Sample records for security identification display

  1. Managing the Aviation Insider Threat

    DTIC Science & Technology

    2010-12-01

    World Airport NSAS National Strategy for Aviation Security OIS Office of Intelligence SIDA Security Identification Display Area STA Security...Security of the secured area”, 1542.205, “Security of the security identification display area ( SIDA )”, and 1542.209, “Fingerprint-based criminal

  2. Aviation Security: Background and Policy Options for Screening and Securing Air Cargo

    DTIC Science & Technology

    2008-02-25

    today, employees with unescorted access privileges to security identification display areas ( SIDAs ) may access secured areas and aircraft without...where all-cargo aircraft are loaded and unloaded, as security identification display areas ( SIDAs ). This effectively elevates the required security

  3. Concept of Operations for the Next Generation Air Transportation System. Version 3.2

    DTIC Science & Technology

    2011-01-01

    Airside. Security Identification Display Area/Airport ( SIDA ) operations area, terminal perimeter, terminal airspace (security) • Landside. Terminal...Definition RTSS Remote Terminal Security Screening SAA Special Activity Airspace SIDA Security Identification Display Area SM Separation Management

  4. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  5. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  6. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  7. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  8. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  9. Improving the Security of the U.S. Aeronautical Domain: Adopting an Intelligence-Led, Risk-Based Strategy and Partnership

    DTIC Science & Technology

    2010-12-01

    Methodology RMAT Risk Management Assessment Tool SIDA Security Identification Display Area SIGINT Signals Intelligence SO18 Aviation Security...aircraft operate (§ 1542.203); • Provide detection and physical security measures for the “Security Identification Display Area” ( SIDA ), i.e., the area

  10. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... cargo enters an airport Security Identification Display Area or is transferred to another TSA-regulated... program accepts the cargo until the cargo— (A) Enters an airport Security Identification Display Area; (B... 49 Transportation 9 2012-10-01 2012-10-01 false Access to cargo and cargo screening: Security...

  11. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... cargo enters an airport Security Identification Display Area or is transferred to another TSA-regulated... program accepts the cargo until the cargo— (A) Enters an airport Security Identification Display Area; (B... 49 Transportation 9 2014-10-01 2014-10-01 false Access to cargo and cargo screening: Security...

  12. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... cargo enters an airport Security Identification Display Area or is transferred to another TSA-regulated... program accepts the cargo until the cargo— (A) Enters an airport Security Identification Display Area; (B... 49 Transportation 9 2013-10-01 2013-10-01 false Access to cargo and cargo screening: Security...

  13. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... cargo enters an airport Security Identification Display Area or is transferred to another TSA-regulated... program accepts the cargo until the cargo— (A) Enters an airport Security Identification Display Area; (B... 49 Transportation 9 2011-10-01 2011-10-01 false Access to cargo and cargo screening: Security...

  14. 33 CFR 181.29 - Hull identification number display.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Hull identification number... SECURITY (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.29 Hull identification number display. Two identical hull identification numbers are required to be displayed on each...

  15. Concept of Operations for the Next Generation Air Transportation System, Version 2.0

    DTIC Science & Technology

    2007-06-13

    SIDA )/airport operations area (AOA), [R-110] terminal perimeter, terminal airspace (security) • Landside. Terminal public and commercial roadways and...Required Surveillance Performance RTSS Remote Terminal Security Screening SAA Special Activity Airspace SIDA Security Identification Display Area SM...impede airside operations? R-110 Research 6.4.2/C. 4.4.1 Airside: Security Identification Display Area ( SIDA )/AOA R&D needed to develop and

  16. 49 CFR 1542.211 - Identification systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... secured area or SIDA continuously displays the identification medium issued to that individual on the... individual who has authorized unescorted access to secured areas and SIDA's to ascertain the authority of any... approved identification media. The procedure must— (1) Apply uniformly in secured areas, SIDAs, and...

  17. 49 CFR 1542.211 - Identification systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... secured area or SIDA continuously displays the identification medium issued to that individual on the... individual who has authorized unescorted access to secured areas and SIDA's to ascertain the authority of any... approved identification media. The procedure must— (1) Apply uniformly in secured areas, SIDAs, and...

  18. 49 CFR 1542.211 - Identification systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... secured area or SIDA continuously displays the identification medium issued to that individual on the... individual who has authorized unescorted access to secured areas and SIDA's to ascertain the authority of any... approved identification media. The procedure must— (1) Apply uniformly in secured areas, SIDAs, and...

  19. 49 CFR 1542.211 - Identification systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... secured area or SIDA continuously displays the identification medium issued to that individual on the... individual who has authorized unescorted access to secured areas and SIDA's to ascertain the authority of any... approved identification media. The procedure must— (1) Apply uniformly in secured areas, SIDAs, and...

  20. 49 CFR 1542.211 - Identification systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... secured area or SIDA continuously displays the identification medium issued to that individual on the... individual who has authorized unescorted access to secured areas and SIDA's to ascertain the authority of any... approved identification media. The procedure must— (1) Apply uniformly in secured areas, SIDAs, and...

  1. 14 CFR 153.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... the airport security program, in which certain security measures specified in Title 49 of the Code of... procedures. Security Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in which security measures specified in Title 49 of the Code of Federal...

  2. 14 CFR 153.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... the airport security program, in which certain security measures specified in Title 49 of the Code of... procedures. Security Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in which security measures specified in Title 49 of the Code of Federal...

  3. 14 CFR 153.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... the airport security program, in which certain security measures specified in Title 49 of the Code of... procedures. Security Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in which security measures specified in Title 49 of the Code of Federal...

  4. 49 CFR 1554.101 - Security Measures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... certificated repair stations located— (1) On airport. On an air operations area or security identification display area of an airport covered by an airport security program under 49 CFR part 1542 in the United States, or on the security restricted area of any commensurate airport outside the United States...

  5. 49 CFR 1540.5 - Terms used in this subchapter.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... within a secured area or SIDA. Exclusive area means any portion of a secured area, AOA, or SIDA... Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in... present without an escort in, secured areas and SIDA's of airports. Unescorted access to cargo means the...

  6. 41 CFR 102-34.175 - What motor vehicles have an unlimited exemption from displaying U.S. Government license plates...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... MANAGEMENT Identifying and Registering Motor Vehicles Identification Exemptions § 102-34.175 What motor... identification? Motor vehicles used primarily for investigative, law enforcement, intelligence, or security... identification when identifying these motor vehicles would interfere with those duties. ...

  7. 41 CFR 102-34.175 - What motor vehicles have an unlimited exemption from displaying U.S. Government license plates...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... MANAGEMENT Identifying and Registering Motor Vehicles Identification Exemptions § 102-34.175 What motor... identification? Motor vehicles used primarily for investigative, law enforcement, intelligence, or security... identification when identifying these motor vehicles would interfere with those duties. ...

  8. 41 CFR 102-34.175 - What motor vehicles have an unlimited exemption from displaying U.S. Government license plates...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... MANAGEMENT Identifying and Registering Motor Vehicles Identification Exemptions § 102-34.175 What motor... identification? Motor vehicles used primarily for investigative, law enforcement, intelligence, or security... identification when identifying these motor vehicles would interfere with those duties. ...

  9. 41 CFR 102-34.175 - What motor vehicles have an unlimited exemption from displaying U.S. Government license plates...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... MANAGEMENT Identifying and Registering Motor Vehicles Identification Exemptions § 102-34.175 What motor... identification? Motor vehicles used primarily for investigative, law enforcement, intelligence, or security... identification when identifying these motor vehicles would interfere with those duties. ...

  10. 41 CFR 102-34.175 - What motor vehicles have an unlimited exemption from displaying U.S. Government license plates...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... MANAGEMENT Identifying and Registering Motor Vehicles Identification Exemptions § 102-34.175 What motor... identification? Motor vehicles used primarily for investigative, law enforcement, intelligence, or security... identification when identifying these motor vehicles would interfere with those duties. ...

  11. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2012-10-01 2012-10-01 false Access to cargo: Security threat assessments for...

  12. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2014-10-01 2014-10-01 false Access to cargo: Security threat assessments for...

  13. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2013-10-01 2013-10-01 false Access to cargo: Security threat assessments for...

  14. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2011-10-01 2011-10-01 false Access to cargo: Security threat assessments for...

  15. Security Annex Concept of Operations for the Next Generation Air Transportation System, Version 2.0

    DTIC Science & Technology

    2007-06-13

    AOA/ SIDA ........................................................................................................ 21 4.3.2 Terminal Perimeter...place in the following areas within these facilities as appropriate: • Airside: Security identification display area ( SIDA )/AoA, terminal perimeter...validating hypersonic aircraft clearances as they reenter the atmosphere to land at that facility. 4.3 AIRSIDE 4.3.1 AOA/ SIDA NextGen Commercial

  16. 77 FR 30542 - Air Cargo Screening Fees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-23

    ... Security Identification Display Area (SIDA) IDs. Another commenter requested that if TSA intends to limit... obtain SIDA IDs were not included in the fee models for this rulemaking because STAs for holders of SIDA... FR 51854. Comment: One commenter appreciated TSA's recognition that the STAs performed under the SIDA...

  17. Evaluation of a single-pixel one-transistor active pixel sensor for fingerprint imaging

    NASA Astrophysics Data System (ADS)

    Xu, Man; Ou, Hai; Chen, Jun; Wang, Kai

    2015-08-01

    Since it first appeared in iPhone 5S in 2013, fingerprint identification (ID) has rapidly gained popularity among consumers. Current fingerprint-enabled smartphones unanimously consists of a discrete sensor to perform fingerprint ID. This architecture not only incurs higher material and manufacturing cost, but also provides only static identification and limited authentication. Hence as the demand for a thinner, lighter, and more secure handset grows, we propose a novel pixel architecture that is a photosensitive device embedded in a display pixel and detects the reflected light from the finger touch for high resolution, high fidelity and dynamic biometrics. To this purpose, an amorphous silicon (a-Si:H) dual-gate photo TFT working in both fingerprint-imaging mode and display-driving mode will be developed.

  18. Aerial secure display by use of polarization-processing display with retarder film and retro-reflector

    NASA Astrophysics Data System (ADS)

    Ito, Shusei; Uchida, Keitaro; Mizushina, Haruki; Suyama, Shiro; Yamamoto, Hirotsugu

    2017-02-01

    Security is one of the big issues in automated teller machine (ATM). In ATM, two types of security have to be maintained. One is to secure displayed information. The other is to secure screen contamination. This paper gives a solution for these two security issues. In order to secure information against peeping at the screen, we utilize visual cryptography for displayed information and limit the viewing zone. Furthermore, an aerial information screen with aerial imaging by retro-reflection, named AIRR enables users to avoid direct touch on the information screen. The purpose of this paper is to propose an aerial secure display technique that ensures security of displayed information as well as security against contamination problem on screen touch. We have developed a polarization-processing display that is composed of a backlight, a polarizer, a background LCD panel, a gap, a half-wave retarder, and a foreground LCD panel. Polarization angle is rotated with the LCD panels. We have constructed a polarization encryption code set. Size of displayed images are designed to limit the viewing position. Furthermore, this polarization-processing display has been introduced into our aerial imaging optics, which employs a reflective polarizer and a retro-reflector covered with a quarter-wave retarder. Polarization-modulated light forms the real image over the reflective polarizer. We have successfully formed aerial information screen that shows the secret image with a limited viewing position. This is the first realization of aerial secure display by use of polarization-processing display with retarder-film and retro-reflector.

  19. A Design of a Surgical Site Verification System.

    PubMed

    Shen, Biyu; He, Yan; Chen, Haoyang

    2017-01-01

    Patient security is a significant issue in medical research and clinical practice at present. The Surgical Verification System (Patent Number: ZL 201420079273.5) is designed to recognize and check surgical sites of patients so as to ensure operation security and decrease the risk for practitioners. Composition: (1) Operating Room Server, (2) Label Reader, (3) E-Label, (4) Surgical Site Display, (5) Ward Client, (6) Label Rader-Writer, and (7) Acousto-Optic Alarm. If the Surgical identification, the surgical site, and so on are incorrect, a flashing label control will appear when the alarm rings. You can specify a sound to play for the alarm, a picture to draw, and a message to send. It is a user-friendly system.

  20. 41 CFR 102-34.100 - Where is motor vehicle identification displayed?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... MANAGEMENT Identifying and Registering Motor Vehicles Motor Vehicle Identification § 102-34.100 Where is motor vehicle identification displayed? Motor vehicle identification is displayed as follows: (a) For... Government motor vehicles may display motor vehicle identification on a decal in the rear window, or centered...

  1. 41 CFR 102-34.100 - Where is motor vehicle identification displayed?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... MANAGEMENT Identifying and Registering Motor Vehicles Motor Vehicle Identification § 102-34.100 Where is motor vehicle identification displayed? Motor vehicle identification is displayed as follows: (a) For... Government motor vehicles may display motor vehicle identification on a decal in the rear window, or centered...

  2. 41 CFR 102-34.100 - Where is motor vehicle identification displayed?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... MANAGEMENT Identifying and Registering Motor Vehicles Motor Vehicle Identification § 102-34.100 Where is motor vehicle identification displayed? Motor vehicle identification is displayed as follows: (a) For... Government motor vehicles may display motor vehicle identification on a decal in the rear window, or centered...

  3. 41 CFR 102-34.100 - Where is motor vehicle identification displayed?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... MANAGEMENT Identifying and Registering Motor Vehicles Motor Vehicle Identification § 102-34.100 Where is motor vehicle identification displayed? Motor vehicle identification is displayed as follows: (a) For... Government motor vehicles may display motor vehicle identification on a decal in the rear window, or centered...

  4. Performance evaluation of wavelet-based face verification on a PDA recorded database

    NASA Astrophysics Data System (ADS)

    Sellahewa, Harin; Jassim, Sabah A.

    2006-05-01

    The rise of international terrorism and the rapid increase in fraud and identity theft has added urgency to the task of developing biometric-based person identification as a reliable alternative to conventional authentication methods. Human Identification based on face images is a tough challenge in comparison to identification based on fingerprints or Iris recognition. Yet, due to its unobtrusive nature, face recognition is the preferred method of identification for security related applications. The success of such systems will depend on the support of massive infrastructures. Current mobile communication devices (3G smart phones) and PDA's are equipped with a camera which can capture both still and streaming video clips and a touch sensitive display panel. Beside convenience, such devices provide an adequate secure infrastructure for sensitive & financial transactions, by protecting against fraud and repudiation while ensuring accountability. Biometric authentication systems for mobile devices would have obvious advantages in conflict scenarios when communication from beyond enemy lines is essential to save soldier and civilian life. In areas of conflict or disaster the luxury of fixed infrastructure is not available or destroyed. In this paper, we present a wavelet-based face verification scheme that have been specifically designed and implemented on a currently available PDA. We shall report on its performance on the benchmark audio-visual BANCA database and on a newly developed PDA recorded audio-visual database that take include indoor and outdoor recordings.

  5. 24 CFR 232.616 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Social Security and Employer Identification Numbers. 232.616 Section 232.616 Housing and Urban... Borrowers § 232.616 Disclosure and verification of Social Security and Employer Identification Numbers. To... the disclosure and verification of Social Security and Employer Identification Numbers, as provided by...

  6. 24 CFR 201.6 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Social Security and Employer Identification Numbers. 201.6 Section 201.6 Housing and Urban Development... HOME LOANS General § 201.6 Disclosure and verification of Social Security and Employer Identification... the disclosure and verification of Social Security and Employer Identification Numbers, as provided by...

  7. 24 CFR 232.616 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Social Security and Employer Identification Numbers. 232.616 Section 232.616 Housing and Urban... Borrowers § 232.616 Disclosure and verification of Social Security and Employer Identification Numbers. To... the disclosure and verification of Social Security and Employer Identification Numbers, as provided by...

  8. 24 CFR 201.6 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Social Security and Employer Identification Numbers. 201.6 Section 201.6 Housing and Urban Development... HOME LOANS General § 201.6 Disclosure and verification of Social Security and Employer Identification... the disclosure and verification of Social Security and Employer Identification Numbers, as provided by...

  9. 24 CFR 232.616 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Social Security and Employer Identification Numbers. 232.616 Section 232.616 Housing and Urban... Borrowers § 232.616 Disclosure and verification of Social Security and Employer Identification Numbers. To... the disclosure and verification of Social Security and Employer Identification Numbers, as provided by...

  10. 24 CFR 201.6 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Social Security and Employer Identification Numbers. 201.6 Section 201.6 Housing and Urban Development... HOME LOANS General § 201.6 Disclosure and verification of Social Security and Employer Identification... the disclosure and verification of Social Security and Employer Identification Numbers, as provided by...

  11. 24 CFR 232.616 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Social Security and Employer Identification Numbers. 232.616 Section 232.616 Housing and Urban... Borrowers § 232.616 Disclosure and verification of Social Security and Employer Identification Numbers. To... the disclosure and verification of Social Security and Employer Identification Numbers, as provided by...

  12. 24 CFR 201.6 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Social Security and Employer Identification Numbers. 201.6 Section 201.6 Housing and Urban Development... HOME LOANS General § 201.6 Disclosure and verification of Social Security and Employer Identification... the disclosure and verification of Social Security and Employer Identification Numbers, as provided by...

  13. 24 CFR 232.616 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Social Security and Employer Identification Numbers. 232.616 Section 232.616 Housing and Urban... Borrowers § 232.616 Disclosure and verification of Social Security and Employer Identification Numbers. To... the disclosure and verification of Social Security and Employer Identification Numbers, as provided by...

  14. 24 CFR 201.6 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Social Security and Employer Identification Numbers. 201.6 Section 201.6 Housing and Urban Development... HOME LOANS General § 201.6 Disclosure and verification of Social Security and Employer Identification... the disclosure and verification of Social Security and Employer Identification Numbers, as provided by...

  15. Securing information display by use of visual cryptography.

    PubMed

    Yamamoto, Hirotsugu; Hayasaki, Yoshio; Nishida, Nobuo

    2003-09-01

    We propose a secure display technique based on visual cryptography. The proposed technique ensures the security of visual information. The display employs a decoding mask based on visual cryptography. Without the decoding mask, the displayed information cannot be viewed. The viewing zone is limited by the decoding mask so that only one person can view the information. We have developed a set of encryption codes to maintain the designed viewing zone and have demonstrated a display that provides a limited viewing zone.

  16. 41 CFR 102-34.90 - What motor vehicle identification must we display on Government motor vehicles?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... identification must we display on Government motor vehicles? 102-34.90 Section 102-34.90 Public Contracts and... Vehicle Identification § 102-34.90 What motor vehicle identification must we display on Government motor...) Identification that readily identifies the agency owning the vehicle. ...

  17. 41 CFR 102-34.90 - What motor vehicle identification must we display on Government motor vehicles?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... identification must we display on Government motor vehicles? 102-34.90 Section 102-34.90 Public Contracts and... Vehicle Identification § 102-34.90 What motor vehicle identification must we display on Government motor...) Identification that readily identifies the agency owning the vehicle. ...

  18. 41 CFR 102-34.90 - What motor vehicle identification must we display on Government motor vehicles?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... identification must we display on Government motor vehicles? 102-34.90 Section 102-34.90 Public Contracts and... Vehicle Identification § 102-34.90 What motor vehicle identification must we display on Government motor...) Identification that readily identifies the agency owning the vehicle. ...

  19. 41 CFR 102-34.90 - What motor vehicle identification must we display on Government motor vehicles?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... identification must we display on Government motor vehicles? 102-34.90 Section 102-34.90 Public Contracts and... Vehicle Identification § 102-34.90 What motor vehicle identification must we display on Government motor...) Identification that readily identifies the agency owning the vehicle. ...

  20. 41 CFR 102-34.90 - What motor vehicle identification must we display on Government motor vehicles?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... identification must we display on Government motor vehicles? 102-34.90 Section 102-34.90 Public Contracts and... Vehicle Identification § 102-34.90 What motor vehicle identification must we display on Government motor...) Identification that readily identifies the agency owning the vehicle. ...

  1. 33 CFR 181.29 - Hull identification number display.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Hull identification number... identification number display. Two identical hull identification numbers are required to be displayed on each boat hull. (a) The primary hull identification number must be affixed— (1) On boats with transoms, to...

