SPQR ...estimation tools: SPQR /20, Checkpoint, and Knowl- edgePlan. These software estimation tools pioneered the use of function point metrics for sizing and

  17. Evaluation of recycled timber members

    Treesearch

    Douglas R. Rammer

    1999-01-01

    An experimental study was conducted to evaluate the residual shear capacity of large Douglas-fir timbers used in a military facility in Ardeen Hills, MN. A S-point and 4-point bending test was used to determine the effects of checks and splits on the shear strength capacity. Experimental results are compared to past shear and flexural studies.

  18. Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds

    PubMed Central

    Park, Woo-Sung; Son, Seung-Sik; Lee, Mee-Jeong; Kim, Shin-Hyo; Choi, Eun-Mi; Bang, Ji-Eon; Kim, Yea-Eun; Kim, Ok-Nam

    2010-01-01

    Objectives The information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on information security and security countermeasures which meet both international standards and the needs of individual hospitals. Methods The ISMS check-list derived from international/domestic standards was distributed to each hospital to complete and the staff of each hospital was interviewed. Information Security Indicator and Information Security Values were used to estimate the present security levels and evaluate the application of each hospital's current system. Results With regard to the moderate clause of the ISMS, the hospitals were determined to be in compliance. The most vulnerable clause was asset management, in particular, information asset classification guidelines. The clauses of information security incident management and business continuity management were deemed necessary for the establishment of successful ISMS. Conclusions The level of current ISMS in the hospitals evaluated was determined to be insufficient. Establishment of adequate ISMS is necessary to ensure patient privacy and the safe use of medical records for various purposes. Implementation of ISMS which meet international standards with a long-term and comprehensive perspective is of prime importance. To reflect the requirements of the varied interests of medical staff, consumers, and institutions, the establishment of political support is essential to create suitable hospital ISMS. PMID:21818429

  19. TECHNOLOGY EVALUATION REPORT CEREX ENVIRONMENTAL SERVICES UV HOUND POINT SAMPLE AIR MONITOR

    EPA Science Inventory

    The USEPA's National Homeland Security Research Center (NHSRC) Technology Testing and Evaluation Program (TTEP) is carrying out performance tests on homeland security technologies. Under TTEP, Battelle evaluated the performance of the Cerex UV Hound point sample air monitor in de...

  20. XMI2USE: A Tool for Transforming XMI to USE Specifications

    NASA Astrophysics Data System (ADS)

    Sun, Wuliang; Song, Eunjee; Grabow, Paul C.; Simmonds, Devon M.

    The UML-based Specification Environment (USE) tool supports syntactic analysis, type checking, consistency checking, and dynamic validation of invariants and pre-/post conditions specified in the Object Constraint Language (OCL). Due to its animation and analysis power, it is useful when checking critical non-functional properties such as security policies. However, the USE tool requires one to specify (i.e., "write") a model using its own textual language and does not allow one to import any model specification files created by other UML modeling tools. Hence, to make the best use of existing UML tools, we often create a model with OCL constraints using a modeling tool such as the IBM Rational Software Architect (RSA) and then use the USE tool for model validation. This approach, however, requires a manual transformation between the specifications of two different tool formats, which is error-prone and diminishes the benefit of automated model-level validations. In this paper, we describe our own implementation of a specification transformation engine that is based on the Model Driven Architecture (MDA) framework and currently supports automatic tool-level transformations from RSA to USE.

  1. 40 CFR 91.320 - Carbon dioxide analyzer calibration.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... (64 percent) is required (see following table). Example calibration points (percent) Acceptable for...) The initial and periodic interference, system check, and calibration test procedures specified in 40...

  2. 40 CFR 91.320 - Carbon dioxide analyzer calibration.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... (64 percent) is required (see following table). Example calibration points (percent) Acceptable for...) The initial and periodic interference, system check, and calibration test procedures specified in 40...

  3. 40 CFR 91.320 - Carbon dioxide analyzer calibration.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... (64 percent) is required (see following table). Example calibration points (percent) Acceptable for...) The initial and periodic interference, system check, and calibration test procedures specified in 40...

  4. Fine-resolution repeat topographic surveying of dryland landscapes using UAS-based structure-from-motion photogrammetry: Assessing accuracy and precision against traditional ground-based erosion measurements

    USGS Publications Warehouse

    Gillian, Jeffrey K.; Karl, Jason W.; Elaksher, Ahmed; Duniway, Michael C.

    2017-01-01

    Structure-from-motion (SfM) photogrammetry from unmanned aerial system (UAS) imagery is an emerging tool for repeat topographic surveying of dryland erosion. These methods are particularly appealing due to the ability to cover large landscapes compared to field methods and at reduced costs and finer spatial resolution compared to airborne laser scanning. Accuracy and precision of high-resolution digital terrain models (DTMs) derived from UAS imagery have been explored in many studies, typically by comparing image coordinates to surveyed check points or LiDAR datasets. In addition to traditional check points, this study compared 5 cm resolution DTMs derived from fixed-wing UAS imagery with a traditional ground-based method of measuring soil surface change called erosion bridges. We assessed accuracy by comparing the elevation values between DTMs and erosion bridges along thirty topographic transects each 6.1 m long. Comparisons occurred at two points in time (June 2014, February 2015) which enabled us to assess vertical accuracy with 3314 data points and vertical precision (i.e., repeatability) with 1657 data points. We found strong vertical agreement (accuracy) between the methods (RMSE 2.9 and 3.2 cm in June 2014 and February 2015, respectively) and high vertical precision for the DTMs (RMSE 2.8 cm). Our results from comparing SfM-generated DTMs to check points, and strong agreement with erosion bridge measurements suggests repeat UAS imagery and SfM processing could replace erosion bridges for a more synoptic landscape assessment of shifting soil surfaces for some studies. However, while collecting the UAS imagery and generating the SfM DTMs for this study was faster than collecting erosion bridge measurements, technical challenges related to the need for ground control networks and image processing requirements must be addressed before this technique could be applied effectively to large landscapes.

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Covington, E; Younge, K; Chen, X

    Purpose: To evaluate the effectiveness of an automated plan check tool to improve first-time plan quality as well as standardize and document performance of physics plan checks. Methods: The Plan Checker Tool (PCT) uses the Eclipse Scripting API to check and compare data from the treatment planning system (TPS) and treatment management system (TMS). PCT was created to improve first-time plan quality, reduce patient delays, increase efficiency of our electronic workflow, and to standardize and partially automate plan checks in the TPS. A framework was developed which can be configured with different reference values and types of checks. One examplemore » is the prescribed dose check where PCT flags the user when the planned dose and the prescribed dose disagree. PCT includes a comprehensive checklist of automated and manual checks that are documented when performed by the user. A PDF report is created and automatically uploaded into the TMS. Prior to and during PCT development, errors caught during plan checks and also patient delays were tracked in order to prioritize which checks should be automated. The most common and significant errors were determined. Results: Nineteen of 33 checklist items were automated with data extracted with the PCT. These include checks for prescription, reference point and machine scheduling errors which are three of the top six causes of patient delays related to physics and dosimetry. Since the clinical roll-out, no delays have been due to errors that are automatically flagged by the PCT. Development continues to automate the remaining checks. Conclusion: With PCT, 57% of the physics plan checklist has been partially or fully automated. Treatment delays have declined since release of the PCT for clinical use. By tracking delays and errors, we have been able to measure the effectiveness of automating checks and are using this information to prioritize future development. This project was supported in part by P01CA059827.« less

  6. 33 CFR 1.05-5 - Marine Safety and Security Council.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine... Commandant and is the focal point of the Coast Guard regulatory system. The Marine Safety and Security...

  7. 33 CFR 1.05-5 - Marine Safety and Security Council.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine... Commandant and is the focal point of the Coast Guard regulatory system. The Marine Safety and Security...

  8. 33 CFR 1.05-5 - Marine Safety and Security Council.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine... Commandant and is the focal point of the Coast Guard regulatory system. The Marine Safety and Security...

  9. 33 CFR 1.05-5 - Marine Safety and Security Council.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine... Commandant and is the focal point of the Coast Guard regulatory system. The Marine Safety and Security...

  10. SU-E-T-310: Targeting Safety Improvements Through Analysis of Near-Miss Error Detection Points in An Incident Learning Database

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Novak, A; Nyflot, M; Sponseller, P

    2014-06-01

    Purpose: Radiation treatment planning involves a complex workflow that can make safety improvement efforts challenging. This study utilizes an incident reporting system to identify detection points of near-miss errors, in order to guide our departmental safety improvement efforts. Previous studies have examined where errors arise, but not where they are detected or their patterns. Methods: 1377 incidents were analyzed from a departmental nearmiss error reporting system from 3/2012–10/2013. All incidents were prospectively reviewed weekly by a multi-disciplinary team, and assigned a near-miss severity score ranging from 0–4 reflecting potential harm (no harm to critical). A 98-step consensus workflow was usedmore » to determine origination and detection points of near-miss errors, categorized into 7 major steps (patient assessment/orders, simulation, contouring/treatment planning, pre-treatment plan checks, therapist/on-treatment review, post-treatment checks, and equipment issues). Categories were compared using ANOVA. Results: In the 7-step workflow, 23% of near-miss errors were detected within the same step in the workflow, while an additional 37% were detected by the next step in the workflow, and 23% were detected two steps downstream. Errors detected further from origination were more severe (p<.001; Figure 1). The most common source of near-miss errors was treatment planning/contouring, with 476 near misses (35%). Of those 476, only 72(15%) were found before leaving treatment planning, 213(45%) were found at physics plan checks, and 191(40%) were caught at the therapist pre-treatment chart review or on portal imaging. Errors that passed through physics plan checks and were detected by therapists were more severe than other errors originating in contouring/treatment planning (1.81 vs 1.33, p<0.001). Conclusion: Errors caught by radiation treatment therapists tend to be more severe than errors caught earlier in the workflow, highlighting the importance of safety checks in dosimetry and physics. We are utilizing our findings to improve manual and automated checklists for dosimetry and physics.« less

  11. Efficient quantum dialogue without information leakage

    NASA Astrophysics Data System (ADS)

    Yin, Ai-Han; Tang, Zhi-Hui; Chen, Dong

    2015-02-01

    A two-step quantum dialogue scheme is put forward with a class of three-qubit W state and quantum dense coding. Each W state can carry three bits of secret information and the measurement result is encrypted without information leakage. Furthermore, we utilize the entangle properties of W state and decoy photon checking technique to realize three-time channel detection, which can improve the efficiency and security of the scheme.