  2. 33 CFR 181.29 - Hull identification number display.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Hull identification number... identification number display. Two identical hull identification numbers are required to be displayed on each boat hull. (a) The primary hull identification number must be affixed— (1) On boats with transoms, to...

  3. Secure information display with limited viewing zone by use of multi-color visual cryptography.

    PubMed

    Yamamoto, Hirotsugu; Hayasaki, Yoshio; Nishida, Nobuo

    2004-04-05

    We propose a display technique that ensures security of visual information by use of visual cryptography. A displayed image appears as a completely random pattern unless viewed through a decoding mask. The display has a limited viewing zone with the decoding mask. We have developed a multi-color encryption code set. Eight colors are represented in combinations of a displayed image composed of red, green, blue, and black subpixels and a decoding mask composed of transparent and opaque subpixels. Furthermore, we have demonstrated secure information display by use of an LCD panel.

  4. 6 CFR 7.25 - Identification and markings.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Identification and markings. 7.25 Section 7.25 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLASSIFIED NATIONAL SECURITY INFORMATION Classified Information § 7.25 Identification and markings. (a) Classified information must be...

  5. 17 CFR 242.600 - NMS security designation and definitions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...) Interrogation device means any securities information retrieval system capable of displaying transaction reports... with respect to such order; and (v) Immediately and automatically displays information that updates the... security; and (ii) Consolidated last sale information for a security. (14) Consolidated last sale...

  6. 17 CFR 242.600 - NMS security designation and definitions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...) Interrogation device means any securities information retrieval system capable of displaying transaction reports... with respect to such order; and (v) Immediately and automatically displays information that updates the... security; and (ii) Consolidated last sale information for a security. (14) Consolidated last sale...

  7. 17 CFR 242.600 - NMS security designation and definitions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...) Interrogation device means any securities information retrieval system capable of displaying transaction reports... with respect to such order; and (v) Immediately and automatically displays information that updates the... security; and (ii) Consolidated last sale information for a security. (14) Consolidated last sale...

  8. 17 CFR 242.600 - NMS security designation and definitions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...) Interrogation device means any securities information retrieval system capable of displaying transaction reports... with respect to such order; and (v) Immediately and automatically displays information that updates the... security; and (ii) Consolidated last sale information for a security. (14) Consolidated last sale...

  9. 24 CFR 5.216 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Social Security and Employer Identification Numbers. 5.216 Section 5.216 Housing and Urban Development...; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers; Procedures for Obtaining Income Information Disclosure and Verification of Social Security Numbers and...

  10. 24 CFR 5.216 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Social Security and Employer Identification Numbers. 5.216 Section 5.216 Housing and Urban Development...; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers; Procedures for Obtaining Income Information Disclosure and Verification of Social Security Numbers and...

  11. 24 CFR 5.216 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Social Security and Employer Identification Numbers. 5.216 Section 5.216 Housing and Urban Development...; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers; Procedures for Obtaining Income Information Disclosure and Verification of Social Security Numbers and...

  12. 24 CFR 5.216 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Social Security and Employer Identification Numbers. 5.216 Section 5.216 Housing and Urban Development...; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers; Procedures for Obtaining Income Information Disclosure and Verification of Social Security Numbers and...

  13. 24 CFR 5.216 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Social Security and Employer Identification Numbers. 5.216 Section 5.216 Housing and Urban Development...; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers; Procedures for Obtaining Income Information Disclosure and Verification of Social Security Numbers and...

  14. 17 CFR 242.604 - Display of customer limit orders.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... responsible broker or dealer, electronic communications network, national securities exchange, or national... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Display of customer limit orders. 242.604 Section 242.604 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  15. Review of defense display research programs

    NASA Astrophysics Data System (ADS)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  16. 24 CFR 206.40 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Social Security and Employer Identification Numbers. 206.40 Section 206.40 Housing and Urban Development... Eligibility; Endorsement Eligible Mortgagors § 206.40 Disclosure and verification of Social Security and... verification of Social Security and Employer Identification Numbers, as provided by part 200, subpart U, of...

  17. 24 CFR 206.40 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Social Security and Employer Identification Numbers. 206.40 Section 206.40 Housing and Urban Development... Eligibility; Endorsement Eligible Mortgagors § 206.40 Disclosure and verification of Social Security and... verification of Social Security and Employer Identification Numbers, as provided by part 200, subpart U, of...

  18. 24 CFR 206.40 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Social Security and Employer Identification Numbers. 206.40 Section 206.40 Housing and Urban Development... Eligibility; Endorsement Eligible Mortgagors § 206.40 Disclosure and verification of Social Security and... verification of Social Security and Employer Identification Numbers, as provided by part 200, subpart U, of...

  19. 24 CFR 206.40 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Social Security and Employer Identification Numbers. 206.40 Section 206.40 Housing and Urban Development... Eligibility; Endorsement Eligible Mortgagors § 206.40 Disclosure and verification of Social Security and... verification of Social Security and Employer Identification Numbers, as provided by part 200, subpart U, of...

  20. 24 CFR 206.40 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Social Security and Employer Identification Numbers. 206.40 Section 206.40 Housing and Urban Development... Eligibility; Endorsement Eligible Mortgagors § 206.40 Disclosure and verification of Social Security and... verification of Social Security and Employer Identification Numbers, as provided by part 200, subpart U, of...

  1. 24 CFR 200.6 - Employer identification and social security numbers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Employer identification and social... identification and social security numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of social security numbers and employer identification numbers by applicants and...

  2. 24 CFR 200.6 - Employer identification and social security numbers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Employer identification and social... identification and social security numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of social security numbers and employer identification numbers by applicants and...

  3. 24 CFR 200.6 - Employer identification and social security numbers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Employer identification and social... identification and social security numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of social security numbers and employer identification numbers by applicants and...

  4. 24 CFR 200.6 - Employer identification and social security numbers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Employer identification and social... identification and social security numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of social security numbers and employer identification numbers by applicants and...

  5. 24 CFR 200.6 - Employer identification and social security numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Employer identification and social... identification and social security numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of social security numbers and employer identification numbers by applicants and...

  6. Review of flat panel display programs and defense applications

    NASA Astrophysics Data System (ADS)

    Gnade, Bruce; Schulze, Raymond; Henderson, Girardeau L.; Hopper, Darrel G.

    1997-07-01

    Flat panel display research has comprised a substantial portion of the national investment in new technology for economic and national security for the past nine years. These investments have ben made principally via several Defense Advanced Research Projects Agency (DARPA) programs, known collectively as the continuing High Definition Systems Program, and the Office of the Secretary of Defense Production Act Title III Program. Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These research programs are reviewed and opportunities for applications are described. Future technology development, transfer, and transition requirements are identified. Strategy and vision are documented to assist the identification of areas meriting further consideration.

  7. 24 CFR 242.68 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Social Security and Employer Identification Numbers. 242.68 Section 242.68 Housing and Urban Development... Requirements § 242.68 Disclosure and verification of Social Security and Employer Identification Numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of Social Security Numbers...

  8. 24 CFR 242.68 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Social Security and Employer Identification Numbers. 242.68 Section 242.68 Housing and Urban Development... Requirements § 242.68 Disclosure and verification of Social Security and Employer Identification Numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of Social Security Numbers...

  9. 24 CFR 242.68 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Social Security and Employer Identification Numbers. 242.68 Section 242.68 Housing and Urban Development... Requirements § 242.68 Disclosure and verification of Social Security and Employer Identification Numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of Social Security Numbers...

  10. 24 CFR 242.68 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Social Security and Employer Identification Numbers. 242.68 Section 242.68 Housing and Urban Development... Requirements § 242.68 Disclosure and verification of Social Security and Employer Identification Numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of Social Security Numbers...

  11. 24 CFR 884.117 - Disclosure and verification of Social Security and Employer Identification Numbers by owners.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Social Security and Employer Identification Numbers by owners. 884.117 Section 884.117 Housing and Urban... PROJECTS Applicability, Scope and Basic Policies § 884.117 Disclosure and verification of Social Security... Social Security and Employer Identification Numbers, as provided by 24 CFR part 5. (Approved by the...

  12. 24 CFR 242.68 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Social Security and Employer Identification Numbers. 242.68 Section 242.68 Housing and Urban Development... Requirements § 242.68 Disclosure and verification of Social Security and Employer Identification Numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of Social Security Numbers...

  13. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    PubMed Central

    Müthing, Jannis; Jäschke, Thomas

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. PMID:29046271

  14. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues.

    PubMed

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-10-18

    Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. ©Jannis Müthing, Thomas Jäschke, Christoph M Friedrich. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 18.10.2017.

  15. 49 CFR 1572.500 - Scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Fees for Security Threat Assessments for Transportation Worker Identification Credential (TWIC... Transportation Worker Identification Credential and must undergo a security threat assessment under 49 CFR part...

  16. 6 CFR 37.41 - Security plan.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities § 37.41...

  17. 6 CFR 37.41 - Security plan.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities § 37.41...

  18. 6 CFR 37.15 - Physical security features for the driver's license or identification card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Physical security features for the driver's license or identification card. 37.15 Section 37.15 Domestic Security DEPARTMENT OF HOMELAND SECURITY..., Verification, and Card Issuance Requirements § 37.15 Physical security features for the driver's license or...

  19. 24 CFR 241.626 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Social Security and Employer Identification Numbers. 241.626 Section 241.626 Housing and Urban... verification of Social Security and Employer Identification Numbers. To be eligible for loan insurance under this subpart, the borrower must meet the requirements for the disclosure and verification of Social...

  20. 24 CFR 241.626 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Social Security and Employer Identification Numbers. 241.626 Section 241.626 Housing and Urban... verification of Social Security and Employer Identification Numbers. To be eligible for loan insurance under this subpart, the borrower must meet the requirements for the disclosure and verification of Social...

  1. 24 CFR 241.626 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Social Security and Employer Identification Numbers. 241.626 Section 241.626 Housing and Urban... verification of Social Security and Employer Identification Numbers. To be eligible for loan insurance under this subpart, the borrower must meet the requirements for the disclosure and verification of Social...

  2. 24 CFR 241.626 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Social Security and Employer Identification Numbers. 241.626 Section 241.626 Housing and Urban... verification of Social Security and Employer Identification Numbers. To be eligible for loan insurance under this subpart, the borrower must meet the requirements for the disclosure and verification of Social...

  3. 24 CFR 241.626 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Social Security and Employer Identification Numbers. 241.626 Section 241.626 Housing and Urban... verification of Social Security and Employer Identification Numbers. To be eligible for loan insurance under this subpart, the borrower must meet the requirements for the disclosure and verification of Social...

  4. 6 CFR 37.43 - Physical security of DMV production facilities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Physical security of DMV production facilities... Identification Card Production Facilities § 37.43 Physical security of DMV production facilities. (a) States must ensure the physical security of facilities where driver's licenses and identification cards are produced...

  5. Software For Computer-Security Audits

    NASA Technical Reports Server (NTRS)

    Arndt, Kate; Lonsford, Emily

    1994-01-01

    Information relevant to potential breaches of security gathered efficiently. Automated Auditing Tools for VAX/VMS program includes following automated software tools performing noted tasks: Privileged ID Identification, program identifies users and their privileges to circumvent existing computer security measures; Critical File Protection, critical files not properly protected identified; Inactive ID Identification, identifications of users no longer in use found; Password Lifetime Review, maximum lifetimes of passwords of all identifications determined; and Password Length Review, minimum allowed length of passwords of all identifications determined. Written in DEC VAX DCL language.

  6. Advanced visualization platform for surgical operating room coordination: distributed video board system.

    PubMed

    Hu, Peter F; Xiao, Yan; Ho, Danny; Mackenzie, Colin F; Hu, Hao; Voigt, Roger; Martz, Douglas

    2006-06-01

    One of the major challenges for day-of-surgery operating room coordination is accurate and timely situation awareness. Distributed and secure real-time status information is key to addressing these challenges. This article reports on the design and implementation of a passive status monitoring system in a 19-room surgical suite of a major academic medical center. Key design requirements considered included integrated real-time operating room status display, access control, security, and network impact. The system used live operating room video images and patient vital signs obtained through monitors to automatically update events and operating room status. Images were presented on a "need-to-know" basis, and access was controlled by identification badge authorization. The system delivered reliable real-time operating room images and status with acceptable network impact. Operating room status was visualized at 4 separate locations and was used continuously by clinicians and operating room service providers to coordinate operating room activities.

  7. 26 CFR 1.475(b)-2 - Exemptions-identification requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... requirements. (a) Identification of the basis for exemption. An identification of a security as exempt from mark to market does not satisfy section 475(b)(2) if it fails to state whether the security is described in— (1) Either of the first two subparagraphs of section 475(b)(1) (identifying a security as held...

  8. 33 CFR 181.27 - Information displayed near hull identification number.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Information displayed near hull... displayed near hull identification number. With the exception of the characters “US-”, which constitute the... the 12-character hull identification number (HIN), that information must be separated from the HIN by...

  9. 24 CFR 5.218 - Penalties for failing to disclose and verify Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 1 2012-04-01 2012-04-01 false Penalties for failing to disclose and verify Social Security and Employer Identification Numbers. 5.218 Section 5.218 Housing and Urban....218 Penalties for failing to disclose and verify Social Security and Employer Identification Numbers...

  10. 24 CFR 5.218 - Penalties for failing to disclose and verify Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 1 2014-04-01 2014-04-01 false Penalties for failing to disclose and verify Social Security and Employer Identification Numbers. 5.218 Section 5.218 Housing and Urban....218 Penalties for failing to disclose and verify Social Security and Employer Identification Numbers...

  11. 24 CFR 5.218 - Penalties for failing to disclose and verify Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Penalties for failing to disclose and verify Social Security and Employer Identification Numbers. 5.218 Section 5.218 Housing and Urban....218 Penalties for failing to disclose and verify Social Security and Employer Identification Numbers...

  12. 24 CFR 5.218 - Penalties for failing to disclose and verify Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 1 2013-04-01 2013-04-01 false Penalties for failing to disclose and verify Social Security and Employer Identification Numbers. 5.218 Section 5.218 Housing and Urban....218 Penalties for failing to disclose and verify Social Security and Employer Identification Numbers...

  13. 24 CFR 5.218 - Penalties for failing to disclose and verify Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 1 2011-04-01 2011-04-01 false Penalties for failing to disclose and verify Social Security and Employer Identification Numbers. 5.218 Section 5.218 Housing and Urban....218 Penalties for failing to disclose and verify Social Security and Employer Identification Numbers...

  14. Security System Responsive to Optical Fiber Having Bragg Grating

    NASA Technical Reports Server (NTRS)

    Gary, Charles K. (Inventor); Ozcan, Meric (Inventor)

    1997-01-01

    An optically responsive electronic lock is disclosed comprising an optical fiber serving as a key and having Bragg gratings placed therein. Further, an identification system is disclosed which has the optical fiber serving as means for tagging and identifying an object. The key or tagged object is inserted into a respective receptacle and the Bragg gratings cause the optical fiber to reflect a predetermined frequency spectra pattern of incident light which is detected by a decoder and compared against a predetermined spectrum to determine if an electrical signal is generated to either operate the lock or light a display of an authentication panel.

  15. Complexity and Automation Displays of Air Traffic Control: Literature Review and Analysis

    DTIC Science & Technology

    2005-04-01

    Security ...Classif. (of this report) 20. Security Classif. (of...Branstrom, & Brasil , 1998), little effort has been devoted to assessing the complexity of ATC automation displays. Given the fact that many new

  16. 5 CFR 1312.8 - Standard identification and markings.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.8 Standard identification and markings... or event for declassification that corresponds to the lapse of the information's national security...

  17. 5 CFR 1312.8 - Standard identification and markings.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.8 Standard identification and markings... or event for declassification that corresponds to the lapse of the information's national security...

  18. 31 CFR 1023.312 - Identification required.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Reports Required To Be Made By Brokers or Dealers in Securities § 1023.312 Identification required. Refer... filed by brokers or dealers in securities. ...

  19. 31 CFR 1023.312 - Identification required.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Reports Required To Be Made By Brokers or Dealers in Securities § 1023.312 Identification required. Refer... filed by brokers or dealers in securities. ...

  20. 31 CFR 1023.312 - Identification required.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Reports Required To Be Made By Brokers or Dealers in Securities § 1023.312 Identification required. Refer... filed by brokers or dealers in securities. ...

  1. 31 CFR 1023.312 - Identification required.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Reports Required To Be Made By Brokers or Dealers in Securities § 1023.312 Identification required. Refer... filed by brokers or dealers in securities. ...

  2. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially...

  3. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially...

  4. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially...

  5. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially...

  6. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially...

  7. 41 CFR 102-34.160 - May we have a limited exemption from displaying U.S. Government license plates and other motor...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... exemption from displaying U.S. Government license plates and other motor vehicle identification? 102-34.160... Registering Motor Vehicles Identification Exemptions § 102-34.160 May we have a limited exemption from displaying U.S. Government license plates and other motor vehicle identification? Yes. The head of your...

  8. 41 CFR 102-34.160 - May we have a limited exemption from displaying U.S. Government license plates and other motor...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... exemption from displaying U.S. Government license plates and other motor vehicle identification? 102-34.160... Registering Motor Vehicles Identification Exemptions § 102-34.160 May we have a limited exemption from displaying U.S. Government license plates and other motor vehicle identification? Yes. The head of your...

  9. 41 CFR 102-34.160 - May we have a limited exemption from displaying U.S. Government license plates and other motor...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... exemption from displaying U.S. Government license plates and other motor vehicle identification? 102-34.160... Registering Motor Vehicles Identification Exemptions § 102-34.160 May we have a limited exemption from displaying U.S. Government license plates and other motor vehicle identification? Yes. The head of your...

  10. 41 CFR 102-34.160 - May we have a limited exemption from displaying U.S. Government license plates and other motor...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... exemption from displaying U.S. Government license plates and other motor vehicle identification? 102-34.160... Registering Motor Vehicles Identification Exemptions § 102-34.160 May we have a limited exemption from displaying U.S. Government license plates and other motor vehicle identification? Yes. The head of your...

  11. Secure ADS-B authentication system and method

    NASA Technical Reports Server (NTRS)

    Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)

    2010-01-01

    A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.

  12. Job security and work performance in Chinese employees: The mediating role of organisational identification.

    PubMed

    Ma, Bing; Liu, Shanshi; Liu, Donglai; Wang, Hongchun

    2016-04-01

    This research focuses on investigating whether organisational identification mediates the effects of job security on in-role behaviour and extra-role behaviour and how these mediation mechanisms differ according to gender. Through analysing 212 supervisor-subordinate dyads from a Chinese air transportation group, the research indicated that organisational identification partially mediated the effect of job security on in-role behaviour and fully mediated the effect of job security on extra-role behaviour. A multi-group analysis also showed that there were significant differences between male and female employees in these relationships. In addition, moderated mediation analyses showed that gender moderated the indirect effects of job security on in-role behaviour and extra-role behaviour through organisational identification. Limitations and implications of these findings are discussed. © 2015 International Union of Psychological Science.

  13. 42 CFR 433.37 - Reporting provider payments to Internal Revenue Service.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... identification of providers by— (1) Social security number if— (i) The provider is in solo practice; or (ii) The... security number or employer identification number. ... identification number for all other providers. (c) Compliance with section 6041 of the Internal Revenue Code. The...

  14. 75 FR 15440 - Guidance for Industry on Standards for Securing the Drug Supply Chain-Standardized Numerical...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-29

    ...] Guidance for Industry on Standards for Securing the Drug Supply Chain--Standardized Numerical... industry entitled ``Standards for Securing the Drug Supply Chain-Standardized Numerical Identification for... the Drug Supply Chain-Standardized Numerical Identification for Prescription Drug Packages.'' In the...

  15. 46 CFR 10.207 - Identification number.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... recordkeeping purposes only, a mariner's official MMC identification number is the individual's social security number. However, a unique serial number, and not the social security number, will appear on the... 46 Shipping 1 2010-10-01 2010-10-01 false Identification number. 10.207 Section 10.207 Shipping...

  16. A Scalable, Collaborative, Interactive Light-field Display System

    DTIC Science & Technology

    2014-06-01

    displays, 3D display, holographic video, integral photography, plenoptic , computed photography 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...light-field, holographic displays, 3D display, holographic video, integral photography, plenoptic , computed photography 1 Distribution A: Approved

  17. 24 CFR 203.35 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Social Security and Employer Identification Numbers. 203.35 Section 203.35 Housing and Urban Development... Requirements and Underwriting Procedures Eligible Mortgagors § 203.35 Disclosure and verification of Social... mortgagor must meet the requirements for the disclosure and verification of Social Security and Employer...

  18. 24 CFR 203.35 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Social Security and Employer Identification Numbers. 203.35 Section 203.35 Housing and Urban Development... Requirements and Underwriting Procedures Eligible Mortgagors § 203.35 Disclosure and verification of Social... mortgagor must meet the requirements for the disclosure and verification of Social Security and Employer...

  19. 24 CFR 203.35 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Social Security and Employer Identification Numbers. 203.35 Section 203.35 Housing and Urban Development... Requirements and Underwriting Procedures Eligible Mortgagors § 203.35 Disclosure and verification of Social... mortgagor must meet the requirements for the disclosure and verification of Social Security and Employer...

  20. 24 CFR 203.35 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Social Security and Employer Identification Numbers. 203.35 Section 203.35 Housing and Urban Development... Requirements and Underwriting Procedures Eligible Mortgagors § 203.35 Disclosure and verification of Social... mortgagor must meet the requirements for the disclosure and verification of Social Security and Employer...

  1. 24 CFR 203.35 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Social Security and Employer Identification Numbers. 203.35 Section 203.35 Housing and Urban Development... Requirements and Underwriting Procedures Eligible Mortgagors § 203.35 Disclosure and verification of Social... mortgagor must meet the requirements for the disclosure and verification of Social Security and Employer...

  2. Triple redundant computer system/display and keyboard subsystem interface

    NASA Technical Reports Server (NTRS)

    Gulde, F. J.

    1973-01-01

    Interfacing of the redundant display and keyboard subsystem with the triple redundant computer system is defined according to space shuttle design. The study is performed in three phases: (1) TRCS configuration and characteristics identification; (2) display and keyboard subsystem configuration and characteristics identification, and (3) interface approach definition.

  3. 49 CFR 172.334 - Identification numbers; prohibited display.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... or 1.6, DANGEROUS, or subsidiary hazard placard. (b) No person may display an identification number on a placard, orange panel or white square-on-point display configuration unless— (1) The... the placard, orange panel or white square-on-point configuration authorized by § 172.332 or § 172.336...

  4. 49 CFR 172.334 - Identification numbers; prohibited display.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... or 1.6, DANGEROUS, or subsidiary hazard placard. (b) No person may display an identification number on a placard, orange panel or white square-on-point display configuration unless— (1) The... the placard, orange panel or white square-on-point configuration authorized by § 172.332 or § 172.336...

  5. 49 CFR 172.334 - Identification numbers; prohibited display.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... or 1.6, DANGEROUS, or subsidiary hazard placard. (b) No person may display an identification number on a placard, orange panel or white square-on-point display configuration unless— (1) The... the placard, orange panel or white square-on-point configuration authorized by § 172.332 or § 172.336...

  6. 49 CFR 172.334 - Identification numbers; prohibited display.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... or 1.6, DANGEROUS, or subsidiary hazard placard. (b) No person may display an identification number on a placard, orange panel or white square-on-point display configuration unless— (1) The... the placard, orange panel or white square-on-point configuration authorized by § 172.332 or § 172.336...

  7. 49 CFR 172.334 - Identification numbers; prohibited display.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... or 1.6, DANGEROUS, or subsidiary hazard placard. (b) No person may display an identification number on a placard, orange panel or white square-on-point display configuration unless— (1) The... the placard, orange panel or white square-on-point configuration authorized by § 172.332 or § 172.336...

  8. Performance of an optical identification and interrogation system

    NASA Astrophysics Data System (ADS)

    Venugopalan, A.; Ghosh, A. K.; Verma, P.; Cheng, S.

    2008-04-01

    A free space optics based identification and interrogation system has been designed. The applications of the proposed system lie primarily in areas which require a secure means of mutual identification and information exchange between optical readers and tags. Conventional RFIDs raise issues regarding security threats, electromagnetic interference and health safety. The security of RF-ID chips is low due to the wide spatial spread of radio waves. Malicious nodes can read data being transmitted on the network, if they are in the receiving range. The proposed system provides an alternative which utilizes the narrow paraxial beams of lasers and an RSA-based authentication scheme. These provide enhanced security to communication between a tag and the base station or reader. The optical reader can also perform remote identification and the tag can be read from a far off distance, given line of sight. The free space optical identification and interrogation system can be used for inventory management, security systems at airports, port security, communication with high security systems, etc. to name a few. The proposed system was implemented with low-cost, off-the-shelf components and its performance in terms of throughput and bit error rate has been measured and analyzed. The range of operation with a bit-error-rate lower than 10-9 was measured to be about 4.5 m. The security of the system is based on the strengths of the RSA encryption scheme implemented using more than 1024 bits.

  9. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schaffner, Christian

    2010-09-15

    We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters.more » Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.« less

  10. 32 CFR Table 1 to Part 855 - Purpose of Use/Verification/Approval Authority/Fees

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... change of station, etc.) or for private, non revenue flights Social security number in block 1 on DD Form... of a uniformed service member Identification card (DD Form 1173) number or social security number... Form 1173) number or social security number, identification card expiration date, sponsor's retirement...

  11. 32 CFR Table 1 to Part 855 - Purpose of Use/Verification/Approval Authority/Fees

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... change of station, etc.) or for private, non revenue flights Social security number in block 1 on DD Form... of a uniformed service member Identification card (DD Form 1173) number or social security number... Form 1173) number or social security number, identification card expiration date, sponsor's retirement...

  12. 42 CFR 37.60 - Submitting required chest roentgenograms and miner identification documents.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... prescribed in this subpart, all the forms shall be submitted with his or her name and social security account... miner identification document containing the miner's name, address, social security number and place of... format specified by NIOSH either using portable electronic media, or a secure electronic file transfer...

  13. 20 CFR 703.202 - Identification of significant gaps in State guaranty fund coverage for LHWCA obligations.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... STATUTES INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.202 Identification of... carrier's required security deposit, the Office will consider the extent to which a State guaranty fund... fully and immediately secure LHWCA obligations and will post its findings on the Internet at http://www...

  14. 20 CFR 703.202 - Identification of significant gaps in State guaranty fund coverage for LHWCA obligations.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... STATUTES INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.202 Identification of... carrier's required security deposit, the Office will consider the extent to which a State guaranty fund... fully and immediately secure LHWCA obligations and will post its findings on the Internet at http://www...

  15. 20 CFR 703.202 - Identification of significant gaps in State guaranty fund coverage for LHWCA obligations.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... STATUTES INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.202 Identification of... carrier's required security deposit, the Office will consider the extent to which a State guaranty fund... fully and immediately secure LHWCA obligations and will post its findings on the Internet at http://www...

  16. 20 CFR 703.202 - Identification of significant gaps in State guaranty fund coverage for LHWCA obligations.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... STATUTES INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.202 Identification of... carrier's required security deposit, the Office will consider the extent to which a State guaranty fund... fully and immediately secure LHWCA obligations and will post its findings on the Internet at http://www...

  17. General M13 phage display: M13 phage display in identification and characterization of protein-protein interactions.

    PubMed

    Hertveldt, Kirsten; Beliën, Tim; Volckaert, Guido

    2009-01-01

    In M13 phage display, proteins and peptides are exposed on one of the surface proteins of filamentous phage particles and become accessible to affinity enrichment against a bait of interest. We describe the construction of fragmented whole genome and gene fragment phage display libraries and interaction selection by panning. This strategy allows the identification and characterization of interacting proteins on a genomic scale by screening the fragmented "proteome" against protein baits. Gene fragment libraries allow a more in depth characterization of the protein-protein interaction site by identification of the protein region involved in the interaction.

  18. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false What security controls... controls must I use for identification codes and passwords? If you use electronic signatures based upon use of identification codes in combination with passwords, you must employ controls to ensure their...

  19. 6 CFR 37.15 - Physical security features for the driver's license or identification card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    .... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...

  20. 6 CFR 37.15 - Physical security features for the driver's license or identification card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    .... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...

  1. 6 CFR 37.15 - Physical security features for the driver's license or identification card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    .... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...

  2. 6 CFR 37.15 - Physical security features for the driver's license or identification card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    .... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...

  3. 32 CFR 148.5 - Identification of the security policy board.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., MILITARY AND CIVILIAN NATIONAL POLICY AND IMPLEMENTATION OF RECIPROCITY OF FACILITIES National Policy on Reciprocity of Use and Inspections of Facilities § 148.5 Identification of the security policy board. Agencies...

  4. 32 CFR 148.5 - Identification of the security policy board.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., MILITARY AND CIVILIAN NATIONAL POLICY AND IMPLEMENTATION OF RECIPROCITY OF FACILITIES National Policy on Reciprocity of Use and Inspections of Facilities § 148.5 Identification of the security policy board. Agencies...

  5. 32 CFR 148.5 - Identification of the security policy board.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., MILITARY AND CIVILIAN NATIONAL POLICY AND IMPLEMENTATION OF RECIPROCITY OF FACILITIES National Policy on Reciprocity of Use and Inspections of Facilities § 148.5 Identification of the security policy board. Agencies...

  6. 49 CFR 1542.305 - Public advisories.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.305 Public advisories. When advised by TSA, each airport operator must prominently display and maintain in...

  7. 49 CFR 1542.305 - Public advisories.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.305 Public advisories. When advised by TSA, each airport operator must prominently display and maintain in...

  8. 49 CFR 1542.305 - Public advisories.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.305 Public advisories. When advised by TSA, each airport operator must prominently display and maintain in...

  9. 49 CFR 1542.305 - Public advisories.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.305 Public advisories. When advised by TSA, each airport operator must prominently display and maintain in...

  10. 77 FR 5865 - American Unity Investments, Inc., China Display Technologies, Inc., China Wind Energy, Inc., Fuda...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-06

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Unity Investments, Inc., China Display Technologies, Inc., China Wind Energy, Inc., Fuda Faucet Works, Inc., Greater China Media... concerning the securities of China Wind Energy, Inc. because it has not filed any periodic reports since the...

  11. Optical security features for plastic card documents

    NASA Astrophysics Data System (ADS)

    Hossick Schott, Joachim

    1998-04-01

    Print-on-demand is currently a major trend in the production of paper based documents. This fully digital production philosophy will likely have ramifications also for the secure identification document market. Here, plastic cards increasingly replace traditionally paper based security sensitive documents such as drivers licenses and passports. The information content of plastic cards can be made highly secure by using chip cards. However, printed and other optical security features will continue to play an important role, both for machine readable and visual inspection. Therefore, on-demand high resolution print technologies, laser engraving, luminescent pigments and laminated features such as holograms, kinegrams or phase gratings will have to be considered for the production of secure identification documents. Very important are also basic optical, surface and material durability properties of the laminates as well as the strength and nature of the adhesion between the layers. This presentation will address some of the specific problems encountered when optical security features such as high resolution printing and laser engraving are to be integrated in the on-demand production of secure plastic card identification documents.

  12. 41 CFR 102-34.100 - Where is motor vehicle identification displayed?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Government motor vehicles may display motor vehicle identification on a decal in the rear window, or centered on both front doors if the vehicle is without a rear window, or where identification on the rear window would not be easily seen. (b) For trailers, on both sides of the front quarter of the trailer in a...

  13. Three dimensional identification card and applications

    NASA Astrophysics Data System (ADS)

    Zhou, Changhe; Wang, Shaoqing; Li, Chao; Li, Hao; Liu, Zhao

    2016-10-01

    Three dimensional Identification Card, with its three-dimensional personal image displayed and stored for personal identification, is supposed be the advanced version of the present two-dimensional identification card in the future [1]. Three dimensional Identification Card means that there are three-dimensional optical techniques are used, the personal image on ID card is displayed to be three-dimensional, so we can see three dimensional personal face. The ID card also stores the three-dimensional face information in its inside electronics chip, which might be recorded by using two-channel cameras, and it can be displayed in computer as three-dimensional images for personal identification. Three-dimensional ID card might be one interesting direction to update the present two-dimensional card in the future. Three-dimension ID card might be widely used in airport custom, entrance of hotel, school, university, as passport for on-line banking, registration of on-line game, etc...

  14. Oligopeptide M13 Phage Display in Pathogen Research

    PubMed Central

    Kügler, Jonas; Zantow, Jonas; Meyer, Torsten; Hust, Michael

    2013-01-01

    Phage display has become an established, widely used method for selection of peptides, antibodies or alternative scaffolds. The use of phage display for the selection of antigens from genomic or cDNA libraries of pathogens which is an alternative to the classical way of identifying immunogenic proteins is not well-known. In recent years several new applications for oligopeptide phage display in disease related fields have been developed which has led to the identification of various new antigens. These novel identified immunogenic proteins provide new insights into host pathogen interactions and can be used for the development of new diagnostic tests and vaccines. In this review we focus on the M13 oligopeptide phage display system for pathogen research but will also give examples for lambda phage display and for applications in other disease related fields. In addition, a detailed technical work flow for the identification of immunogenic oligopeptides using the pHORF system is given. The described identification of immunogenic proteins of pathogens using oligopeptide phage display can be linked to antibody phage display resulting in a vaccine pipeline. PMID:24136040

  15. Oligopeptide m13 phage display in pathogen research.

    PubMed

    Kügler, Jonas; Zantow, Jonas; Meyer, Torsten; Hust, Michael

    2013-10-16

    Phage display has become an established, widely used method for selection of peptides, antibodies or alternative scaffolds. The use of phage display for the selection of antigens from genomic or cDNA libraries of pathogens which is an alternative to the classical way of identifying immunogenic proteins is not well-known. In recent years several new applications for oligopeptide phage display in disease related fields have been developed which has led to the identification of various new antigens. These novel identified immunogenic proteins provide new insights into host pathogen interactions and can be used for the development of new diagnostic tests and vaccines. In this review we focus on the M13 oligopeptide phage display system for pathogen research but will also give examples for lambda phage display and for applications in other disease related fields. In addition, a detailed technical work flow for the identification of immunogenic oligopeptides using the pHORF system is given. The described identification of immunogenic proteins of pathogens using oligopeptide phage display can be linked to antibody phage display resulting in a vaccine pipeline.

  16. DOE`s nation-wide system for access control can solve problems for the federal government

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Callahan, S.; Tomes, D.; Davis, G.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davida, G.I.; Frankel, Y.; Matt, B.J.

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring securemore » hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.« less

  18. KENNEDY SPACE CENTER, FLA. - Children enjoy displays of security equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.

    NASA Image and Video Library

    2003-07-24

    KENNEDY SPACE CENTER, FLA. - Children enjoy displays of security equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.

  19. 41 CFR 102-34.180 - What agencies have a special exemption from displaying U.S. Government license plates and motor...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... special exemption from displaying U.S. Government license plates and motor vehicle identification on some... VEHICLE MANAGEMENT Identifying and Registering Motor Vehicles Identification Exemptions § 102-34.180 What... identification on some of their vehicles? Motor vehicles assigned for the use of the President and the heads of...

  20. 41 CFR 102-34.180 - What agencies have a special exemption from displaying U.S. Government license plates and motor...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... special exemption from displaying U.S. Government license plates and motor vehicle identification on some... VEHICLE MANAGEMENT Identifying and Registering Motor Vehicles Identification Exemptions § 102-34.180 What... identification on some of their vehicles? Motor vehicles assigned for the use of the President and the heads of...

  1. 41 CFR 102-34.180 - What agencies have a special exemption from displaying U.S. Government license plates and motor...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... special exemption from displaying U.S. Government license plates and motor vehicle identification on some... VEHICLE MANAGEMENT Identifying and Registering Motor Vehicles Identification Exemptions § 102-34.180 What... identification on some of their vehicles? Motor vehicles assigned for the use of the President and the heads of...

  2. 41 CFR 102-34.180 - What agencies have a special exemption from displaying U.S. Government license plates and motor...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... special exemption from displaying U.S. Government license plates and motor vehicle identification on some... VEHICLE MANAGEMENT Identifying and Registering Motor Vehicles Identification Exemptions § 102-34.180 What... identification on some of their vehicles? Motor vehicles assigned for the use of the President and the heads of...

  3. 41 CFR 102-34.180 - What agencies have a special exemption from displaying U.S. Government license plates and motor...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... special exemption from displaying U.S. Government license plates and motor vehicle identification on some... VEHICLE MANAGEMENT Identifying and Registering Motor Vehicles Identification Exemptions § 102-34.180 What... identification on some of their vehicles? Motor vehicles assigned for the use of the President and the heads of...

  4. Identification of port communication equipment needs for safety, security, and interoperability

    DOT National Transportation Integrated Search

    2007-12-01

    Identification of Port Communication Equipment Needs for Safety, Security, and Interoperability is a big concern for current and : future need. The data demonstrates that two-way radios should be the most effective method of communication in both rou...

  5. 20 CFR 422.112 - Employer identification numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Employer identification numbers. 422.112 Section 422.112 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General..., and domestic corporations which elect social security coverage for employees of foreign subsidiaries...

  6. Marine asset security and tracking (MAST) system

    DOEpatents

    Hanson, Gregory Richard [Clinton, TN; Smith, Stephen Fulton [Loudon, TN; Moore, Michael Roy [Corryton, TN; Dobson, Eric Lesley [Charleston, SC; Blair, Jeffrey Scott [Charleston, SC; Duncan, Christopher Allen [Marietta, GA; Lenarduzzi, Roberto [Knoxville, TN

    2008-07-01

    Methods and apparatus are described for marine asset security and tracking (MAST). A method includes transmitting identification data, location data and environmental state sensor data from a radio frequency tag. An apparatus includes a radio frequency tag that transmits identification data, location data and environmental state sensor data. Another method includes transmitting identification data and location data from a radio frequency tag using hybrid spread-spectrum modulation. Another apparatus includes a radio frequency tag that transmits both identification data and location data using hybrid spread-spectrum modulation.

  7. Personal identification by eyes.

    PubMed

    Marinović, Dunja; Njirić, Sanja; Coklo, Miran; Muzić, Vedrana

    2011-09-01

    Identification of persons through the eyes is in the field of biometrical science. Many security systems are based on biometric methods of personal identification, to determine whether a person is presenting itself truly. The human eye contains an extremely large number of individual characteristics that make it particularly suitable for the process of identifying a person. Today, the eye is considered to be one of the most reliable body parts for human identification. Systems using iris recognition are among the most secure biometric systems.

  8. An Overview of Some Electronic Identification Use Cases in Europe

    NASA Astrophysics Data System (ADS)

    Mattatia, Fabrice

    As online services become more and more widely used, and as the exchanges of personal data become more and more widespread, electronic identification appears to be a key function for the security of the process and for the protection of privacy. It is the sole means of ensuring only authorized people have access to the data. In France and throughout Europe, e-government services, as well as private services, already use different means of electronic identification. Among the different technical solutions stand the electronic identity card: around 20 million eID cards have already been issued in Europe. The question of their interoperability is now open, in order that all European citizens may access the e-services of any Member State. With the development of electronic administration comes the need for the citizen to be able to prove his or her identity. This is essential if the citizen wants access to her personal data or administrative files, or if he wants to claim a right attached to his very identity. On the other hand, administrations have the obligation to ensure the personal data they store are not displayed to people who are not entitled to see them. They also have the need to detect fraudsters. Electronic identification, which is the ability to prove someone's identity on the Internet, thus becomes a central matter.

  9. KENNEDY SPACE CENTER, FLA. - Children enjoy a hands-on display of security equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.

    NASA Image and Video Library

    2003-07-24

    KENNEDY SPACE CENTER, FLA. - Children enjoy a hands-on display of security equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.

  10. 24 CFR 200.1101 - Cross-reference.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... URBAN DEVELOPMENT GENERAL INTRODUCTION TO FHA PROGRAMS Social Security Numbers and Employer Identification Numbers; Applicants in Unassisted Programs § 200.1101 Cross-reference. The provisions in subpart B of part 5 of this title apply to Social Security Numbers and Employer Identification Numbers for...

  11. 24 CFR 200.1001 - Cross-reference.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... URBAN DEVELOPMENT GENERAL INTRODUCTION TO FHA PROGRAMS Social Security Numbers and Employer Identification Numbers; Assistance Applicants and Participants § 200.1001 Cross-reference. The provisions in subpart B of part 5 of this title apply to Social Security Numbers and Employer Identification Numbers for...