  12. Wakata in JPM

    NASA Image and Video Library

    2009-06-01

    ISS020-E-005881 (1 June 2009) --- Japan Aerospace Exploration Agency (JAXA) astronaut Koichi Wakata, Expedition 20 flight engineer, conducts the current periodic humidity check on the Cell Biology Experiment Facility (CBEF) in the Saibo Rack in the Kibo laboratory of the International Space Station. Wakata opened the facility’s door for wiping up any condensation inside the micro-G & 1G section, if present, and also secured floating fan mesh with Kapton tape.

  13. Homeland Security Department: FY2008 Request for Appropriations

    DTIC Science & Technology

    2007-05-17

    23 Hiring U.S. Border Patrol (USBP) Agents . . . . . . . . . . . . . . . . . 23 Western Hemisphere Travel Initiative (WHTI...2,613 TWIC 10 27 Hazmat 16 19 Registered Traveler 3 35 FEMA/EPR National flood insurance fund 129 145 CBP Small airports 7 7 Subtotal account level...include TWIC, HAZMAT, Registered Traveler , and Alien Flight School Checks. e. Does not include transfer of $7 million per Sec. 21101 of P.L. 110-5. f

  14. [Quality management and participation into clinical database].

    PubMed

    Okubo, Suguru; Miyata, Hiroaki; Tomotaki, Ai; Motomura, Noboru; Murakami, Arata; Ono, Minoru; Iwanaka, Tadashi

    2013-07-01

    Quality management is necessary for establishing useful clinical database in cooperation with healthcare professionals and facilities. The ways of management are 1) progress management of data entry, 2) liaison with database participants (healthcare professionals), and 3) modification of data collection form. In addition, healthcare facilities are supposed to consider ethical issues and information security for joining clinical databases. Database participants should check ethical review boards and consultation service for patients.

  15. A Home Health Care System for Family Doctor

    NASA Astrophysics Data System (ADS)

    Hamabe, Ryuji; Taketa, Norihiro

    We propose a constitution technique of small-scale Home Health Care system for family doctor that has been developed by applying various API of JAVA. One function is vital data transmission which allows a family doctor to check the data of elderly persons with ease via Internet. Vital data is encrypted and transmitted for the purpose of security. The other function is telecommunication with voice and face image for care consulting.

  16. CHIPS. Volume 29, Issue 1, January - March 2011

    DTIC Science & Technology

    2011-03-01

    services, like electricity, heating or cable television. Bank/Finance Fraud: • They may create counterfeit checks using their victim’s name or...consolidating disparate, stove- piped networks into a single, modern, cost-effective enterprise network with a high level of service that meets...Holland, NGEN program manager. “If NMCI is not the most secure network in the world, it is certainly close. There is no shortfall flexibility

  17. Reliability and Construct Validity of the Dutch Psychopathy Checklist: Youth Version--Findings from a Sample of Male Adolescents in a Juvenile Justice Treatment Institution

    ERIC Educational Resources Information Center

    Das, Jacqueline; de Ruiter, Corine; Doreleijers, Theo; Hillege, Sanne

    2009-01-01

    The present study examines the reliability and construct validity of the Dutch version of the Psychopathy Check List: Youth Version (PCL:YV) in a sample of male adolescents admitted to a secure juvenile justice treatment institution (N = 98). Hare's four-factor model is used to examine reliability and validity of the separate dimensions of…

  18. Transformation-aware Exploit Generation using a HI-CFG

    DTIC Science & Technology

    2013-05-16

    testing has many limitations of its own: it can require significant target -specific setup to perform well; it is unlikely to trigger vulnerabilities...check fails represents a potential vulnerability, but a conservative analysis can produce false positives , so we can use exploit generation to find...warnings that correspond to true positives . We can also find potentially vulnerable instructions in the course of a manual binary- level security audit

  19. Affairs of State: The Interagency and National Security

    DTIC Science & Technology

    2008-12-01

    and Powell and Rumsfeld during the first term of George W. Bush), regularly scheduled PC meetings allow for such differences to be aired and... schedules , operations orders, intelligence briefings, and liaison officers provided redundant layers of cross-checks and communications.1 It was a bright...from those in the executive branch. The timing for approving money works on a schedule that is only partly amenable to interagency coordination or

  20. KENNEDY SPACE CENTER, FLA. - At the Astrotech Space Operations processing facilities, NASA’s MESSENGER spacecraft is secure after transfer to the work stand. There employees of the Johns Hopkins University Applied Physics Laboratory, builders of the spacecraft, will perform an initial state-of-health check. Then processing for launch can begin, including checkout of the power systems, communications systems and control systems. The thermal blankets will also be attached for flight. MESSENGER - short for MErcury Surface, Space ENvironment, GEochemistry and Ranging - will be launched May 11 on a six-year mission aboard a Boeing Delta II rocket. Liftoff is targeted for 2:26 a.m. EDT on Tuesday, May 11.

    NASA Image and Video Library

    2004-03-10

    KENNEDY SPACE CENTER, FLA. - At the Astrotech Space Operations processing facilities, NASA’s MESSENGER spacecraft is secure after transfer to the work stand. There employees of the Johns Hopkins University Applied Physics Laboratory, builders of the spacecraft, will perform an initial state-of-health check. Then processing for launch can begin, including checkout of the power systems, communications systems and control systems. The thermal blankets will also be attached for flight. MESSENGER - short for MErcury Surface, Space ENvironment, GEochemistry and Ranging - will be launched May 11 on a six-year mission aboard a Boeing Delta II rocket. Liftoff is targeted for 2:26 a.m. EDT on Tuesday, May 11.

  1. 40 CFR 91.320 - Carbon dioxide analyzer calibration.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... required (see following table). Example calibration points (percent) Acceptable for calibration? 20, 30, 40... periodic interference, system check, and calibration test procedures specified in 40 CFR part 1065...

  2. Performance Evaluation of 3d Modeling Software for Uav Photogrammetry

    NASA Astrophysics Data System (ADS)

    Yanagi, H.; Chikatsu, H.

    2016-06-01

    UAV (Unmanned Aerial Vehicle) photogrammetry, which combines UAV and freely available internet-based 3D modeling software, is widely used as a low-cost and user-friendly photogrammetry technique in the fields such as remote sensing and geosciences. In UAV photogrammetry, only the platform used in conventional aerial photogrammetry is changed. Consequently, 3D modeling software contributes significantly to its expansion. However, the algorithms of the 3D modelling software are black box algorithms. As a result, only a few studies have been able to evaluate their accuracy using 3D coordinate check points. With this motive, Smart3DCapture and Pix4Dmapper were downloaded from the Internet and commercial software PhotoScan was also employed; investigations were performed in this paper using check points and images obtained from UAV.

  3. Health care workers in danger zones: a special report on safety and security in a changing environment.

    PubMed

    Redwood-Campbell, Lynda J; Sekhar, Sharonya N; Persaud, Christine R

    2014-10-01

    Violence against humanitarian health care workers and facilities in situations of armed conflict is a serious humanitarian problem. Targeting health care workers and destroying or looting medical facilities directly or indirectly impacts the delivery of emergency and life-saving medical assistance, often at a time when it is most needed. Attacks may be intentional or unintentional and can take a range of forms from road blockades and check points which delay or block transport, to the direct targeting of hospitals, attacks against medical personnel, suppliers, patients, and armed entry into health facilities. Lack of access to vital health care services weakens the entire health system and exacerbates existing vulnerabilities, particularly among communities of women, children, the elderly, and the disabled, or anyone else in need of urgent or chronic care. Health care workers, especially local workers, are often the target. This report reviews the work being spearheaded by the Red Cross and Red Crescent Movement on the Health Care in Danger initiative, which aims to strengthen the protections for health care workers and facilities in armed conflicts and ensure safe access for patients. This includes a review of internal reports generated from the expert workshops on a number of topics as well as a number of public sources documenting innovative coping mechanisms adopted by National Red Cross and Red Crescent Societies. The work of other organizations is also briefly examined. This is followed by a review of security mechanisms within the humanitarian sector to ensure the safety and security of health care personnel operating in armed conflicts. From the existing literature, a number of gaps have been identified with current security frameworks that need to be addressed to improve the safety of health care workers and ensure the protection and access of vulnerable populations requiring assistance. A way forward for policy, research, and practice is proposed for consideration. While there is work being done to improve conditions for health care personnel and patients, there need to be concerted actions to stigmatize attacks against workers, facilities, and patients to protect the neutrality of the medical mission.

  4. 15. CONCRETE CHECK DAM NORTHWEST OF SOUTHEAST LAKE LADORA (SECTION ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    15. CONCRETE CHECK DAM NORTHWEST OF SOUTHEAST LAKE LADORA (SECTION 2) WITH THE FORMER EGLI FARM IN THE DISTANCE. - Highline Canal, Sand Creek Lateral, Beginning at intersection of Peoria Street & Highline Canal in Arapahoe County (City of Aurora), Sand Creek lateral Extends 15 miles Northerly through Araphoe County, City & County of Denver, & Adams County to its end point, approximately 1/4 mile Southest of intersectioin of D Street & Ninth Avenue in Adams County (Rocky Mountain Arsenal, Commerce City Vicinity), Commerce City, Adams County, CO

  5. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET

    PubMed Central

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-01-01

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV. PMID:28629142

  6. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    PubMed

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  7. Methods for Geometric Data Validation of 3d City Models

    NASA Astrophysics Data System (ADS)

    Wagner, D.; Alam, N.; Wewetzer, M.; Pries, M.; Coors, V.