  12. Attachment linked predictors of women's emotional and cognitive responses to infant distress.

    PubMed

    Leerkes, Esther M; Siepak, Kathryn J

    2006-03-01

    The purpose of this study was to examine associations among women's emotional and cognitive responses to infant fear and anger and to identify attachment linked predictors of these responses. Four hundred and forty Caucasian and African American undergraduate college women viewed video clips of two crying infants, one displaying anger and the other displaying fear. They identified what the infants were feeling, made causal attributions about the cause of crying, rated their own emotional reactions to the crying infants, and reported on the extent to which their parents met their emotional needs in childhood and their current adult attachment patterns. Emotional and cognitive responses to infant fear and anger were interrelated. Consistent with prediction, a history of parental emotional rejection and adult attachment anxiety and avoidance correlated negatively with accurate identification of emotions and positively with negative attributions, amusement, and neutral responses to infant distress. Adult attachment security moderated the effects of early parental rejection on emotional and cognitive responses to infant distress, and these results varied based on race and parent gender. Results are discussed from an attachment theory perspective.

  13. Authentic leadership, group cohesion and group identification in security and emergency teams.

    PubMed

    García-Guiu López, Carlos; Molero Alonso, Fernando; Moya Morales, Miguel; Moriano León, Juan Antonio

    2015-01-01

    Authentic leadership (AL) is a kind of leadership that inspires and promotes positive psychological capacities, underlining the moral and ethical component of behavior. The proposed investigation studies the relations among AL, cohesion, and group identification in security and emergency teams. A cross-sectional research design was conducted in which participated 221 members from 26 fire departments and operative teams from the local police of three Spanish provinces. The following questionnaires were administered: Authentic Leadership (ALQ), Group Cohesion (GEQ), and Mael and Ashford's Group Identification Questionnaire. A direct and positive relation was found between AL, cohesion, and group identification. An indirect relation was also found between AL and group cohesion through group identification, indicating the existence of partial mediation. The utility of the proposed model based on AL is considered; this model can be employed by those in charge of the fire departments and operative groups in organizations to improve workteams' cohesion. Both AL and group identification help to explain group cohesion in organizations committed to security and emergencies.

  14. Building Security into Schools.

    ERIC Educational Resources Information Center

    Kosar, John E.; Ahmed, Faruq

    2000-01-01

    Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…

  15. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  16. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  17. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  18. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  19. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  20. Identifying Bacterial Immune Evasion Proteins Using Phage Display.

    PubMed

    Fevre, Cindy; Scheepmaker, Lisette; Haas, Pieter-Jan

    2017-01-01

    Methods aimed at identification of immune evasion proteins are mainly rely on in silico prediction of sequence, structural homology to known evasion proteins or use a proteomics driven approach. Although proven successful these methods are limited by a low efficiency and or lack of functional identification. Here we describe a high-throughput genomic strategy to functionally identify bacterial immune evasion proteins using phage display technology. Genomic bacterial DNA is randomly fragmented and ligated into a phage display vector that is used to create a phage display library expressing bacterial secreted and membrane bound proteins. This library is used to select displayed bacterial secretome proteins that interact with host immune components.

  1. 12 CFR Appendix C to Part 360 - Deposit File Structure

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... social security number (“SSN”). For business accounts it would be the federal tax identification number... tax identification number. Possible values are: • S = Social Security Number. • T = Federal Tax..., charitable, social or other non-commercial purpose. Revocable Trusts: Including PODs and formal revocable...

  2. High-throughput screening of T7 phage display and protein microarrays as a methodological approach for the identification of IgE-reactive components.

    PubMed

    San Segundo-Acosta, Pablo; Garranzo-Asensio, María; Oeo-Santos, Carmen; Montero-Calle, Ana; Quiralte, Joaquín; Cuesta-Herranz, Javier; Villalba, Mayte; Barderas, Rodrigo

    2018-05-01

    Olive pollen and yellow mustard seeds are major allergenic sources with high clinical relevance. To aid with the identification of IgE-reactive components, the development of sensitive methodological approaches is required. Here, we have combined T7 phage display and protein microarrays for the identification of allergenic peptides and mimotopes from olive pollen and mustard seeds. The identification of these allergenic sequences involved the construction and biopanning of T7 phage display libraries of mustard seeds and olive pollen using sera from allergic patients to both biological sources together with the construction of phage microarrays printed with 1536 monoclonal phages from the third/four rounds of biopanning. The screening of the phage microarrays with individual sera from allergic patients enabled the identification of 10 and 9 IgE-reactive unique amino acid sequences from olive pollen and mustard seeds, respectively. Five immunoreactive amino acid sequences displayed on phages were selected for their expression as His6-GST tag fusion proteins and validation. After immunological characterization, we assessed the IgE-reactivity of the constructs. Our results show that protein microarrays printed with T7 phages displaying peptides from allergenic sources might be used to identify allergenic components -peptides, proteins or mimotopes- through their screening with specific IgE antibodies from allergic patients. Copyright © 2018 Elsevier B.V. All rights reserved.

  3. 78 FR 63159 - Amendment to Certification of Nebraska's Central Filing System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-23

    ... system for Nebraska to permit the conversion of all debtor social security and taxpayer identification... automatically convert social security numbers and taxpayer identification numbers into ten number unique... certified central filing systems is available through the Internet on the GIPSA Web site ( http://www.gipsa...

  4. 20 CFR 416.327 - Pilot program for photographic identification of disability benefit applicants in designated...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Pilot program for photographic identification of disability benefit applicants in designated geographic areas. 416.327 Section 416.327 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED...

  5. 20 CFR 416.327 - Pilot program for photographic identification of disability benefit applicants in designated...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Pilot program for photographic identification of disability benefit applicants in designated geographic areas. 416.327 Section 416.327 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED...

  6. 20 CFR 416.327 - Pilot program for photographic identification of disability benefit applicants in designated...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Pilot program for photographic identification of disability benefit applicants in designated geographic areas. 416.327 Section 416.327 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED...

  7. 26 CFR 31.6011(b)-1 - Employers' identification numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... any district director or director of a service center or any district office of the Social Security... applicable to Form SS-4, or with the nearest district office of the Social Security Administration. The... forms, regulations, and instructions. For provisions relating to the inclusion of identification numbers...

  8. 20 CFR 416.327 - Pilot program for photographic identification of disability benefit applicants in designated...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Pilot program for photographic identification of disability benefit applicants in designated geographic areas. 416.327 Section 416.327 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED...

  9. 29 CFR 1611.4 - Times, places, and requirements for identification of individuals making requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... present sufficient personal identification (e.g., driver's license, employee identification card, social security card, credit cards). If the requester is unable to provide such identification, the requester...

  10. Identification of polymer stabilized blue-phase liquid crystal display by chromaticity diagram

    NASA Astrophysics Data System (ADS)

    Lan, Yi-Fen; Tsai, Cheng-Yeh; Wang, Ling-Yung; Ku, Po-Jen; Huang, Tai-Hsiang; Liu, Chu-Yu; Sugiura, Norio

    2012-04-01

    We reported an identification method of blue phase liquid crystal (BPLC) display status by using Commission International de l'Éclairage (CIE) chromaticity diagram. The BPLC was injected into in-plane-switch (IPS) cell, polymer stabilized (PS) by ultraviolet cured process and analyzed by luminance colorimeter. The results of CIE chromaticity diagram showed a remarkable turning point when polymer stabilized blue phase liquid crystal II (PSBPLC-II) formed in the IPS cell. A mechanism of CIE chromaticity diagram identify PSBPLC display status was proposed, and we believe this finding will be useful to application and production of PSBPLC display.

  11. 24 CFR 886.305 - Disclosure and verification of Social Security and Employer Identification Numbers by owners.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Disclosure and verification of Social Security and Employer Identification Numbers by owners. 886.305 Section 886.305 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued) OFFICE OF THE ASSISTANT...

  12. 17 CFR 17.01 - Identification of special accounts, volume threshold accounts, and omnibus accounts.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Identification of special accounts, volume threshold accounts, and omnibus accounts. 17.01 Section 17.01 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REPORTS BY REPORTING MARKETS, FUTURES COMMISSION MERCHANTS, CLEARING MEMBERS, AND FOREIGN BROKERS §...

  13. The Need for an Implant Identification Card at Airport Security Check

    PubMed Central

    Kosuge, Dennis; MacDowell, Andrew

    2017-01-01

    Background Joint replacement surgery is having an increasing demand as national healthcare systems confront an ever ageing population. Surgical complications associated with lower limb arthroplasty are well known but less investigation has been performed examining its effect on air travel, more specifically, unwanted and significant inconvenience caused to travelers going through airport security. Methods In lower limb arthroplasty clinics, 50 patients who met our selection criteria were given questionnaires. Ten airport security officers from 4 international airports (London Stansted, London Gatwick, London Heathrow, and Amsterdam Schiphol International Airport) were also given a separate questionnaire. The opinion of the Civil Aviation Authority was also sought. Results All 50 patients (mean age, 70.4 years; range, 55 to 84 years) who were presenting in lower limb arthroplasty clinics and who met our selection criteria volunteered to enter the study. Twenty-eight of these patients were female (mean age, 69.1 years; range, 55 to 84 years) and 22 were male (mean age, 71.2 years; range, 58 to 81 years). Of the patients, 14% stated that their joint replacements did not set off the airport security alarm. Responses were received from 10 airport security officers as well. Six airport security officers were male and 4 were female. All of the airport officers were aware of some form of implant identification card with 90% stating that these were useful to them at airport security. Eight-four percent of the patients stated that an implant identification card outlining what joint replacement they possessed and when this had been done would be very useful. Sixteen percent of the patients did not think a card would be beneficial since all of them had set off the airport alarm system only once or less in their lifetime. Conclusions It is the opinion of airport security officers and patients that joint replacement implant identification cards streamline airport security checks and decrease the need for more invasive searches at airport security. PMID:28567216

  14. The Need for an Implant Identification Card at Airport Security Check.

    PubMed

    Ali, Erden; Kosuge, Dennis; MacDowell, Andrew

    2017-06-01

    Joint replacement surgery is having an increasing demand as national healthcare systems confront an ever ageing population. Surgical complications associated with lower limb arthroplasty are well known but less investigation has been performed examining its effect on air travel, more specifically, unwanted and significant inconvenience caused to travelers going through airport security. In lower limb arthroplasty clinics, 50 patients who met our selection criteria were given questionnaires. Ten airport security officers from 4 international airports (London Stansted, London Gatwick, London Heathrow, and Amsterdam Schiphol International Airport) were also given a separate questionnaire. The opinion of the Civil Aviation Authority was also sought. All 50 patients (mean age, 70.4 years; range, 55 to 84 years) who were presenting in lower limb arthroplasty clinics and who met our selection criteria volunteered to enter the study. Twenty-eight of these patients were female (mean age, 69.1 years; range, 55 to 84 years) and 22 were male (mean age, 71.2 years; range, 58 to 81 years). Of the patients, 14% stated that their joint replacements did not set off the airport security alarm. Responses were received from 10 airport security officers as well. Six airport security officers were male and 4 were female. All of the airport officers were aware of some form of implant identification card with 90% stating that these were useful to them at airport security. Eight-four percent of the patients stated that an implant identification card outlining what joint replacement they possessed and when this had been done would be very useful. Sixteen percent of the patients did not think a card would be beneficial since all of them had set off the airport alarm system only once or less in their lifetime. It is the opinion of airport security officers and patients that joint replacement implant identification cards streamline airport security checks and decrease the need for more invasive searches at airport security.

  15. 50 CFR 622.450 - Gear identification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Lobster Fishery of Puerto Rico and the U.S. Virgin Islands § 622.450 Gear identification. (a) Caribbean... Caribbean EEZ must display the official number specified for the vessel by Puerto Rico or the U.S. Virgin... display the official number and color code assigned to the vessel by Puerto Rico or the U.S. Virgin...

  16. Identification of immunogenic polypeptides from a Mycoplasma hyopneumoniae genome library by phage display.

    PubMed

    Kügler, Jonas; Nieswandt, Simone; Gerlach, Gerald F; Meens, Jochen; Schirrmann, Thomas; Hust, Michael

    2008-09-01

    The identification of immunogenic polypeptides of pathogens is helpful for the development of diagnostic assays and therapeutic applications like vaccines. Routinely, these proteins are identified by two-dimensional polyacrylamide gel electrophoresis and Western blot using convalescent serum, followed by mass spectrometry. This technology, however, is limited, because low or differentially expressed proteins, e.g. dependent on pathogen-host interaction, cannot be identified. In this work, we developed and improved a M13 genomic phage display-based method for the selection of immunogenic polypeptides of Mycoplasma hyopneumoniae, a pathogen causing porcine enzootic pneumonia. The fragmented genome of M. hyopneumoniae was cloned into a phage display vector, and the genomic library was packaged using the helperphage Hyperphage to enrich open reading frames (ORFs). Afterwards, the phage display library was screened by panning using convalescent serum. The analysis of individual phage clones resulted in the identification of five genes encoding immunogenic proteins, only two of which had been previously identified and described as immunogenic. This M13 genomic phage display, directly combining ORF enrichment and the presentation of the corresponding polypeptide on the phage surface, complements proteome-based methods for the identification of immunogenic polypeptides and is particularly well suited for the use in mycoplasma species.

  17. 31 CFR 10.6 - Enrollment as an enrolled agent or enrolled retirement plan agent.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... address, new address, social security number or tax identification number and the date. (d) Renewal of... Service who have a social security number or tax identification number that ends with the numbers 0, 1, 2..., 2004. (2) All individuals licensed to practice before the Internal Revenue Service who have a social...

  18. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.231 Airport-approved... 49 Transportation 9 2013-10-01 2013-10-01 false Airport-approved and exclusive area personnel...

  19. Provably secure identity-based identification and signature schemes from code assumptions

    PubMed Central

    Zhao, Yiming

    2017-01-01

    Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure. PMID:28809940

  20. Provably secure identity-based identification and signature schemes from code assumptions.

    PubMed

    Song, Bo; Zhao, Yiming

    2017-01-01

    Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure.

  1. Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    PubMed Central

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C.-W.

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions. PMID:25207333

  2. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    PubMed

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  3. Establishing Viable and Effective Information-Warfare Capability in Developing Nations Based on the U.S. Model

    DTIC Science & Technology

    2012-12-01

    include law enforcement and intelligence capabilities in the lineup . However, national security strategy reflects the first four only. Figure 1...Term Joint Doctrine Identification Air Force Doctrine Identification Army Doctrine Identification Navy Doctrine Identification EW...59 Ibid., 39. 34 Term Joint Doctrine Identification Air Force Doctrine Identification Army Doctrine Identification Navy

  4. 32 CFR 707.7 - Submarine identification light.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... RULES WITH RESPECT TO ADDITIONAL STATION AND SIGNAL LIGHTS § 707.7 Submarine identification light. Submarines may display, as a distinctive means of identification, an intermittent flashing amber beacon with...

  5. The link between national security and biometrics

    NASA Astrophysics Data System (ADS)

    Etter, Delores M.

    2005-03-01

    National security today requires identification of people, things and activities. Biometrics plays an important role in the identification of people, and indirectly, in the identification of things and activities. Therefore, the development of technology and systems that provide faster and more accurate biometric identification is critical to the defense of our country. In addition, the development of a broad range of biometrics is necessary to provide the range of options needed to address flexible and adaptive adversaries. This paper will discuss the importance of a number of critical areas in the development of an environment to support biometrics, including research and development, biometric education, standards, pilot projects, and privacy assurance.

  6. 17 CFR 242.610 - Access to quotations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Access to quotations. 242.610...-Regulation of the National Market System § 242.610 Access to quotations. (a) Quotations of SRO trading... national securities exchange or national securities association to the quotations in an NMS stock displayed...

  7. Language Models for Hierarchical Summarization

    DTIC Science & Technology

    2003-09-01

    80 4.3.3 Airport Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80...82 4.6 The figure shows a portion of the hierarchy created for TREC Topic 341: Airport Security . The portion of the...ranked list displayed corresponds to documents that contain the term “Apple Boost AirPort Security ”. This hierarchy demonstrates how a particular

  8. 76 FR 38305 - Safety Zone; San Francisco Chronicle Fireworks Display, San Francisco, CA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-30

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG 2011-0402] Safety Zone; San Francisco Chronicle Fireworks Display, San Francisco, CA AGENCY: Coast Guard, DHS. ACTION... annual San Francisco Chronicle Fireworks Display (Independence Day Celebration for the City of San...

  9. Optical security system for the protection of personal identification information.

    PubMed

    Doh, Yang-Hoi; Yoon, Jong-Soo; Choi, Kyung-Hyun; Alam, Mohammad S

    2005-02-10

    A new optical security system for the protection of personal identification information is proposed. First, authentication of the encrypted personal information is carried out by primary recognition of a personal identification number (PIN) with the proposed multiplexed minimum average correlation energy phase-encrypted (MMACE_p) filter. The MMACE_p filter, synthesized with phase-encrypted training images, can increase the discrimination capability and prevent the leak of personal identification information. After the PIN is recognized, speedy authentication of personal information can be achieved through one-to-one optical correlation by means of the optical wavelet filter. The possibility of information counterfeiting can be significantly decreased with the double-identification process. Simulation results demonstrate the effectiveness of the proposed technique.

  10. Teaching RFID Information Systems Security

    ERIC Educational Resources Information Center

    Thompson, Dale R.; Di, Jia; Daugherty, Michael K.

    2014-01-01

    The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…

  11. Semantic policy and adversarial modeling for cyber threat identification and avoidance

    NASA Astrophysics Data System (ADS)

    DeFrancesco, Anton; McQueary, Bruce

    2009-05-01

    Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.

  12. A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.

    PubMed

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining

    2015-03-01

    Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.

  13. Security risks associated with radio frequency identification in medical environments.

    PubMed

    Hawrylak, Peter J; Schimke, Nakeisha; Hale, John; Papa, Mauricio

    2012-12-01

    Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based on interception of messages, interruption of communication, modification of data, and fabrication of messages and devices. This paper presents an overview of these security threats present in RFID systems in a medical environment and provides guidance on potential solutions to these threats. This paper provides a roadmap for researchers and implementers to address the security issues facing RFID in the medical space.

  14. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    ... transportation systems to ensure freedom of movement for people and commerce. To achieve this mission, TSA is... security screening and identity verification of individuals, including identification media and identifying... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  15. Pilot identification of proposed electronic symbols for displays of aeronautical charting information

    DOT National Transportation Integrated Search

    2007-10-05

    Many electronic displays of aeronautical charting information currently use different symbols for common display elements, creating the risk of confusion and misinterpretation. The SAE International Aerospace Behavior and Technology (G-10) Aeronautic...

  16. Display technologies: application for the discovery of drug and gene delivery agents

    PubMed Central

    Sergeeva, Anna; Kolonin, Mikhail G.; Molldrem, Jeffrey J.; Pasqualini, Renata; Arap, Wadih

    2007-01-01

    Recognition of molecular diversity of cell surface proteomes in disease is essential for the development of targeted therapies. Progress in targeted therapeutics requires establishing effective approaches for high-throughput identification of agents specific for clinically relevant cell surface markers. Over the past decade, a number of platform strategies have been developed to screen polypeptide libraries for ligands targeting receptors selectively expressed in the context of various cell surface proteomes. Streamlined procedures for identification of ligand-receptor pairs that could serve as targets in disease diagnosis, profiling, imaging and therapy have relied on the display technologies, in which polypeptides with desired binding profiles can be serially selected, in a process called biopanning, based on their physical linkage with the encoding nucleic acid. These technologies include virus/phage display, cell display, ribosomal display, mRNA display and covalent DNA display (CDT), with phage display being by far the most utilized. The scope of this review is the recent advancements in the display technologies with a particular emphasis on molecular mapping of cell surface proteomes with peptide phage display. Prospective applications of targeted compounds derived from display libraries in the discovery of targeted drugs and gene therapy vectors are discussed. PMID:17123658

  17. Exploring Attachment to the “Homeland” and Its Association with Heritage Culture Identification

    PubMed Central

    Ferenczi, Nelli; Marshall, Tara C.

    2013-01-01

    Conceptualisations of attachment to one's nation of origin reflecting a symbolic caregiver can be found cross-culturally in literature, art, and language. Despite its prevalence, the relationship with one's nation has not been investigated empirically in terms of an attachment theory framework. Two studies employed an attachment theory approach to investigate the construct validity of symbolic attachment to one's nation of origin, and its association with acculturation (operationalized as heritage and mainstream culture identification). Results for Study 1 indicated a three-factor structure of nation attachment; the factors were labelled secure-preoccupied, fearful, and dismissive nation attachment. Hierarchical linear modelling was employed to control for differing cultures across participants. Secure-preoccupied nation attachment was a significant predictor of increased heritage culture identification for participants residing in their country of birth, whilst dismissive nation attachment was a significant predictor of decreased heritage culture identification for international migrants. Secure-preoccupied nation attachment was also associated with higher levels of subjective-wellbeing. Study 2 further confirmed the validity of the nation attachment construct through confirmatory factor analysis; the three-factor model adequately fit the data. Similar to the results of Study 1, secure-preoccupied nation attachment was associated with increased levels of heritage culture identification and psychological well-being. Implications of the tripartite model of nation attachment for identity and well-being will be discussed. PMID:23372673

  18. Visual identification system for homeland security and law enforcement support

    NASA Astrophysics Data System (ADS)

    Samuel, Todd J.; Edwards, Don; Knopf, Michael

    2005-05-01

    This paper describes the basic configuration for a visual identification system (VIS) for Homeland Security and law enforcement support. Security and law enforcement systems with an integrated VIS will accurately and rapidly provide identification of vehicles or containers that have entered, exited or passed through a specific monitoring location. The VIS system stores all images and makes them available for recall for approximately one week. Images of alarming vehicles will be archived indefinitely as part of the alarming vehicle"s or cargo container"s record. Depending on user needs, the digital imaging information will be provided electronically to the individual inspectors, supervisors, and/or control center at the customer"s office. The key components of the VIS are the high-resolution cameras that capture images of vehicles, lights, presence sensors, image cataloging software, and image recognition software. In addition to the cameras, the physical integration and network communications of the VIS components with the balance of the security system and client must be ensured.

  19. Access Control Is More than Security.

    ERIC Educational Resources Information Center

    Fickes, Michael

    2002-01-01

    Describes the University of New Mexico's photo identification LOBO card system, which performs both security and validation tasks. It is used in conjunction with several C-CURE 800 Integrated Security Management Systems supplied by Software House of Lexington, Massachusetts. (EV)

  20. 33 CFR 181.23 - Hull identification numbers required.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Hull identification numbers... SECURITY (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.23 Hull... identify each boat produced or imported with two hull identification numbers that meet the requirements of...

  1. 46 CFR 10.207 - Identification number.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Identification number. 10.207 Section 10.207 Shipping... CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.207 Identification number. For recordkeeping purposes only, a mariner's official MMC identification number is the individual's social security...

  2. 46 CFR 10.207 - Identification number.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 1 2013-10-01 2013-10-01 false Identification number. 10.207 Section 10.207 Shipping... CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.207 Identification number. For recordkeeping purposes only, a mariner's official MMC identification number is the individual's social security...

  3. 46 CFR 10.207 - Identification number.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Identification number. 10.207 Section 10.207 Shipping... CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.207 Identification number. For recordkeeping purposes only, a mariner's official MMC identification number is the individual's social security...

  4. 46 CFR 10.207 - Identification number.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 1 2014-10-01 2014-10-01 false Identification number. 10.207 Section 10.207 Shipping... CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.207 Identification number. For recordkeeping purposes only, a mariner's official MMC identification number is the individual's social security...

  5. 75 FR 10414 - Researcher Identification Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... capturing administrative information on the characteristics of our users. Other forms of identification are... use bar-codes on researcher identification cards in the Washington, DC, area. The plastic cards we... plastic researcher identification cards as part of their security systems, we issue a plastic card to...

  6. Categorization and identification of simultaneous targets.

    PubMed

    Theeuwes, J

    1991-02-01

    Early and late selection theories of visual attention disagree about whether identification occurs before or after selection. Studies showing the category effect, i.e., the time to detect a letter is hardly affected by the number of digits present in the display, are taken as evidence for late selection theories since these studies suggest parallel identification of all items in the display. As an extension of previous studies, in the present study two categorically different targets were presented simultaneously among a variable number of nontargets. Subjects were shown brief displays of two target letters among either 2, 4 or 6 nontarget digits. Subjects responded 'same' when the two letters were identical and 'different' otherwise. Since the 'same-different' response reflects the combined outcome of the simultaneous targets, late-selection theory predicts that the time to match the target letters is independent of the number of nontarget digits. Alternatively, early-selection theory predicts a linear increase of reaction time with display size since the presence of more than one target disrupts parallel preattentive processing, leading to a serial search through all items in the display. The results provide evidence for the early-selection view since reaction time increased linearly with the number of categorically different nontargets. A control experiment revealed that none of the alternative explanations could account for the display size effect.

  7. 17 CFR 270.0-11 - Customer identification programs.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Customer identification... (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.0-11 Customer identification programs... implementing regulation at 31 CFR 103.131, which requires a customer identification program to be implemented...

  8. 49 CFR 172.338 - Replacement of identification numbers.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 2 2013-10-01 2013-10-01 false Replacement of identification numbers. 172.338..., TRAINING REQUIREMENTS, AND SECURITY PLANS Marking § 172.338 Replacement of identification numbers. If more than one of the identification number markings on placards, orange panels, or white square-on-point...

  9. 49 CFR 172.338 - Replacement of identification numbers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Replacement of identification numbers. 172.338..., TRAINING REQUIREMENTS, AND SECURITY PLANS Marking § 172.338 Replacement of identification numbers. If more than one of the identification number markings on placards, orange panels, or white square-on-point...

  10. 49 CFR 172.338 - Replacement of identification numbers.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 2 2011-10-01 2011-10-01 false Replacement of identification numbers. 172.338..., TRAINING REQUIREMENTS, AND SECURITY PLANS Marking § 172.338 Replacement of identification numbers. If more than one of the identification number markings on placards, orange panels, or white square-on-point...

  11. Learning Locked down: Evaluating the Treatment of Students' Rights in High Security School Environments

    ERIC Educational Resources Information Center

    Bracy, Nicole L.

    2009-01-01

    Public schools have transformed significantly over the past several decades in response to broad concerns about rising school violence. Today's public schools are high security environments employing tactics commonly found in jails and prisons such as police officers, security cameras, identification systems, and secure building strategies.…

  12. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  13. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  14. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  15. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  16. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  17. 16 CFR 1616.62 - Policy regarding retail display requirements for items.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Policy regarding retail display requirements...) Interpretations and Policies § 1616.62 Policy regarding retail display requirements for items. For purposes of the retail display and identification requirements of § 1616.31(c), and for those purposes only, any item...

  18. 16 CFR § 1616.62 - Policy regarding retail display requirements for items.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 2 2013-01-01 2013-01-01 false Policy regarding retail display requirements... (FF 5-74) Interpretations and Policies § 1616.62 Policy regarding retail display requirements for items. For purposes of the retail display and identification requirements of § 1616.31(c), and for those...

  19. 16 CFR 1616.62 - Policy regarding retail display requirements for items.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 2 2014-01-01 2014-01-01 false Policy regarding retail display requirements...) Interpretations and Policies § 1616.62 Policy regarding retail display requirements for items. For purposes of the retail display and identification requirements of § 1616.31(c), and for those purposes only, any item...

  20. 16 CFR 1616.62 - Policy regarding retail display requirements for items.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 2 2011-01-01 2011-01-01 false Policy regarding retail display requirements...) Interpretations and Policies § 1616.62 Policy regarding retail display requirements for items. For purposes of the retail display and identification requirements of § 1616.31(c), and for those purposes only, any item...

  1. 77 FR 39346 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-02

    ...; social security number (SSN); taxpayer identification number (TIN); date of birth; grade; race; employing... delivery of salary payments to VA employees. 3. Transfer payroll information to the Social Security Administration in order to credit quarterly posting for social security. [[Page 39349

  2. Research of Pedestrian Crossing Safety Facilities Based on the Video Detection

    NASA Astrophysics Data System (ADS)

    Li, Sheng-Zhen; Xie, Quan-Long; Zang, Xiao-Dong; Tang, Guo-Jun

    Since that the pedestrian crossing facilities at present is not perfect, pedestrian crossing is in chaos and pedestrians from opposite direction conflict and congest with each other, which severely affects the pedestrian traffic efficiency, obstructs the vehicle and bringing about some potential security problems. To solve these problems, based on video identification, a pedestrian crossing guidance system was researched and designed. It uses the camera to monitor the pedestrians in real time and sums up the number of pedestrians through video detection program, and a group of pedestrian's induction lamp array is installed at the interval of crosswalk, which adjusts color display according to the proportion of pedestrians from both sides to guide pedestrians from both opposite directions processing separately. The emulation analysis result from cellular automaton shows that the system reduces the pedestrian crossing conflict, shortens the time of pedestrian crossing and improves the safety of pedestrians crossing.

  3. Bedside patient data viewer using RFID and e-Ink technology.

    PubMed

    Nikodijevic, Aleksandar; Pichler, Patrick; Forjan, Mathias; Sauermann, Stefan

    2014-01-01

    In the daily routine of hospitals, which work with paper based medical records, the staff has to find the appropriate patient file if it needs information about the patient. With the introduction of ELGA the Austrian hospitals have to use specific standards for their clinical documentation. These structured documents can be used to feed an e-Ink reader with information about every patient in a hospital. Combined with RFID and security measures, the clinical staff is supported during the patient file searching process. The developed experimental setup of the Bedside Patient Data Viewer demonstrates a prototype of such a system. An Amazon Kindle Paperwhite is used to display processed data, supplied by a Raspberry Pi with an attached RFID module for identification purposes. Results show that such a system can be implemented, however a lot of organizational and technical issues remain to be solved.

  4. Enhanced terahertz imaging system performance analysis and design tool for concealed weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Franck, Charmaine C.; Espinola, Richard L.; Petkie, Douglas T.; De Lucia, Frank C.; Jacobs, Eddie L.

    2011-11-01

    The U.S. Army Research Laboratory (ARL) and the U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) have developed a terahertz-band imaging system performance model/tool for detection and identification of concealed weaponry. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security & Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). This paper will provide a comprehensive review of an enhanced, user-friendly, Windows-executable, terahertz-band imaging system performance analysis and design tool that now includes additional features such as a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures. This newly enhanced THz imaging system design tool is an extension of the advanced THz imaging system performance model that was developed under the Defense Advanced Research Project Agency's (DARPA) Terahertz Imaging Focal-Plane Technology (TIFT) program. This paper will also provide example system component (active-illumination source and detector) trade-study analyses using the new features of this user-friendly THz imaging system performance analysis and design tool.

  5. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes.more » These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.« less

  6. Minimum Requirements for Taxicab Security Cameras.

    PubMed

    Zeng, Shengke; Amandus, Harlan E; Amendola, Alfred A; Newbraugh, Bradley H; Cantis, Douglas M; Weaver, Darlene

    2014-07-01

    The homicide rate of taxicab-industry is 20 times greater than that of all workers. A NIOSH study showed that cities with taxicab-security cameras experienced significant reduction in taxicab driver homicides. Minimum technical requirements and a standard test protocol for taxicab-security cameras for effective taxicab-facial identification were determined. The study took more than 10,000 photographs of human-face charts in a simulated-taxicab with various photographic resolutions, dynamic ranges, lens-distortions, and motion-blurs in various light and cab-seat conditions. Thirteen volunteer photograph-evaluators evaluated these face photographs and voted for the minimum technical requirements for taxicab-security cameras. Five worst-case scenario photographic image quality thresholds were suggested: the resolution of XGA-format, highlight-dynamic-range of 1 EV, twilight-dynamic-range of 3.3 EV, lens-distortion of 30%, and shutter-speed of 1/30 second. These minimum requirements will help taxicab regulators and fleets to identify effective taxicab-security cameras, and help taxicab-security camera manufacturers to improve the camera facial identification capability.

  7. An Automated Flying-Insect-Detection System

    NASA Technical Reports Server (NTRS)

    Vann, Timi; Andrews, Jane C.; Howell, Dane; Ryan, Robert

    2005-01-01

    An automated flying-insect-detection system (AFIDS) was developed as a proof-of-concept instrument for real-time detection and identification of flying insects. This type of system has use in public health and homeland security decision support, agriculture and military pest management, and/or entomological research. Insects are first lured into the AFIDS integrated sphere by insect attractants. Once inside the sphere, the insect's wing beats cause alterations in light intensity that is detected by a photoelectric sensor. Following detection, the insects are encouraged (with the use of a small fan) to move out of the sphere and into a designated insect trap where they are held for taxonomic identification or serological testing. The acquired electronic wing beat signatures are preprocessed (Fourier transformed) in real-time to display a periodic signal. These signals are sent to the end user where they are graphically displayed. All AFIDS data are pre-processed in the field with the use of a laptop computer equipped with LABVIEW. The AFIDS software can be programmed to run continuously or at specific time intervals when insects are prevalent. A special DC-restored transimpedance amplifier reduces the contributions of low-frequency background light signals, and affords approximately two orders of magnitude greater AC gain than conventional amplifiers. This greatly increases the signal-to-noise ratio and enables the detection of small changes in light intensity. The AFIDS light source consists of high-intensity Al GaInP light-emitting diodes (LEDs). The AFIDS circuitry minimizes brightness fluctuations in the LEDs and when integrated with an integrating sphere, creates a diffuse uniform light field. The insect wing beats isotropically scatter the diffuse light in the sphere and create wing beat signatures that are detected by the sensor. This configuration minimizes variations in signal associated with insect flight orientation.

  8. 33 CFR 159.55 - Identification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Identification. 159.55 Section 159.55 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION MARINE SANITATION DEVICES Design, Construction, and Testing § 159.55 Identification. (a) Each...

  9. Dataset reporting the perceiver identification rates of basic emotions expressed by male, female and ambiguous gendered walkers in full-light, point-light and synthetically modelled point-light walkers.

    PubMed

    Halovic, Shaun; Kroos, Christian

    2017-12-01

    This data set describes the experimental data collected and reported in the research article "Walking my way? Walker gender and display format confounds the perception of specific emotions" (Halovic and Kroos, in press) [1]. The data set represent perceiver identification rates for different emotions (happiness, sadness, anger, fear and neutral), as displayed by full-light, point-light and synthetic point-light walkers. The perceiver identification scores have been transformed into H t rates, which represent proportions/percentages of correct identifications above what would be expected by chance. This data set also provides H t rates separately for male, female and ambiguously gendered walkers.

  10. Bringing text display digital radio to consumers with hearing loss.

    PubMed

    Sheffield, Ellyn G; Starling, Michael; Schwab, Daniel

    2011-01-01

    Radio is migrating to digital transmission, expanding its offerings to include captioning for individuals with hearing loss. Text display radio requires a large amount of word throughput with minimal screen display area, making good user interface design crucial to its success. In two experiments, we presented hearing, hard-of-hearing, and deaf consumers with National Public Radio stories converted to text and examined their preferences for and reactions to midsized and small radio text displays. We focused on physical display attributes such as text color, font style, line length, and scrolling type as well as emergency alert messages and emergency prompts for drivers, announcer identification schemes, and synchronization of audio and text. Results suggest that midsized, Global Positioning System (GPS)-style displays were well liked, synchronization of audio and text was important to comprehension and retrieval of story details, identification of announcers was served best with a combination of name change in parenthesis and color change, and a mixture of color and flashing symbols was preferred for emergency alerting.

  11. An Analysis of Federal Airport and Air Carrier Employee Access Control, Screening. and Training Regulations

    DTIC Science & Technology

    1998-03-01

    traveling public, air carriers, and persons employed by or conducting business at public airports. 14. SUBJECT TERMS Airport Security , Federal...26 4. Sterile Area 28 5. Exclusive Area 28 E. SECURITY ALERT LEVELS 29 F. AIRPORT SECURITY TOOLS 30 1. Electronic Detection System 31 a... Security Coordinator ASP Airport Security Program BIS Biometrie Identification System CCTV Closed Circuit Television CJIS Criminal Justice Information

  12. 33 CFR 165.819 - Security Zone; Sabine Bank Channel, Sabine Pass Channel and Sabine-Neches Waterway, TX.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Broadcast Notice to Mariners and the presence of escort vessels displaying flashing blue law enforcement lights. (b) Regulations. (1) Entry into or remaining in a fixed security zone described in paragraph (a...

  13. 33 CFR 165.819 - Security Zone; Sabine Bank Channel, Sabine Pass Channel and Sabine-Neches Waterway, TX.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Broadcast Notice to Mariners and the presence of escort vessels displaying flashing blue law enforcement lights. (b) Regulations. (1) Entry into or remaining in a fixed security zone described in paragraph (a...

  14. 33 CFR 165.819 - Security Zone; Sabine Bank Channel, Sabine Pass Channel and Sabine-Neches Waterway, TX.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Broadcast Notice to Mariners and the presence of escort vessels displaying flashing blue law enforcement lights. (b) Regulations. (1) Entry into or remaining in a fixed security zone described in paragraph (a...

  15. 33 CFR 165.819 - Security Zone; Sabine Bank Channel, Sabine Pass Channel and Sabine-Neches Waterway, TX.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Broadcast Notice to Mariners and the presence of escort vessels displaying flashing blue law enforcement lights. (b) Regulations. (1) Entry into or remaining in a fixed security zone described in paragraph (a...

  16. 5 CFR 1630.7 - Identification requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... or herself by signature, i.e., to note by signature the date of access, Social Security number, and... number or Social Security number and shall sign the request. Most other individuals shall provide the participant's account number or Social Security number, shall provide a statement of relationship to the...

  17. Keeper of the Gates.

    ERIC Educational Resources Information Center

    Bushweller, Kevin

    1994-01-01

    Profiles Floyd Wiggins, Jr., veteran school security chief for Richmond (Virginia) Public Schools. Besides a security force, the district uses hand-held metal-detectors and police-dog raids in its secondary schools and is considering use of student identification cards, security video cameras, and a larger parent volunteer force. Wiggins feels…

  18. 78 FR 69527 - Proposed Information Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    ... Identification Number (PTIN) will have a social security number, which will be used to help establish their identity. However, paid preparers that are nonresident aliens and cannot get a social security number will...: 55,900. Title: PTIN Supplemental Application For Foreign Persons Without a Social Security Number...

  19. Security seal. [Patent application

    DOEpatents

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  20. Security seal

    DOEpatents

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  1. Enzyme Mini-Test for Field Identification of Leishmania Isolates from U.S. Military Personnel.

    DTIC Science & Technology

    1985-08-15

    8217.*". .. , 00 ENZYME MINI-TEST FOR FIELD IDENTIFICATION OF ’ r LEISHMANIA ISOLATES FROM U.S. MILITARY la ...No 0704-0188% __REPORTDOCUMENTATION__PAGEExp Date Jun30, 1986 la REPORT SECURITY CLASSIFICATION lb RESTRICTIVE MARKINGS Unclassified 2a SECURITY...Soc. Trop. Med. ’* Mcreevy, P. B., P. D. Kreutzer, E. D. Frank-, H. A. Stim- son , C. N. Oster and L. D. H-ndricks. 1983. Taxonomy, clinical pathology

  2. A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

    NASA Astrophysics Data System (ADS)

    Ahmed, Fawad; Sattar, Farook; Siyal, Mohammed Yakoob; Yu, Dan

    2006-12-01

    We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues—buyer-seller identification, copyright infringement, and ownership verification. By buyer-seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/seller with their respective watermarked images.

  3. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification of information requiring protection. Classifiers shall identify the level of classification of each classified... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Identification of information requiring...

  4. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification of information requiring protection. Classifiers shall identify the level of classification of each classified... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Identification of information requiring...