    2015-12-01

    Geometric quality of 3D city models is crucial for data analysis and simulation tasks, which are part of modern applications of the data (e.g. potential heating energy consumption of city quarters, solar potential, etc.). Geometric quality in these contexts is however a different concept as it is for 2D maps. In the latter case, aspects such as positional or temporal accuracy and correctness represent typical quality metrics of the data. They are defined in ISO 19157 and should be mentioned as part of the metadata. 3D data has a far wider range of aspects which influence their quality, plus the idea of quality itself is application dependent. Thus, concepts for definition of quality are needed, including methods to validate these definitions. Quality on this sense means internal validation and detection of inconsistent or wrong geometry according to a predefined set of rules. A useful starting point would be to have correct geometry in accordance with ISO 19107. A valid solid should consist of planar faces which touch their neighbours exclusively in defined corner points and edges. No gaps between them are allowed, and the whole feature must be 2-manifold. In this paper, we present methods to validate common geometric requirements for building geometry. Different checks based on several algorithms have been implemented to validate a set of rules derived from the solid definition mentioned above (e.g. water tightness of the solid or planarity of its polygons), as they were developed for the software tool CityDoctor. The method of each check is specified, with a special focus on the discussion of tolerance values where they are necessary. The checks include polygon level checks to validate the correctness of each polygon, i.e. closeness of the bounding linear ring and planarity. On the solid level, which is only validated if the polygons have passed validation, correct polygon orientation is checked, after self-intersections outside of defined corner points and edges are detected, among additional criteria. Self-intersection might lead to different results, e.g. intersection points, lines or areas. Depending on the geometric constellation, they might represent gaps between bounding polygons of the solids, overlaps, or violations of the 2-manifoldness. Not least due to the floating point problem in digital numbers, tolerances must be considered in some algorithms, e.g. planarity and solid self-intersection. Effects of different tolerance values and their handling is discussed; recommendations for suitable values are given. The goal of the paper is to give a clear understanding of geometric validation in the context of 3D city models. This should also enable the data holder to get a better comprehension of the validation results and their consequences on the deployment fields of the validated data set.

  8. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Telecommunications; (iii) Power distribution system; (iv) Access points for ventilation and air-conditioning systems... security areas within the OCS facility; (6) Protect security and surveillance equipment and systems; and (7... security and surveillance equipment and systems and their controls, and lighting system controls; and (3...

  9. Security, Schooling, and the Consumer's Choice To Segregate.

    ERIC Educational Resources Information Center

    Casella, Ronnie

    2003-01-01

    Examines school security in relation to consumerism, pointing out that security is big business. Draws from studies in education, geography, and communication to demonstrate how security has developed into a consumer activity involving suburbanization, technology, self-segregation, and the partitioning of neighborhoods in schools in homogeneous…

  10. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  11. On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals

    NASA Astrophysics Data System (ADS)

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as confidentiality, authentication and authorization are the key for the success for these projects. The Integrating the Healthcare Enterprise (IHE) initiative promotes the coordinated use of established standards for authenticated and secure EHR exchanges among clinics and hospitals. In particular, the IHE integration profile named XUA permits to attest user identities by relying on SAML assertions, i.e. XML documents containing authentication statements. In this paper, we provide a formal model for the secure issuance of such an assertion. We first specify the scenario using the process calculus COWS and then analyse it using the model checker CMC. Our analysis reveals a potential flaw in the XUA profile when using a SAML assertion in an unprotected network. We then suggest a solution for this flaw, and model check and implement this solution to show that it is secure and feasible.

  12. Tools for Administration of a UNIX-Based Network

    NASA Technical Reports Server (NTRS)

    LeClaire, Stephen; Farrar, Edward

    2004-01-01

    Several computer programs have been developed to enable efficient administration of a large, heterogeneous, UNIX-based computing and communication network that includes a variety of computers connected to a variety of subnetworks. One program provides secure software tools for administrators to create, modify, lock, and delete accounts of specific users. This program also provides tools for users to change their UNIX passwords and log-in shells. These tools check for errors. Another program comprises a client and a server component that, together, provide a secure mechanism to create, modify, and query quota levels on a network file system (NFS) mounted by use of the VERITAS File SystemJ software. The client software resides on an internal secure computer with a secure Web interface; one can gain access to the client software from any authorized computer capable of running web-browser software. The server software resides on a UNIX computer configured with the VERITAS software system. Directories where VERITAS quotas are applied are NFS-mounted. Another program is a Web-based, client/server Internet Protocol (IP) address tool that facilitates maintenance lookup of information about IP addresses for a network of computers.

  13. Verifying the secure setup of UNIX client/servers and detection of network intrusion

    NASA Astrophysics Data System (ADS)

    Feingold, Richard; Bruestle, Harry R.; Bartoletti, Tony; Saroyan, R. A.; Fisher, John M.

    1996-03-01

    This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today's global `Infosphere' presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI's broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI's use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on the Ethernet broadcast Local Area Network segment and product transcripts of suspicious user connections. NID's retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.

  14. 23 CFR 1313.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...-half of one percent or more of alcohol by volume, beer and distilled spirits. Beer includes, but is not..., advertising, and educational campaigns that publicize use of sobriety check points or increased law...

  15. 23 CFR 1313.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...-half of one percent or more of alcohol by volume, beer and distilled spirits. Beer includes, but is not..., advertising, and educational campaigns that publicize use of sobriety check points or increased law...

  16. 23 CFR 1313.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...-half of one percent or more of alcohol by volume, beer and distilled spirits. Beer includes, but is not..., advertising, and educational campaigns that publicize use of sobriety check points or increased law...