  5. Advances in Raman spectroscopy for explosive identification in aviation security

    NASA Astrophysics Data System (ADS)

    Santillán, Javier D.; Brown, Christopher D.; Jalenak, Wayne

    2007-04-01

    In the operational airport environment, the rapid identification of potentially hazardous materials such as improvised explosive devices, chemical warfare agents and flammable and explosive liquids is increasingly critical. Peroxide-based explosives pose a particularly insidious threat because they can be made from commonly available and relatively innocuous household chemicals, such as bleach and hydrogen peroxide. Raman spectroscopy has been validated as a valuable tool for rapid identification of chemicals, explosives, and narcotics and their precursors while allowing "line-of-sight" interrogation through bottles or other translucent containers. This enables safe identification of both precursor substances, such as acetone, and end-products, such as TATP, without direct sampling, contamination and exposure by security personnel. To date, Raman systems have been laboratory-based, requiring careful operation and maintenance by technology experts. The capital and ongoing expenses of these systems is also significant. Recent advances in Raman component technologies have dramatically reduced the footprint and cost, while improving the reliability and ease of use of Raman spectroscopy systems. Such technologies are not only bringing the lab to the field, but are also protecting civilians and security personnel in the process.

  6. Enhanced Images for Checked and Carry-on Baggage and Cargo Screening

    NASA Technical Reports Server (NTRS)

    Woodell, Glenn; Rahman, Zia-ur; Jobson, Daniel J.; Hines, Glenn

    2004-01-01

    The current X-ray systems used by airport security personnel for the detection of contraband, and objects such as knives and guns that can impact the security of a flight, have limited effect because of the limited display quality of the X-ray images. Since the displayed images do not possess optimal contrast and sharpness, it is possible for the security personnel to miss potentially hazardous objects. This problem is also common to other disciplines such as medical Xrays, and can be mitigated, to a large extent, by the use of state-of-the-art image processing techniques to enhance the contrast and sharpness of the displayed image. The NASA Langley Research Center's Visual Information Processing Group has developed an image enhancement technology that has direct applications to this problem of inadequate display quality. Airport security X-ray imaging systems would benefit considerably by using this novel technology, making the task of the personnel who have to interpret the X-ray images considerably easier, faster, and more reliable. This improvement would translate into more accurate screening as well as minimizing the screening time delays to airline passengers. This technology, Retinex, has been optimized for consumer applications but has been applied to medical X-rays on a very preliminary basis. The resultant technology could be incorporated into a new breed of commercial x-ray imaging systems which would be transparent to the screener yet allow them to see subtle detail much more easily, reducing the amount of time needed for screening while greatly increasing the effectiveness of contraband detection and thus public safety.

  7. Enhanced Images for Checked and Carry-on Baggage and Cargo Screening

    NASA Technical Reports Server (NTRS)

    Woodell, Glen; Rahman, Zia-ur; Jobson, Daniel J.; Hines, Glenn

    2004-01-01

    The current X-ray systems used by airport security personnel for the detection of contraband, and objects such as knives and guns that can impact the security of a flight, have limited effect because of the limited display quality of the X-ray images. Since the displayed images do not possess optimal contrast and sharpness, it is possible for the security personnel to miss potentially hazardous objects. This problem is also common to other disciplines such as medical X-rays, and can be mitigated, to a large extent, by the use of state-of-the-art image processing techniques to enhance the contrast and sharpness of the displayed image. The NASA Langley Research Centers Visual Information Processing Group has developed an image enhancement technology that has direct applications to this problem of inadequate display quality. Airport security X-ray imaging systems would benefit considerably by using this novel technology, making the task of the personnel who have to interpret the X-ray images considerably easier, faster, and more reliable. This improvement would translate into more accurate screening as well as minimizing the screening time delays to airline passengers. This technology, Retinex, has been optimized for consumer applications but has been applied to medical X-rays on a very preliminary basis. The resultant technology could be incorporated into a new breed of commercial x-ray imaging systems which would be transparent to the screener yet allow them to see subtle detail much more easily, reducing the amount of time needed for screening while greatly increasing the effectiveness of contraband detection and thus public safety.

  8. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    PubMed Central

    Paramasivan, B.; Kaliappan, M.

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986

  9. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    PubMed

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  10. Integrated Support for Manipulation and Display of 3D Objects for the Command and Control Workstation of the Future

    DTIC Science & Technology

    1989-06-01

    Science Unclassified SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE la. REPORT SECURITY CLASS’r!CATION )b RESTRICTIVE MARKINGS UNCLASSIFIED...2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/AVAILABILITY OF REPORT Approved for public release; Zb. DECLASSIFICATION I DOWNGRADING SCHEDULE...ZIP Code) 10 SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT Monterey, CA. 93943 FLEMENT NO. NO. NO ACCESSION NO. 11. TITLE (Include Security

  11. 20 CFR 422.520 - Forms related to maintenance of earnings records.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... records. 422.520 Section 422.520 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND... following forms are used by the Social Security Administration and by the public in connection with the... to request an employer identification number under the FICA.) SS-5—Application for a Social Security...

  12. 20 CFR 422.520 - Forms related to maintenance of earnings records.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... records. 422.520 Section 422.520 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND... following forms are used by the Social Security Administration and by the public in connection with the... to request an employer identification number under the FICA.) SS-5—Application for a Social Security...

  13. 20 CFR 422.520 - Forms related to maintenance of earnings records.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... records. 422.520 Section 422.520 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND... following forms are used by the Social Security Administration and by the public in connection with the... to request an employer identification number under the FICA.) SS-5—Application for a Social Security...

  14. 20 CFR 422.520 - Forms related to maintenance of earnings records.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... records. 422.520 Section 422.520 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND... following forms are used by the Social Security Administration and by the public in connection with the... to request an employer identification number under the FICA.) SS-5—Application for a Social Security...

  15. 75 FR 66428 - Proposed Collection; Comment Request for Form 8945

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-28

    ... PTIN Supplemental Application For U.S. Citizens Without A Social Security Number Due To Conscientious... Supplemental Application For U.S. Citizens Without A Social Security Number Due To Conscientious Reasons. OMB... Identification Number (PTIN) will have a social security number, which will be used to help establish their...

  16. 6 CFR 37.61 - Results of compliance determination.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Results of compliance determination. 37.61 Section 37.61 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Procedures for Determining State Compliance § 37.61 Results of compliance...

  17. 6 CFR 37.61 - Results of compliance determination.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Results of compliance determination. 37.61 Section 37.61 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Procedures for Determining State Compliance § 37.61 Results of compliance...

  18. 6 CFR 37.61 - Results of compliance determination.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Results of compliance determination. 37.61 Section 37.61 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Procedures for Determining State Compliance § 37.61 Results of compliance...

  19. 6 CFR 37.61 - Results of compliance determination.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Results of compliance determination. 37.61 Section 37.61 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Procedures for Determining State Compliance § 37.61 Results of compliance...

  20. 6 CFR 37.61 - Results of compliance determination.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Results of compliance determination. 37.61 Section 37.61 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Procedures for Determining State Compliance § 37.61 Results of compliance...

  1. Unprovable Security of Two-Message Zero Knowledge

    DTIC Science & Technology

    2012-12-19

    functions on NP-hardness. In STOC ’06, pages 701–710, 2006. 10 [BCC88] Gilles Brassard, David Chaum , and Claude Crépeau. Minimum disclosure proofs...security of several primitives (e.g., Schnorr’s identification scheme, commitment schemes secure under weak notions of selective open- ing, Chaum blind

  2. 49 CFR 172.802 - Components of a security plan.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... from origin to destination, including shipments stored incidental to movement. (b) The security plan must also include the following: (1) Identification by job title of the senior management official... business and must make the security plan available upon request, at a reasonable time and location, to an...

  3. 10 CFR 37.29 - Relief from fingerprinting, identification, and criminal history records checks and other...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... under 27 CFR part 555; (4) Health and Human Services security risk assessments for possession and use of...; (6) State Radiation Control Program Directors and State Homeland Security Advisors or their designated State employee representatives; (7) Agreement State employees conducting security inspections on...

  4. 39 CFR 491.4 - Identification of employees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... involved. Garnishment of an employee whose name and social security number is similar to but not identical with the name and social security number on the garnishment will not be processed. An exact match of both name and social security number is required in order to permit processing; otherwise, the...

  5. 33 CFR 187.101 - What information must be collected to identify a vessel owner?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... this section. (4) One of the following unique identifiers for each owner: (i) Social Security Number... the individual who signed the application for numbering: (i) Social Security Number (SSN) or..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) BOATING SAFETY VESSEL IDENTIFICATION SYSTEM Information to be...

  6. The Building Blocks of School Security.

    ERIC Educational Resources Information Center

    Funck, Gary

    1999-01-01

    Few schools command the funding to shift from zero security to updated closed-circuit TV systems. Cost-effective school security identification cards, which provide a rapid means of identifying those belonging on campus, can be integrated with administrative systems to track attendance, age, subject studied, and other vital statistics. (MLH)

  7. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Requirements for identification. 321.4 Section 321.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification. (a...

  8. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Requirements for identification. 321.4 Section 321.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification. (a...

  9. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Requirements for identification. 321.4 Section 321.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification. (a...

  10. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Requirements for identification. 321.4 Section 321.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification. (a...

  11. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Requirements for identification. 321.4 Section 321.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification. (a...

  12. 76 FR 7757 - Hull Identification Numbers for Recreational Vessels

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 181 [Docket No. USCG-2007-29236] Hull Identification Numbers for Recreational Vessels AGENCY: Coast Guard, DHS. ACTION: Follow-up to request for... expanded hull identification number (HIN). The Coast Guard's decision-making process included consideration...

  13. A forensic identification case and DPid - can it be a useful tool?

    PubMed

    Queiroz, Cristhiane Leão de; Bostock, Ellen Marie; Santos, Carlos Ferreira; Guimarães, Marco Aurélio; Silva, Ricardo Henrique Alves da

    2017-01-01

    The aim of this study was to show DPid as an important tool of potential application to solve cases with dental prosthesis, such as the forensic case reported, in which a skull, denture and dental records were received for analysis. Human identification is still challenging in various circumstances and Dental Prosthetics Identification (DPid) stores the patient's name and prosthesis information and provides access through an embedded code in dental prosthesis or an identification card. All of this information is digitally stored on servers accessible only by dentists, laboratory technicians and patients with their own level of secure access. DPid provides a complete single-source list of all dental prosthesis features (materials and components) under complete and secure documentation used for clinical follow-up and for human identification. If DPid tool was present in this forensic case, it could have been solved without requirement of DNA exam, which confirmed the dental comparison of antemortem and postmortem records, and concluded the case as a positive identification.

  14. Personal value preferences, group identifications, and cultural practices of Palestinian Israelis working in close contact with Jewish Israelis.

    PubMed

    Tartakovsky, Eugene; Abu Kheit, Ayat

    2017-01-01

    The present study investigates the connection between personal value preferences, group identifications, and cultural practices among Palestinian Israelis working in close contact with the Jewish population in Israel. One hundred twenty-two Palestinian Israelis participated in the study. The participants were employed in different professional positions in the Tel Aviv Metropolitan area and were recruited to the study using the snowball technique. A stronger national identification was associated with a higher preference for the security and conformity values, and a lower preference for the humility values. A stronger ethnic identification was associated with a lower preference for the security, power, and stimulation values. Group identifications mediated the connection between personal value preferences and cultural practices. A longer time working in close contact with the majority group and less frequent visits home were associated with a greater adherence to the majority group's cultural practices but not with adherence to the ethnic group's practices and not with the group identifications.

  15. 76 FR 33157 - Safety Zones; July 4th Fireworks Displays Within the Captain of the Port Miami Zone, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-08

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0439] RIN 1625-AA00 Safety Zones; July 4th Fireworks Displays Within the Captain of the Port Miami Zone, FL AGENCY...-0439 Safety Zones; July 4th Fireworks Displays within the Captain of the Port Miami Zone, FL. (a...

  16. Insider Alert 1.0 Beta Version

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abbott, Robert

    2004-02-01

    Insider Alert 1.0 Beta Version supports interactive selection and graphical display of data generated by the Sandia Cognitive Framework, which simulates the examination of security data by experts of various specialties. Insider Alert also encompasses the configuration and data files input to the Cognitive Framework for this application. Insider Alert 1.0 Beta Version is a computer program for analyzing data indicative of possible espionage or improper handling of data by employees at Sandia National Laboratories (or other facilities with comparable policies and procedures for managing sensitive information) It prioritizes and displays information for review by security analysts.

  17. CAS. Controlled Access Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  18. Baiting Inside Attackers using Decoy Documents

    DTIC Science & Technology

    2008-09-16

    viewed. Animated images allow the senders to monitor how long the message was displayed. The web bugs operate without alerting the user of the...Military Computer Security Policies”. IEEE Symposium on Security and Privacy, 1987. [5] Demers, A., Gehrke, J., Hong, M., Panda , B., Riedewald, M., Sharma

  19. QuickCash: Secure Transfer Payment Systems

    PubMed Central

    Alhothaily, Abdulrahman; Alrawais, Arwa; Song, Tianyi; Lin, Bin; Cheng, Xiuzhen

    2017-01-01

    Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users’ needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN). In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties. PMID:28608846

  20. QuickCash: Secure Transfer Payment Systems.

    PubMed

    Alhothaily, Abdulrahman; Alrawais, Arwa; Song, Tianyi; Lin, Bin; Cheng, Xiuzhen

    2017-06-13

    Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users' needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN). In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties.

  1. 41 CFR 109-38.5203 - Watercraft identification and numbers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... identification and numbers. 109-38.5203 Section 109-38.5203 Public Contracts and Property Management Federal... Watercraft identification and numbers. Watercraft in the custody of DOE or designated contractors shall display identifying numbers, whether issued by the U.S. Coast Guard, State, or local field organization...

  2. Identification and the Influence of Cultural Stereotyping on Postvideogame Play Hostility

    ERIC Educational Resources Information Center

    Eastin, Matthew S.; Appiah, Osei; Cicchirllo, Vincent

    2009-01-01

    The current study examines the impact of racial representation on character identification and postgame play hostility. Examining data from Black and White participants, results suggest that cueing racial attributes influences identification and elicits stereotyping and hostile outcomes. Specifically, White players displayed more hostile thoughts…

  3. Nuclear Security: Target Analysis-rev

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Singh, Surinder Paul; Gibbs, Philip W.; Bultz, Garl A.

    2014-03-01

    The objectives of this presentation are to understand target identification, including roll-up and protracted theft; evaluate target identification in the SNRI; recognize the target characteristics and consequence levels; and understand graded safeguards.

  4. 31 CFR 1023.220 - Customer identification programs for broker-dealers.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.220 Customer identification programs for broker-dealers. (a...

  5. 31 CFR 1023.220 - Customer identification programs for broker-dealers.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.220 Customer identification programs for broker-dealers. (a...

  6. 31 CFR 1023.220 - Customer identification programs for broker-dealers.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.220 Customer identification programs for broker-dealers. (a...

  7. 31 CFR 1023.220 - Customer identification programs for broker-dealers.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.220 Customer identification programs for broker-dealers. (a...

  8. 31 CFR 10.6 - Enrollment as an enrolled agent or enrolled retirement plan agent.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... or enrolled retirement plan agent's name, prior address, new address, social security number or tax... individuals licensed to practice before the Internal Revenue Service who have a social security number or tax... Internal Revenue Service who have a social security number or tax identification number that ends with the...

  9. The Legal Implications of Surveillance Cameras

    ERIC Educational Resources Information Center

    Steketee, Amy M.

    2012-01-01

    The nature of school security has changed dramatically over the last decade. Schools employ various measures, from metal detectors to identification badges to drug testing, to promote the safety and security of staff and students. One of the increasingly prevalent measures is the use of security cameras. In fact, the U.S. Department of Education…

  10. International Competitiveness: A National Security Perspective

    DTIC Science & Technology

    1989-06-01

    Maxwell AFB AL 36112-5532. International Competitiveness A National Security Perspective 0 C 0 Thank you for your assistance / , ’I RELSEARCJ RhINORT NO...AU-ARI-88-11 International Competitiveness A National Security Perspective RONALD H. DABROWSKI, Maj, USAF Research Fellow Airpower Research Institute...26 International Competition ......................... 26 Identification of Firms Involved ..................... 26 Continued Leadership in

  11. An Analysis of Open Source Security Software Products Downloads

    ERIC Educational Resources Information Center

    Barta, Brian J.

    2014-01-01

    Despite the continued demand for open source security software, a gap in the identification of success factors related to the success of open source security software persists. There are no studies that accurately assess the extent of this persistent gap, particularly with respect to the strength of the relationships of open source software…

  12. Minimum Requirements for Taxicab Security Cameras*

    PubMed Central

    Zeng, Shengke; Amandus, Harlan E.; Amendola, Alfred A.; Newbraugh, Bradley H.; Cantis, Douglas M.; Weaver, Darlene

    2015-01-01

    Problem The homicide rate of taxicab-industry is 20 times greater than that of all workers. A NIOSH study showed that cities with taxicab-security cameras experienced significant reduction in taxicab driver homicides. Methods Minimum technical requirements and a standard test protocol for taxicab-security cameras for effective taxicab-facial identification were determined. The study took more than 10,000 photographs of human-face charts in a simulated-taxicab with various photographic resolutions, dynamic ranges, lens-distortions, and motion-blurs in various light and cab-seat conditions. Thirteen volunteer photograph-evaluators evaluated these face photographs and voted for the minimum technical requirements for taxicab-security cameras. Results Five worst-case scenario photographic image quality thresholds were suggested: the resolution of XGA-format, highlight-dynamic-range of 1 EV, twilight-dynamic-range of 3.3 EV, lens-distortion of 30%, and shutter-speed of 1/30 second. Practical Applications These minimum requirements will help taxicab regulators and fleets to identify effective taxicab-security cameras, and help taxicab-security camera manufacturers to improve the camera facial identification capability. PMID:26823992

  13. Characterization of a genetically distinct subpopulation of Staphylococcus haemolyticus isolated from milk of cows with intramammary infections.

    PubMed

    Wanecka, Anna; Król, Jarosław; Twardoń, Jan; Mrowiec, Jacek; Bania, Jacek; Korzeniowska-Kowal, Agnieszka; Tobiasz, Anna

    2018-02-01

    The aim of this paper is to describe a novel subpopulation of Staphylococcus haemolyticus isolated from intramammary gland infections (IMI) in cattle. In total, eight isolates originating from milk samples from two unrelated dairy farms were examined phenotypically (using the ID 32 STAPH system) and genotypically. These isolates had almost identical sequences of each of the housekeeping genes examined (dnaJ, rpoB and sodA) but these sequences displayed similarity of only ∼92.5%, 95.0% and 96.8%, respectively, with known S. haemolyticus sequences. The atypical isolates could also be distinguished biochemically by the positive β-galactosidase test (with 2-naphthyl-β-d-galactopyranoside as the substrate). All the isolates were identified as S. haemolyticus upon MALDI-TOF analysis but half of them, that achieved scores 1.7-1.999 (not reliable species identification), required expanding the commercial database for secure identification. Our study has shown that IMI in cattle may be caused by two distinct subpopulations of S. haemolyticus, differing clearly by some genotypic and phenotypic properties. The first of these subpopulations seems to be common to many hosts (including humans), whereas the second (possibly at the subspecies rank) is, so far, found only in cattle. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. 19. SITE BUILDING 002 SCANNER BUILDING AIR POLICE ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. SITE BUILDING 002 - SCANNER BUILDING - AIR POLICE SITE SECURITY OFFICE WITH "SITE PERIMETER STATUS PANEL" AND REAL TIME VIDEO DISPLAY OUTPUT FROM VIDEO CAMERA SYSTEM AT SECURITY FENCE LOCATIONS. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA

  15. 24 CFR 5.212 - Compliance with the Privacy Act and other requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Verification of Social Security Numbers and Employer Identification Numbers; Procedures for Obtaining Income... SSNs and Employer Identification Numbers (EINs), and income information under this subpart shall be...

  16. 77 FR 59575 - Hull Identification Numbers for Recreational Vessels

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-28

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 181 [Docket No. USCG-2012-0843] Hull Identification Numbers for Recreational Vessels AGENCY: Coast Guard, DHS. ACTION: Request for public comments... requirement to indicate a boat's model year as part of the 12-character Hull Identification Number (HIN...

  17. 33 CFR 62.54 - Ownership identification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Section 62.54 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.54 Ownership identification. Ownership identification on private or state aids to navigation is permitted so long as it does...

  18. 33 CFR 62.54 - Ownership identification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Section 62.54 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.54 Ownership identification. Ownership identification on private or state aids to navigation is permitted so long as it does...

  19. 33 CFR 62.54 - Ownership identification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Section 62.54 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.54 Ownership identification. Ownership identification on private or state aids to navigation is permitted so long as it does...