  17. [Validation of a German-language Version of the Body Checking Questionnaire (BCQ) in Adolescents with Anorexia and Bulimia Nervosa].

    PubMed

    Steinfeld, Beate; Bauer, Anika; Waldorf, Manuel; Engel, Nicole; Braks, Karsten; Huber, Thomas J; Vocks, Silja

    2017-01-01

    Body-related checking behavior, as a behavioral manifestation of a disturbed body image, fosters the development and maintenance of eating disorders. The Body Checking Questionnaire (BCQ) is the most commonly used questionnaire for measuring body-related checking behavior internationally. To date, validation studies are only available for adult populations. Therefore, the aim of this study was to statistically test the German-language version of the BCQ in adolescents. A total of N=129 female adolescents were examined, comprising n=57 with Anorexia Nervosa, n=24 with Bulimia Nervosa, and n=48 healthy female adolescents. A confirmatory factor analysis supports the subdivision of the BCQ into a general factor and the subfactors "overall appearance", "specific body parts" and "idiosyncratic checking", which was also found in the original version. The internal consistencies are good (α≥0.81), and the BCQ is able to differentiate well between adolescents with and without eating disorders. Significant correlations between the BCQ and other body image questionnaires point to a good convergent validity. The German-language BCQ thus constitutes a valid and reliable instrument for measuring body-related checking behavior among adolescents in clinical research and practice. © Georg Thieme Verlag KG Stuttgart · New York.

  18. Blockchain protocols in clinical trials: Transparency and traceability of consent.

    PubMed

    Benchoufi, Mehdi; Porcher, Raphael; Ravaud, Philippe

    2017-01-01

    Clinical trial consent for protocols and their revisions should be transparent for patients and traceable for stakeholders. Our goal is to implement a process allowing for collection of patients' informed consent, which is bound to protocol revisions, storing and tracking the consent in a secure, unfalsifiable and publicly verifiable way, and enabling the sharing of this information in real time. For that, we build a consent workflow using a trending technology called Blockchain. This is a distributed technology that brings a built-in layer of transparency and traceability. From a more general and prospective point of view, we believe Blockchain technology brings a paradigmatical shift to the entire clinical research field. We designed a Proof-of-Concept protocol consisting of time-stamping each step of the patient's consent collection using Blockchain, thus archiving and historicising the consent through cryptographic validation in a securely unfalsifiable and transparent way. For each protocol revision, consent was sought again.  We obtained a single document, in an open format, that accounted for the whole consent collection process: a time-stamped consent status regarding each version of the protocol. This document cannot be corrupted and can be checked on any dedicated public website. It should be considered a robust proof of data. However, in a live clinical trial, the authentication system should be strengthened to remove the need for third parties, here trial stakeholders, and give participative control to the peer users. In the future, the complex data flow of a clinical trial could be tracked by using Blockchain, which core functionality, named Smart Contract, could help prevent clinical trial events not occurring in the correct chronological order, for example including patients before they consented or analysing case report form data before freezing the database. Globally, Blockchain could help with reliability, security, transparency and could be a consistent step toward reproducibility.

  19. Blockchain protocols in clinical trials: Transparency and traceability of consent

    PubMed Central

    Benchoufi, Mehdi; Porcher, Raphael; Ravaud, Philippe

    2018-01-01

    Clinical trial consent for protocols and their revisions should be transparent for patients and traceable for stakeholders. Our goal is to implement a process allowing for collection of patients’ informed consent, which is bound to protocol revisions, storing and tracking the consent in a secure, unfalsifiable and publicly verifiable way, and enabling the sharing of this information in real time. For that, we build a consent workflow using a trending technology called Blockchain. This is a distributed technology that brings a built-in layer of transparency and traceability. From a more general and prospective point of view, we believe Blockchain technology brings a paradigmatical shift to the entire clinical research field. We designed a Proof-of-Concept protocol consisting of time-stamping each step of the patient’s consent collection using Blockchain, thus archiving and historicising the consent through cryptographic validation in a securely unfalsifiable and transparent way. For each protocol revision, consent was sought again.  We obtained a single document, in an open format, that accounted for the whole consent collection process: a time-stamped consent status regarding each version of the protocol. This document cannot be corrupted and can be checked on any dedicated public website. It should be considered a robust proof of data. However, in a live clinical trial, the authentication system should be strengthened to remove the need for third parties, here trial stakeholders, and give participative control to the peer users. In the future, the complex data flow of a clinical trial could be tracked by using Blockchain, which core functionality, named Smart Contract, could help prevent clinical trial events not occurring in the correct chronological order, for example including patients before they consented or analysing case report form data before freezing the database. Globally, Blockchain could help with reliability, security, transparency and could be a consistent step toward reproducibility. PMID:29167732

  20. The development and pilot testing of the marijuana retail surveillance tool (MRST): assessing marketing and point-of-sale practices among recreational marijuana retailers.