  20. 33 CFR 62.54 - Ownership identification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Section 62.54 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.54 Ownership identification. Ownership identification on private or state aids to navigation is permitted so long as it does...

  1. 33 CFR 62.54 - Ownership identification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Section 62.54 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.54 Ownership identification. Ownership identification on private or state aids to navigation is permitted so long as it does...

  2. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Airport-approved and exclusive area personnel... AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.231 Airport-approved... carry out a personnel identification system for identification media that are airport-approved, or...

  3. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Airport-approved and exclusive area personnel... AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.231 Airport-approved... carry out a personnel identification system for identification media that are airport-approved, or...

  4. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Airport-approved and exclusive area personnel... AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.231 Airport-approved... carry out a personnel identification system for identification media that are airport-approved, or...

  5. We Are Not Numbers: The Use of Identification Codes in Online Learning

    ERIC Educational Resources Information Center

    Francis-Poscente, Krista; Moisey, Susan Darlene

    2012-01-01

    This paper discusses students' experiences with the use of identification codes in a graduate course delivered asynchronously via the Internet. While teaching an introductory masters level graduate course in distance learning, the authors discovered that the learning management system, Moodle, was programmed to display identification codes rather…

  6. Secure Display of Space-Exploration Images

    NASA Technical Reports Server (NTRS)

    Cheng, Cecilia; Thornhill, Gillian; McAuley, Michael

    2006-01-01

    Java EDR Display Interface (JEDI) is software for either local display or secure Internet distribution, to authorized clients, of image data acquired from cameras aboard spacecraft engaged in exploration of remote planets. ( EDR signifies experimental data record, which, in effect, signifies image data.) Processed at NASA s Multimission Image Processing Laboratory (MIPL), the data can be from either near-realtime processing streams or stored files. JEDI uses the Java Advanced Imaging application program interface, plus input/output packages that are parts of the Video Image Communication and Retrieval software of the MIPL, to display images. JEDI can be run as either a standalone application program or within a Web browser as a servlet with an applet front end. In either operating mode, JEDI communicates using the HTTP(s) protocol(s). In the Web-browser case, the user must provide a password to gain access. For each user and/or image data type, there is a configuration file, called a "personality file," containing parameters that control the layout of the displays and the information to be included in them. Once JEDI has accepted the user s password, it processes the requested EDR (provided that user is authorized to receive the specific EDR) to create a display according to the user s personality file.

  7. Digital security technology simplified.

    PubMed

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  8. Facial expressions of emotion (KDEF): identification under different display-duration conditions.

    PubMed

    Calvo, Manuel G; Lundqvist, Daniel

    2008-02-01

    Participants judged which of seven facial expressions (neutrality, happiness, anger, sadness, surprise, fear, and disgust) were displayed by a set of 280 faces corresponding to 20 female and 20 male models of the Karolinska Directed Emotional Faces database (Lundqvist, Flykt, & Ohman, 1998). Each face was presented under free-viewing conditions (to 63 participants) and also for 25, 50, 100, 250, and 500 msec (to 160 participants), to examine identification thresholds. Measures of identification accuracy, types of errors, and reaction times were obtained for each expression. In general, happy faces were identified more accurately, earlier, and faster than other faces, whereas judgments of fearful faces were the least accurate, the latest, and the slowest. Norms for each face and expression regarding level of identification accuracy, errors, and reaction times may be downloaded from www.psychonomic.org/archive/.

  9. 75 FR 35651 - Safety Zone; San Francisco Chronicle Fireworks Display, San Francisco, CA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-23

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG 2010-0367] Safety Zone; San Francisco Chronicle Fireworks Display, San Francisco, CA AGENCY: Coast Guard, DHS. ACTION: Notice of enforcement of regulation. SUMMARY: The Coast Guard will enforce the Independence Day...

  10. Quantum Biometrics with Retinal Photon Counting

    NASA Astrophysics Data System (ADS)

    Loulakis, M.; Blatsios, G.; Vrettou, C. S.; Kominis, I. K.

    2017-10-01

    It is known that the eye's scotopic photodetectors, rhodopsin molecules, and their associated phototransduction mechanism leading to light perception, are efficient single-photon counters. We here use the photon-counting principles of human rod vision to propose a secure quantum biometric identification based on the quantum-statistical properties of retinal photon detection. The photon path along the human eye until its detection by rod cells is modeled as a filter having a specific transmission coefficient. Precisely determining its value from the photodetection statistics registered by the conscious observer is a quantum parameter estimation problem that leads to a quantum secure identification method. The probabilities for false-positive and false-negative identification of this biometric technique can readily approach 10-10 and 10-4, respectively. The security of the biometric method can be further quantified by the physics of quantum measurements. An impostor must be able to perform quantum thermometry and quantum magnetometry with energy resolution better than 10-9ℏ , in order to foil the device by noninvasively monitoring the biometric activity of a user.

  11. Speaker identification for the improvement of the security communication between law enforcement units

    NASA Astrophysics Data System (ADS)

    Tovarek, Jaromir; Partila, Pavol

    2017-05-01

    This article discusses the speaker identification for the improvement of the security communication between law enforcement units. The main task of this research was to develop the text-independent speaker identification system which can be used for real-time recognition. This system is designed for identification in the open set. It means that the unknown speaker can be anyone. Communication itself is secured, but we have to check the authorization of the communication parties. We have to decide if the unknown speaker is the authorized for the given action. The calls are recorded by IP telephony server and then these recordings are evaluate using classification If the system evaluates that the speaker is not authorized, it sends a warning message to the administrator. This message can detect, for example a stolen phone or other unusual situation. The administrator then performs the appropriate actions. Our novel proposal system uses multilayer neural network for classification and it consists of three layers (input layer, hidden layer, and output layer). A number of neurons in input layer corresponds with the length of speech features. Output layer then represents classified speakers. Artificial Neural Network classifies speech signal frame by frame, but the final decision is done over the complete record. This rule substantially increases accuracy of the classification. Input data for the neural network are a thirteen Mel-frequency cepstral coefficients, which describe the behavior of the vocal tract. These parameters are the most used for speaker recognition. Parameters for training, testing and validation were extracted from recordings of authorized users. Recording conditions for training data correspond with the real traffic of the system (sampling frequency, bit rate). The main benefit of the research is the system developed for text-independent speaker identification which is applied to secure communication between law enforcement units.

  12. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    PubMed

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

  13. 42 CFR 37.60 - Submitting required chest radiograph classification and miner identification documents.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... software and format specified by NIOSH either using portable electronic media, or a secure electronic file... forms shall be submitted with his or her name and social security account number on each. If any of the... containing the miner's name, address, social security number and place of employment. [43 FR 33715, Aug. 1...

  14. 42 CFR 37.60 - Submitting required chest roentgenograms and miner identification documents.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... format specified by NIOSH either using portable electronic media, or a secure electronic file transfer... forms shall be submitted with his or her name and social security account number on each. If any of the... containing the miner's name, address, social security number and place of employment. [43 FR 33715, Aug. 1...

  15. Teaching Case: IS Security Requirements Identification from Conceptual Models in Systems Analysis and Design: The Fun & Fitness, Inc. Case

    ERIC Educational Resources Information Center

    Spears, Janine L.; Parrish, James L., Jr.

    2013-01-01

    This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…

  16. Nonimmigrant Overstays: Brief Synthesis of the Issue

    DTIC Science & Technology

    2010-01-15

    finger biometric system for immigration identification17 to the major identity management and screening... finger scans and digital photographs) to check identity. Enhanced Border Security and Visa Entry Reform Act of 2002 The Enhanced Border Security ...further provides: “A determination by the Secretary of Homeland Security that an alien who applied for authorization to travel to the United States

  17. On the Horizon: New Advances in Security Technology

    ERIC Educational Resources Information Center

    Gamble, Cheryl

    2005-01-01

    The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…

  18. 7 CFR 54.18 - Custody of identification devices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... provide a metal cabinet(s) or locker(s) for the secure storage of official meat grading equipment and identification devices for each Federal meat grader assigned to their establishment. Such cabinet(s) or locker(s...

  19. 7 CFR 54.18 - Custody of identification devices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... provide a metal cabinet(s) or locker(s) for the secure storage of official meat grading equipment and identification devices for each Federal meat grader assigned to their establishment. Such cabinet(s) or locker(s...

  20. 7 CFR 54.18 - Custody of identification devices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... provide a metal cabinet(s) or locker(s) for the secure storage of official meat grading equipment and identification devices for each Federal meat grader assigned to their establishment. Such cabinet(s) or locker(s...

  1. 7 CFR 54.18 - Custody of identification devices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... provide a metal cabinet(s) or locker(s) for the secure storage of official meat grading equipment and identification devices for each Federal meat grader assigned to their establishment. Such cabinet(s) or locker(s...

  2. 7 CFR 54.18 - Custody of identification devices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... provide a metal cabinet(s) or locker(s) for the secure storage of official meat grading equipment and identification devices for each Federal meat grader assigned to their establishment. Such cabinet(s) or locker(s...

  3. 77 FR 20889 - Proposed Information Collection (Request One-VA Identification Verification Card) Activity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-06

    ... solicits comments on information needed to issue a Personal Identity Verification (PIV) identification card... Personnel Security and Identity Management (07C), Department of Veterans Affairs, 810 Vermont Avenue NW...

  4. A human performance evaluation of graphic symbol-design features.

    PubMed

    Samet, M G; Geiselman, R E; Landee, B M

    1982-06-01

    16 subjects learned each of two tactical display symbol sets (conventional symbols and iconic symbols) in turn and were then shown a series of graphic displays containing various symbol configurations. For each display, the subject was asked questions corresponding to different behavioral processes relating to symbol use (identification, search, comparison, pattern recognition). The results indicated that: (a) conventional symbols yielded faster pattern-recognition performance than iconic symbols, and iconic symbols did not yield faster identification than conventional symbols, and (b) the portrayal of additional feature information (through the use of perimeter density or vector projection coding) slowed processing of the core symbol information in four tasks, but certain symbol-design features created less perceptual interference and had greater correspondence with the portrayal of specific tactical concepts than others. The results were discussed in terms of the complexities involved in the selection of symbol design features for use in graphic tactical displays.

  5. The signer and the sign: cortical correlates of person identity and language processing from point-light displays.

    PubMed

    Campbell, Ruth; Capek, Cheryl M; Gazarian, Karine; MacSweeney, Mairéad; Woll, Bencie; David, Anthony S; McGuire, Philip K; Brammer, Michael J

    2011-09-01

    In this study, the first to explore the cortical correlates of signed language (SL) processing under point-light display conditions, the observer identified either a signer or a lexical sign from a display in which different signers were seen producing a number of different individual signs. Many of the regions activated by point-light under these conditions replicated those previously reported for full-image displays, including regions within the inferior temporal cortex that are specialised for face and body-part identification, although such body parts were invisible in the display. Right frontal regions were also recruited - a pattern not usually seen in full-image SL processing. This activation may reflect the recruitment of information about person identity from the reduced display. A direct comparison of identify-signer and identify-sign conditions showed these tasks relied to a different extent on the posterior inferior regions. Signer identification elicited greater activation than sign identification in (bilateral) inferior temporal gyri (BA 37/19), fusiform gyri (BA 37), middle and posterior portions of the middle temporal gyri (BAs 37 and 19), and superior temporal gyri (BA 22 and 42). Right inferior frontal cortex was a further focus of differential activation (signer>sign). These findings suggest that the neural systems supporting point-light displays for the processing of SL rely on a cortical network including areas of the inferior temporal cortex specialized for face and body identification. While this might be predicted from other studies of whole body point-light actions (Vaina, Solomon, Chowdhury, Sinha, & Belliveau, 2001) it is not predicted from the perspective of spoken language processing, where voice characteristics and speech content recruit distinct cortical regions (Stevens, 2004) in addition to a common network. In this respect, our findings contrast with studies of voice/speech recognition (Von Kriegstein, Kleinschmidt, Sterzer, & Giraud, 2005). Inferior temporal regions associated with the visual recognition of a person appear to be required during SL processing, for both carrier and content information. Crown Copyright © 2011. Published by Elsevier Ltd. All rights reserved.

  6. 8 CFR 252.4 - Permanent landing permit and identification card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Permanent landing permit and identification card. 252.4 Section 252.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS LANDING OF ALIEN CREWMEN § 252.4 Permanent landing permit and identification card. A Form I-184 is...

  7. 76 FR 5843 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing and Order Granting...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-02

    ... release of the White Paper, DTC customers requested a tool that would help measure the impact of the... corresponding CUSIP-level identification information at 8:20 a.m.; and (3) make other conforming changes. II... on Uniform Security Identification Procedures (``CUSIP'') level identification information about the...

  8. Retinal identification based on an Improved Circular Gabor Filter and Scale Invariant Feature Transform.

    PubMed

    Meng, Xianjing; Yin, Yilong; Yang, Gongping; Xi, Xiaoming

    2013-07-18

    Retinal identification based on retinal vasculatures in the retina provides the most secure and accurate means of authentication among biometrics and has primarily been used in combination with access control systems at high security facilities. Recently, there has been much interest in retina identification. As digital retina images always suffer from deformations, the Scale Invariant Feature Transform (SIFT), which is known for its distinctiveness and invariance for scale and rotation, has been introduced to retinal based identification. However, some shortcomings like the difficulty of feature extraction and mismatching exist in SIFT-based identification. To solve these problems, a novel preprocessing method based on the Improved Circular Gabor Transform (ICGF) is proposed. After further processing by the iterated spatial anisotropic smooth method, the number of uninformative SIFT keypoints is decreased dramatically. Tested on the VARIA and eight simulated retina databases combining rotation and scaling, the developed method presents promising results and shows robustness to rotations and scale changes.

  9. Retinal Identification Based on an Improved Circular Gabor Filter and Scale Invariant Feature Transform

    PubMed Central

    Meng, Xianjing; Yin, Yilong; Yang, Gongping; Xi, Xiaoming

    2013-01-01

    Retinal identification based on retinal vasculatures in the retina provides the most secure and accurate means of authentication among biometrics and has primarily been used in combination with access control systems at high security facilities. Recently, there has been much interest in retina identification. As digital retina images always suffer from deformations, the Scale Invariant Feature Transform (SIFT), which is known for its distinctiveness and invariance for scale and rotation, has been introduced to retinal based identification. However, some shortcomings like the difficulty of feature extraction and mismatching exist in SIFT-based identification. To solve these problems, a novel preprocessing method based on the Improved Circular Gabor Transform (ICGF) is proposed. After further processing by the iterated spatial anisotropic smooth method, the number of uninformative SIFT keypoints is decreased dramatically. Tested on the VARIA and eight simulated retina databases combining rotation and scaling, the developed method presents promising results and shows robustness to rotations and scale changes. PMID:23873409

  10. Optical/digital identification/verification system based on digital watermarking technology

    NASA Astrophysics Data System (ADS)

    Herrigel, Alexander; Voloshynovskiy, Sviatoslav V.; Hrytskiv, Zenon D.

    2000-06-01

    This paper presents a new approach for the secure integrity verification of driver licenses, passports or other analogue identification documents. The system embeds (detects) the reference number of the identification document with the DCT watermark technology in (from) the owner photo of the identification document holder. During verification the reference number is extracted and compared with the reference number printed in the identification document. The approach combines optical and digital image processing techniques. The detection system must be able to scan an analogue driver license or passport, convert the image of this document into a digital representation and then apply the watermark verification algorithm to check the payload of the embedded watermark. If the payload of the watermark is identical with the printed visual reference number of the issuer, the verification was successful and the passport or driver license has not been modified. This approach constitutes a new class of application for the watermark technology, which was originally targeted for the copyright protection of digital multimedia data. The presented approach substantially increases the security of the analogue identification documents applied in many European countries.

  11. A forensic identification case and DPid - can it be a useful tool?

    PubMed Central

    de QUEIROZ, Cristhiane Leão; BOSTOCK, Ellen Marie; SANTOS, Carlos Ferreira; GUIMARÃES, Marco Aurélio; da SILVA, Ricardo Henrique Alves

    2017-01-01

    Abstract Objective The aim of this study was to show DPid as an important tool of potential application to solve cases with dental prosthesis, such as the forensic case reported, in which a skull, denture and dental records were received for analysis. Material and Methods Human identification is still challenging in various circumstances and Dental Prosthetics Identification (DPid) stores the patient’s name and prosthesis information and provides access through an embedded code in dental prosthesis or an identification card. All of this information is digitally stored on servers accessible only by dentists, laboratory technicians and patients with their own level of secure access. DPid provides a complete single-source list of all dental prosthesis features (materials and components) under complete and secure documentation used for clinical follow-up and for human identification. Results and Conclusion If DPid tool was present in this forensic case, it could have been solved without requirement of DNA exam, which confirmed the dental comparison of antemortem and postmortem records, and concluded the case as a positive identification. PMID:28678955

  12. Literal readout of identification signals in Morse code

    NASA Technical Reports Server (NTRS)

    Meissner, C. W., Jr.

    1969-01-01

    Instrument, designed for mounting in aircraft instrument panels, decodes identification signals received in Morse from VOR or ILS transmitters as they are received and displays the literal equivalent. Without elaboration it cannot decode numbers.

  13. Secure Fingerprint Identification of High Accuracy

    DTIC Science & Technology

    2014-01-01

    secure ) solution of complexity O(n3) based on Gaussian elimination. When it is applied to biometrics X and Y with mX and mY minutiae, respectively...collections of biometric data in use today include, for example, fingerprint, face, and iris images collected by the US Department of Homeland Security ...work we focus on fingerprint data due to popularity and good accuracy of this type of biometry. We formulate the problem of private, or secure , finger

  14. Police witness identification images: a geometric morphometric analysis.

    PubMed

    Hayes, Susan; Tullberg, Cameron

    2012-11-01

    Research into witness identification images typically occurs within the laboratory and involves subjective likeness and recognizability judgments. This study analyzed whether actual witness identification images systematically alter the facial shapes of the suspects described. The shape analysis tool, geometric morphometrics, was applied to 46 homologous facial landmarks displayed on 50 witness identification images and their corresponding arrest photographs, using principal component analysis and multivariate regressions. The results indicate that compared with arrest photographs, witness identification images systematically depict suspects with lowered and medially located eyebrows (p = <0.000001). This was found to occur independently of the Police Artist, and did not occur with composites produced under laboratory conditions. There are several possible explanations for this finding, including any, or all, of the following: The suspect was frowning at the time of the incident, the witness had negative feelings toward the suspect, this is an effect of unfamiliar face processing, the suspect displayed fear at the time of their arrest photograph. © 2012 American Academy of Forensic Sciences.

  15. Final Report: Computer-aided Human Centric Cyber Situation Awareness

    DTIC Science & Technology

    2016-03-20

    logs, OS audit trails, vulnerability reports, and packet dumps ), weeding out the false positives, grouping the related indicators so that different...short time duration of each visual stimulus in an fMRI study, we have designed “network security analysis cards ” that require the subject to...determine whether alerts in the cards indicate malicious events. Two types of visual displays of alerts (i.e., tabular display and node-link display) are

  16. 33 CFR 160.310 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ....310 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND... credential; (5) Transportation Worker Identification Credential (TWIC) issued by the Transportation Security... authority of the government of a country that has ratified the International Labour Organization Seafarers...

  17. Identification of pleasant, neutral, and unpleasant odors in schizophrenia

    PubMed Central

    Kamath, Vidyulata; Turetsky, Bruce I.; Moberg, Paul J.

    2010-01-01

    Recent work on odor hedonics in schizophrenia has indicated that patients display abnormalities in hedonic judgments of odors in comparison to healthy comparison participants. In the current study, identification accuracy for pleasant, neutral, and unpleasant odors in individuals with schizophrenia and healthy controls was examined. Thirty-three schizophrenia patients (63% male) and thirty-one healthy volunteers (65% male) were recruited. The groups were well matched on age, sex, and smoking status. Participants were administered the University of Pennsylvania Smell Identification Test, which was subsequently divided into 16 pleasant, 15 neutral, and 9 unpleasant items. Analysis of identification z-scores for pleasant, neutral, and unpleasant odors revealed a significant diagnosis by valence interaction. Post-hoc analysis revealed that schizophrenia participants made more identification errors on pleasant and neutral odors compared to healthy controls, with no differences observed for unpleasant odors. No effect was seen for sex. The findings from the current investigation suggest that odor identification accuracy in patients is influenced by odor valence. This pattern of results parallels a growing body of literature indicating that patients display aberrant pleasantness ratings for pleasant odors and highlights the need for additional research on the influence of odor valence on olfactory identification performance in individuals with schizophrenia. PMID:21239063

  18. [The state legal and expert identification aspects of protecting the right of the person for citizens of the Russian Federation].