    PubMed

    Berg, Carla J; Henriksen, Lisa; Cavazos-Rehg, Patricia; Schauer, Gillian L; Freisthler, Bridget

    2017-12-01

    As recreational marijuana expands, it is critical to develop standardized surveillance measures to study the retail environment. To this end, our research team developed and piloted a tool assessing recreational marijuana retailers in a convenience sample of 20 Denver retailers in 2016. The tool assesses: (i) compliance and security (e.g. age-of-sale signage, ID checks, security cameras); (ii) marketing (i.e. promotions, product availability and price) and (iii) contextual and neighborhood features (i.e. retailer type, facilities nearby). Most shops (90.0%) indicated the minimum age requirement, all verified age. All shops posted interior ads (M = 2.6/retailer, SD = 3.4), primarily to promote edibles and other non-smoked products. Price promotions were common in shops (73.7%), 57.9% used social media promotions and 31.6% had take-away materials (e.g. menus, party promotions). Nearly half of the shops (42.1%) advertised health claims. All shops offered bud, joints, honey oil, tinctures, kief, beverages, edibles and topicals; fewer sold clones and seeds. Six shops (31.6%) sold shop-branded apparel and/or paraphernalia. Prices for bud varied within and between stores ($20-$45/'eighth', ∼3.5 g). Twelve were recreational only, and eight were both recreational and medicinal. Liquor stores were commonly proximal. Reliability assessments with larger, representative samples are needed to create a standardized marijuana retail surveillance tool. © The Author 2017. Published by Oxford University Press. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  1. Security Aspects of an Enterprise-Wide Network Architecture.

    ERIC Educational Resources Information Center

    Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan

    1999-01-01

    Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for…

  2. UML and Model Checking

    NASA Technical Reports Server (NTRS)

    Schneider, F.

    1999-01-01

    UML use cases conceptually identify function points or major requirements that a software system must satisfy. Sequence diagrams expand each use case to show in temporal sequence a more detailed notion of intended system behavior.

  3. 77 FR 38273 - Science Advisory Board; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-27

    ... Administration (NOAA) science programs are of the highest quality and provide optimal support to resource... Environmental Laboratory, 7600 Sand Point Way NE., Seattle, Washington 98115. Please check the SAB Web site http...

  4. A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions

    ERIC Educational Resources Information Center

    Waddell, Stanie Adolphus

    2013-01-01

    Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…

  5. Global Security Contingency Fund: Summary and Issue Overview

    DTIC Science & Technology

    2014-04-04

    Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance

  6. Public-Private Ventures for Morale, Welfare, and Recreation Activities. A Solution to the Loss of Appropriated Funds. Volume 5. Appendices J, K, and L

    DTIC Science & Technology

    1990-07-01

    5 H. Instructions to Offerors ..................................... V-5 VI. Evaluation Factors for Award .................................. VI- 1 A...providing capital improvements, and providing payments to the NAFI (Section VI). These factors will be weighted in the evaluation. The Contracting...maintenance of good order and discipline, security checks, control of drugs and alcohol, and building signage. g. Products and Services. All supplies

  7. Are patients in Western Turkey contented with healthcare services?: a quality assessment study.

    PubMed

    Kuguoglu, Sema; Aslan, Fatma Eti; Icli, Gülnur

    2006-01-01

    The purpose of this study was to describe service quality as perceived by 1200 patients who had inpatient treatment at 3 hospitals in Istanbul: university, social security administration, and government. Patients were most satisfied with the helpful attitudes of personnel during check-in procedures, promptness and skill of nurses, overall service provided by physicians, speedy and skilled work of personnel in laboratories and X-ray rooms, and hospitals in general.

  8. Review of Private Sector Personnel Screening Practices

    DTIC Science & Technology

    2000-10-01

    private sector investigative sources or methods would be useful to the DoD for conducting national security background investigations. The federal government by and large examines more sources and conducts more thorough investigations than industry. In general, private employers (1) have less access to information about applicants...outsource many elements of background checks. It is recommended that the DoD periodically evaluate private sector screening programs and data sources in order to monitor

  9. A Trusted Path Design and Implementation for Security Enhanced Linux

    DTIC Science & Technology

    2004-09-01

    functionality by a member of the team? Witten, et al., [21] provides an excellent discussion of some aspects of the subject. Ultimately, open vs ...terminal window is a program like gnome - terminal that provides a TTY-like environment as a window inside an X Windows session. The phrase computer...Editors selected No sound or video No graphics Check all development boxes except KDE Administrative tools System tools No printing support

  10. The Coast Guard Proceedings of the Marine Safety and Security Council: Spring 2016

    DTIC Science & Technology

    2016-04-01

    PROCEEDINGS Spring 2016 Vol. 73, Number 1 Safety Management System Objectives 6 Safety Management Facilitates Safe Vessel Operation Vessel systems...crew, and operations. by LCDR Aaron W. Demo 9 Safety Management Systems to Prevent Pollution from Ships Standard procedures protect the environment...by LCDR Michael Lendvay 11 Dead Reckoning by Safety Management ? Check your course. by LCDR Corydon F. Heard IV Safety Management Systems and the Outer

  11. Use of Statechart Assertions for Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes

    DTIC Science & Technology

    2012-06-01

    THIS PAGE INTENTIONALLY LEFT BLANK xv LIST OF ACRONYMS AND ABBREVIATIONS BPM Business Process Model BPMN Business Process Modeling Notation C&A...checking leads to an improvement in the quality and success of enterprise software development. Business Process Modeling Notation ( BPMN ) is an...emerging standard that allows business processes to be captured in a standardized format. BPMN lacks formal semantics which leaves many of its features

  12. Online Tester for a Symbol Generator

    NASA Technical Reports Server (NTRS)

    Juday, D.; Mcconaugy, K.

    1985-01-01

    About 95 percent of faults detected. Programable instrument periodically checks for failures in system that generates alphanumerical and other symbol voltages for cathode-ray-tube displays. Symbol-generator tester compares gated test-point voltages with predetermined voltage limits while circuit under test performs commanded operation. A go/no-go indication given, depending on whether test voltage is or is not within its specification. Tester in plug-in modular form, temporarily wired to generator test points, or permanently wired to these points.

  13. Checking Contact Points for Curiosity Drill

    NASA Image and Video Library

    2013-06-05

    This image demonstrates how engineers place the drill carried by NASA Mars rover Curiosity onto rock targets. They first set down the drill two stabilizing prongs near the target, as shown by the dashed line.

  14. 40 CFR 86.540-90 - Exhaust sample analysis.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM NEW AND IN-USE HIGHWAY VEHICLES AND ENGINES Emission Regulations for... appropriate, NOX. concentrations of samples. (6) Check zero and span points. If difference is greater than 2...

  15. 40 CFR 86.540-90 - Exhaust sample analysis.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM NEW AND IN-USE HIGHWAY VEHICLES AND ENGINES Emission Regulations for... appropriate, NOX. concentrations of samples. (6) Check zero and span points. If difference is greater than 2...

  16. Preliminary Retrospective Analysis of Daily Tomotherapy Output Constancy Checks Using Statistical Process Control.

    PubMed

    Mezzenga, Emilio; D'Errico, Vincenzo; Sarnelli, Anna; Strigari, Lidia; Menghi, Enrico; Marcocci, Francesco; Bianchini, David; Benassi, Marcello

    2016-01-01

    The purpose of this study was to retrospectively evaluate the results from a Helical TomoTherapy Hi-Art treatment system relating to quality controls based on daily static and dynamic output checks using statistical process control methods. Individual value X-charts, exponentially weighted moving average charts, and process capability and acceptability indices were used to monitor the treatment system performance. Daily output values measured from January 2014 to January 2015 were considered. The results obtained showed that, although the process was in control, there was an out-of-control situation in the principal maintenance intervention for the treatment system. In particular, process capability indices showed a decreasing percentage of points in control which was, however, acceptable according to AAPM TG148 guidelines. Our findings underline the importance of restricting the acceptable range of daily output checks and suggest a future line of investigation for a detailed process control of daily output checks for the Helical TomoTherapy Hi-Art treatment system.

  17. Defining the IEEE-854 floating-point standard in PVS

    NASA Technical Reports Server (NTRS)

    Miner, Paul S.

    1995-01-01

    A significant portion of the ANSI/IEEE-854 Standard for Radix-Independent Floating-Point Arithmetic is defined in PVS (Prototype Verification System). Since IEEE-854 is a generalization of the ANSI/IEEE-754 Standard for Binary Floating-Point Arithmetic, the definition of IEEE-854 in PVS also formally defines much of IEEE-754. This collection of PVS theories provides a basis for machine checked verification of floating-point systems. This formal definition illustrates that formal specification techniques are sufficiently advanced that is is reasonable to consider their use in the development of future standards.

  18. Is Your Security Budget Used Effectively?

    ERIC Educational Resources Information Center

    Kaufer, Steve

    1997-01-01

    Presents survey information showing where school districts have invested their security budgets. Included are the rankings of the various threats school districts see as requiring security action and the areas most often covered by closed circuit television systems are pointed. (GR)

  19. Securing medical research: a cybersecurity point of view.

    PubMed

    Schneier, Bruce

    2012-06-22

    The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work.

  20. Medical image security in a HIPAA mandated PACS environment.

    PubMed

    Cao, F; Huang, H K; Zhou, X Q

    2003-01-01

    Medical image security is an important issue when digital images and their pertinent patient information are transmitted across public networks. Mandates for ensuring health data security have been issued by the federal government such as Health Insurance Portability and Accountability Act (HIPAA), where healthcare institutions are obliged to take appropriate measures to ensure that patient information is only provided to people who have a professional need. Guidelines, such as digital imaging and communication in medicine (DICOM) standards that deal with security issues, continue to be published by organizing bodies in healthcare. However, there are many differences in implementation especially for an integrated system like picture archiving and communication system (PACS), and the infrastructure to deploy these security standards is often lacking. Over the past 6 years, members in the Image Processing and Informatics Laboratory, Childrens Hospital, Los Angeles/University of Southern California, have actively researched image security issues related to PACS and teleradiology. The paper summarizes our previous work and presents an approach to further research on the digital envelope (DE) concept that provides image integrity and security assurance in addition to conventional network security protection. The DE, including the digital signature (DS) of the image as well as encrypted patient information from the DICOM image header, can be embedded in the background area of the image as an invisible permanent watermark. The paper outlines the systematic development, evaluation and deployment of the DE method in a PACS environment. We have also proposed a dedicated PACS security server that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information. Copyright 2002 Elsevier Science Ltd.

Top