    PubMed

    Bykov, I Iu; Kolkutin, V V; Tolmachev, I A; Dmitriev, E G

    2000-04-01

    The article deals with the questions concerning the problem of person identification, different extreme situations. This problem is closely connected with ensuring of national security of Russia. The authors give the definition of person's right in contact with constant threat to violate this right. Two categories of person's properties are analysed (material and not material) with the help of which it is possible to establish identity of man and his personality. It is noted that protection of person's rights is carried out in six forms. For the first time the possibilities to create organisational system of person identification in the form of Federal service are discussed that must be legislatively secured. Scientific investigation of this problem allowed the authors to submit concrete proposals concerning the question of organisation of state service for person identification.

  19. 49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... screening technologies that the facility is authorized to use. These include: (i) The ability to operate x-ray equipment and to distinguish on the x-ray monitor the appropriate imaging standard specified in the certified cargo screening facility security program. Wherever the x-ray system displays colors...

  20. Effects of manifest ethnic identification on employment discrimination.

    PubMed

    Barron, Laura G; Hebl, Michelle; King, Eden B

    2011-01-01

    Evidence from recent laboratory experiments suggests that ethnic identification can lead to negative evaluations of ethnic minorities (Kaiser & Pratt-Hyatt, 2009). The current research considers the generalizability of these findings to face-to-face interactions in contexts wherein impression management concerns are salient: the workplace hiring process. In a field experiment, Black, Hispanic, and Irish individuals applied for retail jobs with or without visible display of their ethnic identification. Analysis of indicators of formal (e.g., application offering, interview scheduling) and interpersonal discrimination (e.g., interaction length, nonverbal negativity) suggest store personnel interacting with other-race applicants exhibited greater positivity and longer interactions when applicants displayed ethnic identification than when they did not. The findings suggest that psychologists need to understand not only attitudes or intentions expressed in the lab, but also the behavioral consequences of manifest group identity as they unfold in natural environments.

  1. 48 CFR 203.1004 - Contract clauses.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., use the clause at 252.203-7004, Display of Fraud Hotline Poster(s), in lieu of the clause at FAR 52.203-14, Display of Hotline Poster(s). If the Department of Homeland Security (DHS) provides disaster... hotline poster. [73 FR 46815, Aug. 12, 2008, as amended at 74 FR 53413, October 19, 2009; 75 FR 59101...

  2. 48 CFR 203.1004 - Contract clauses.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., use the clause at 252.203-7004, Display of Fraud Hotline Poster(s), in lieu of the clause at FAR 52.203-14, Display of Hotline Poster(s). If the Department of Homeland Security (DHS) provides disaster... hotline poster. [73 FR 46815, Aug. 12, 2008, as amended at 74 FR 53413, October 19, 2009; 75 FR 59101...

  3. 8 CFR 299.5 - Display of control numbers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false Display of control numbers. 299.5 Section 299.5 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS IMMIGRATION FORMS... OMB Control No. AR-11 Alien's Change of Address Card 1115-0003 G-79A Data Relating to Beneficiary of...

  4. 46 CFR 35.10-3 - Display of plans-TB/ALL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... charge of the vessel the following plans: (a) General arrangement plans showing for each deck the fire... 46 Shipping 1 2012-10-01 2012-10-01 false Display of plans-TB/ALL. 35.10-3 Section 35.10-3 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS OPERATIONS Fire and Emergency...

  5. 46 CFR 35.10-3 - Display of plans-TB/ALL.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... charge of the vessel the following plans: (a) General arrangement plans showing for each deck the fire... 46 Shipping 1 2013-10-01 2013-10-01 false Display of plans-TB/ALL. 35.10-3 Section 35.10-3 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS OPERATIONS Fire and Emergency...

  6. 46 CFR 35.10-3 - Display of plans-TB/ALL.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... charge of the vessel the following plans: (a) General arrangement plans showing for each deck the fire... 46 Shipping 1 2014-10-01 2014-10-01 false Display of plans-TB/ALL. 35.10-3 Section 35.10-3 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS OPERATIONS Fire and Emergency...

  7. 46 CFR 35.10-3 - Display of plans-TB/ALL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... charge of the vessel the following plans: (a) General arrangement plans showing for each deck the fire... 46 Shipping 1 2011-10-01 2011-10-01 false Display of plans-TB/ALL. 35.10-3 Section 35.10-3 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS OPERATIONS Fire and Emergency...

  8. Securing recipiency in workplace meetings: Multimodal practices

    PubMed Central

    Ford, Cecilia E.; Stickle, Trini

    2013-01-01

    As multiparty interactions with single courses of coordinated action, workplace meetings place particular interactional demands on participants who are not primary speakers (e.g. not chairs) as they work to initiate turns and to interactively coordinate with displays of recipiency from co-participants. Drawing from a corpus of 26 hours of videotaped workplace meetings in a midsized US city, this article reports on multimodal practices – phonetic, prosodic, and bodily-visual – used for coordinating turn transition and for consolidating recipiency in these specialized speech exchange systems. Practices used by self-selecting non-primary speakers as they secure turns in meetings include displays of close monitoring of current speakers’ emerging turn structure, displays of heightened interest as current turns approach possible completion, and turn initiation practices designed to pursue and, in a fine-tuned manner, coordinate with displays of recipiency on the parts of other participants as well as from reflexively constructed ‘target’ recipients. By attending to bodily-visual action, as well as phonetics and prosody, this study contributes to expanding accounts for turn taking beyond traditional word-based grammar (i.e. lexicon and syntax). PMID:24976789

  9. 48 CFR 252.211-7007 - Reporting of Government-Furnished Equipment in the DoD Item Unique Identification (IUID) Registry.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... means an item potentially dangerous to public safety or security if stolen, lost, or misplaced, or that shall be subject to exceptional physical security, protection, control, and accountability. Examples...

  10. 75 FR 74019 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-30

    ... storage media. Retrievability: Information is retrieved by individual's name, Social Security Number (SSN... ``Records include individual's name, Social Security Number (SSN); employee identification number....'' * * * * * Storage: Delete entry and replace with ``Paper records in file folders and electronic storage media...

  11. Applications of yeast surface display for protein engineering

    PubMed Central

    Cherf, Gerald M.; Cochran, Jennifer R.

    2015-01-01

    The method of displaying recombinant proteins on the surface of Saccharomyces cerevisiae via genetic fusion to an abundant cell wall protein, a technology known as yeast surface display, or simply, yeast display, has become a valuable protein engineering tool for a broad spectrum of biotechnology and biomedical applications. This review focuses on the use of yeast display for engineering protein affinity, stability, and enzymatic activity. Strategies and examples for each protein engineering goal are discussed. Additional applications of yeast display are also briefly presented, including protein epitope mapping, identification of protein-protein interactions, and uses of displayed proteins in industry and medicine. PMID:26060074

  12. Chirality transfer technique between liquid crystal microdroplets using microfluidic systems

    NASA Astrophysics Data System (ADS)

    Guo, Jin-kun; Lee, Doyeon; Song, Jang-kun

    2018-02-01

    Cholesteric liquid crystal (LC) microdroplet is applied in many areas, such as tunable laser, biosensor, information display and security identification, due to its unique optical properties. The topological structure, defects, and photonic crystallinity in the cholesteric liquid crystal (LC) microdroplet can be controlled through the chirality. Here we report an interesting phenomenon that chirality information can be shared among dispersed LC microdroplets in surfactant aqueous solution, which is driven by the transferring of chiral dopant molecules. As a result, we developed an artificial molecule transfer technology which could in situ vary the material composition within the isolated dispersed microdroplets. The molecular transfer is switchable and the transfer speed is controllable by tuning the molecular solubility in continuous phase. Based on this technique, we manipulated, forward and backward, the topological evolution and the photonic crystal band-gap of the dispersed LC droplet. This technique is an easy and powerful experimental tool, and it may be applicable to other fields in optical application, biology, chemistry and material science.

  13. Approximation in Optimal Control and Identification of Large Space Structures.

    DTIC Science & Technology

    1985-01-01

    I ease I Cr ’. ’. -4 . r*_...1- UN(D aSIFIED SECURITY CLAS.’ICATION OF fHIS P^.GE REPORT DOCUMENTATION PAGE 1 REPORT SECURITY CLASSIFICATION 1...RESTRICTIVE MARKINGS UNCLASSIFIED 2 SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/AVAILABILITY OF REPORT Approved for public release; distribution 2b...NOS. PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. NO Bolling AFB DC 20332-6448 61102F 2304 Al 11. TITLE IlnRCiude Security Claas.ifcation

  14. 78 FR 17781 - Transportation Worker Identification Credential (TWIC)-Reader Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-22

    ...In this Notice of Proposed Rulemaking (NPRM), the Coast Guard proposes to require owners and operators of certain vessels and facilities regulated by the Coast Guard to use electronic readers designed to work with the Transportation Worker Identification Credential (TWIC) as an access control measure. This NPRM also proposes additional requirements associated with electronic TWIC readers, including recordkeeping requirements for those owners and operators required to use an electronic TWIC reader, and security plan amendments to incorporate TWIC requirements. The TWIC program, including the proposed TWIC reader requirements in this rule, is an important component of the Coast Guard's multi-layered system of access control requirements and other measures designed to enhance maritime security. This rulemaking action, once final, would build upon existing Coast Guard regulations designed to ensure that only individuals who hold a TWIC are granted unescorted access to secure areas at those locations. The Coast Guard has already promulgated regulations pursuant to the Maritime Transportation Security Act of 2002 (MTSA) that require mariners and other individuals to obtain a TWIC and present it for inspection by security personnel prior to gaining access to such secure areas. By requiring certain vessels and facilities to perform TWIC inspections using electronic TWIC readers, this rulemaking would further enhance security at those locations. This rulemaking would also implement the Security and Accountability For Every Port Act of 2006 electronic TWIC reader requirements.

  15. 19 CFR 191.14 - Identification of merchandise or articles by accounting method.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 2 2011-04-01 2011-04-01 false Identification of merchandise or articles by accounting method. 191.14 Section 191.14 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) DRAWBACK General Provisions § 191.14 Identification of merchandise or articles by...

  16. 19 CFR 191.14 - Identification of merchandise or articles by accounting method.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 2 2014-04-01 2014-04-01 false Identification of merchandise or articles by accounting method. 191.14 Section 191.14 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) DRAWBACK General Provisions § 191.14 Identification of merchandise or articles by...

  17. 19 CFR 191.14 - Identification of merchandise or articles by accounting method.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 2 2013-04-01 2013-04-01 false Identification of merchandise or articles by accounting method. 191.14 Section 191.14 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) DRAWBACK General Provisions § 191.14 Identification of merchandise or articles by...

  18. 19 CFR 191.14 - Identification of merchandise or articles by accounting method.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 2 2012-04-01 2012-04-01 false Identification of merchandise or articles by accounting method. 191.14 Section 191.14 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) DRAWBACK General Provisions § 191.14 Identification of merchandise or articles by...

  19. 40 CFR 16.4 - Times, places, and requirements for identification of individuals making requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... identification (e.g., driver's license, employee identification card, social security card, or credit card) to... declaring his or her identity and stipulating that he or she understands it is a misdemeanor punishable by... copy of the requested record. (e) No verification of identity will be required where the records sought...

  20. Identification of handheld objects for electro-optic/FLIR applications

    NASA Astrophysics Data System (ADS)

    Moyer, Steve K.; Flug, Eric; Edwards, Timothy C.; Krapels, Keith A.; Scarbrough, John

    2004-08-01

    This paper describes research on the determination of the fifty-percent probability of identification cycle criterion (N50) for two sets of handheld objects. The first set consists of 12 objects which are commonly held in a single hand. The second set consists of 10 objects commonly held in both hands. These sets consist of not only typical civilian handheld objects but also objects that are potentially lethal. A pistol, a cell phone, a rocket propelled grenade (RPG) launcher, and a broom are examples of the objects in these sets. The discrimination of these objects is an inherent part of homeland security, force protection, and also general population security. Objects were imaged from each set in the visible and mid-wave infrared (MWIR) spectrum. Various levels of blur are then applied to these images. These blurred images were then used in a forced choice perception experiment. Results were analyzed as a function of blur level and target size to give identification probability as a function of resolvable cycles on target. These results are applicable to handheld object target acquisition estimates for visible imaging systems and MWIR systems. This research provides guidance in the design and analysis of electro-optical systems and forward-looking infrared (FLIR) systems for use in homeland security, force protection, and also general population security.

  1. Building Better Armies: An Insider’s Account of Liberia

    DTIC Science & Technology

    2013-11-01

    penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE NOV 2013 2... inform different ideas about security may not easily translate into a coherent and actionable national se- curity strategy. The human security perspective...and relevance, and by support- 17 ing the creation of a balanced and effective security sector, informed by a clear understanding of its objec- tives

  2. Institutionalizing Sustainability into the Total Army

    DTIC Science & Technology

    2008-03-14

    unsustainable world in which we live has an impact on our national security. Today it is clear that linkages between the environment and security are powerful...U.S. national security interests…” 31 The world is in an unsustainable state as it continues to incur a vast water deficit by consuming water belonging...any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a

  3. Prospects of Biometrics at-a-Distance

    DTIC Science & Technology

    2015-09-01

    PHI Protected Health Information RFID Radio-Frequency Identification SAF Small Arms Fire SEEK Secure Electronic Enrollment Kit SFPD San...data to be encoded. It also contains a Radio-Frequency Identification ( RFID ) readers and the capability to verify electronic passports and other

  4. The Numbers Game: A Values Clarification Strategy

    ERIC Educational Resources Information Center

    Ognibene, Richard; Winter, Cynthia

    1976-01-01

    After completing personal identification forms consisting only of numbers (phone number, Social Security number, etc.), students discuss the need for more personal means of identification within society in order for people to feel a useful sense of identity. (AV)

  5. Identification and Characterization of Two Novel RNA Viruses from Anopheles gambiae Species Complex Mosquitoes

    PubMed Central

    Carissimo, Guillaume; Eiglmeier, Karin; Reveillaud, Julie; Holm, Inge; Diallo, Mawlouth; Diallo, Diawo; Vantaux, Amélie; Kim, Saorin; Ménard, Didier; Siv, Sovannaroth; Belda, Eugeni; Bischoff, Emmanuel; Antoniewski, Christophe; Vernick, Kenneth D.

    2016-01-01

    Mosquitoes of the Anopheles gambiae complex display strong preference for human bloodmeals and are major malaria vectors in Africa. However, their interaction with viruses or role in arbovirus transmission during epidemics has been little examined, with the exception of O’nyong-nyong virus, closely related to Chikungunya virus. Deep-sequencing has revealed different RNA viruses in natural insect viromes, but none have been previously described in the Anopheles gambiae species complex. Here, we describe two novel insect RNA viruses, a Dicistrovirus and a Cypovirus, found in laboratory colonies of An. gambiae taxa using small-RNA deep sequencing. Sequence analysis was done with Metavisitor, an open-source bioinformatic pipeline for virus discovery and de novo genome assembly. Wild-collected Anopheles from Senegal and Cambodia were positive for the Dicistrovirus and Cypovirus, displaying high sequence identity to the laboratory-derived virus. Thus, the Dicistrovirus (Anopheles C virus, AnCV) and Cypovirus (Anopheles Cypovirus, AnCPV) are components of the natural virome of at least some anopheline species. Their possible influence on mosquito immunity or transmission of other pathogens is unknown. These natural viruses could be developed as models for the study of Anopheles-RNA virus interactions in low security laboratory settings, in an analogous manner to the use of rodent malaria parasites for studies of mosquito anti-parasite immunity. PMID:27138938

  6. A MEMS-based, wireless, biometric-like security system

    NASA Astrophysics Data System (ADS)

    Cross, Joshua D.; Schneiter, John L.; Leiby, Grant A.; McCarter, Steven; Smith, Jeremiah; Budka, Thomas P.

    2010-04-01

    We present a system for secure identification applications that is based upon biometric-like MEMS chips. The MEMS chips have unique frequency signatures resulting from fabrication process variations. The MEMS chips possess something analogous to a "voiceprint". The chips are vacuum encapsulated, rugged, and suitable for low-cost, highvolume mass production. Furthermore, the fabrication process is fully integrated with standard CMOS fabrication methods. One is able to operate the MEMS-based identification system similarly to a conventional RFID system: the reader (essentially a custom network analyzer) detects the power reflected across a frequency spectrum from a MEMS chip in its vicinity. We demonstrate prototype "tags" - MEMS chips placed on a credit card-like substrate - to show how the system could be used in standard identification or authentication applications. We have integrated power scavenging to provide DC bias for the MEMS chips through the use of a 915 MHz source in the reader and a RF-DC conversion circuit on the tag. The system enables a high level of protection against typical RFID hacking attacks. There is no need for signal encryption, so back-end infrastructure is minimal. We believe this system would make a viable low-cost, high-security system for a variety of identification and authentication applications.

  7. 77 FR 26254 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-03

    ... media. Retrievability: By name, Social Security Number (SSN), employee identification number, or... General. Categories of records in the system: Individual's name, Social Security Number (SSN), employee... erasure or destruction of magnetic media. System manager(s) and address: Inspector General, National...

  8. 45 CFR 164.312 - Technical safeguards.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... that maintain electronic protected health information to allow access only to those persons or software... specifications: (i) Unique user identification (Required). Assign a unique name and/or number for identifying and...

  9. Online fingerprint verification.

    PubMed

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.

  10. 14 CFR 45.23 - Display of marks; general.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... letter “N” (denoting United States registration) followed by the registration number of the aircraft....23 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT IDENTIFICATION AND REGISTRATION MARKING Nationality and Registration Marks § 45.23 Display of marks; general. (a...

  11. 14 CFR 45.23 - Display of marks; general.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... letter “N” (denoting United States registration) followed by the registration number of the aircraft....23 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT IDENTIFICATION AND REGISTRATION MARKING Nationality and Registration Marks § 45.23 Display of marks; general. (a...

  12. 14 CFR 45.23 - Display of marks; general.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... “N” (denoting United States registration) followed by the registration number of the aircraft. Each....23 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT IDENTIFICATION AND REGISTRATION MARKING Nationality and Registration Marks § 45.23 Display of marks; general. (a...

  13. 14 CFR 45.23 - Display of marks; general.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... “N” (denoting United States registration) followed by the registration number of the aircraft. Each....23 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT IDENTIFICATION AND REGISTRATION MARKING Nationality and Registration Marks § 45.23 Display of marks; general. (a...

  14. 14 CFR 45.23 - Display of marks; general.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... “N” (denoting United States registration) followed by the registration number of the aircraft. Each....23 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT IDENTIFICATION AND REGISTRATION MARKING Nationality and Registration Marks § 45.23 Display of marks; general. (a...

  15. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications.

    PubMed

    Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-12-24

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  16. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    PubMed Central

    Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-01-01

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119

  17. 14 CFR 1203.700 - Identification.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Foreign Government Information § 1203.700 Identification. In order to qualify as foreign government information, information must fall into one of the two following categories: (a) Information provided to the United States...

  18. 14 CFR 1203.700 - Identification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Foreign Government Information § 1203.700 Identification. In order to qualify as foreign government information, information must fall into one of the two following categories: (a) Information provided to the United States...

  19. 15 CFR 718.2 - Identification of confidential business information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... business information. 718.2 Section 718.2 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION 718.2 Identification of confidential business...

  20. Input from Key Stakeholders in the National Security Technology Incubator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  1. 77 FR 3515 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Order Instituting...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-24

    ... quotations into any inter-dealer quotation system that permits quotation updates on a real-time basis to... particular OTC Equity Security in any inter-dealer quotation system, including any system that the SEC has... Securities in which it displays market making interest via an inter-dealer quotation system.'' See FINRA Rule...

  2. 75 FR 33690 - Safety Zone, Lights on the River Fireworks Display, Delaware River, New Hope, PA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 100 [Docket No. USCG-2010-0443] RIN 1625-AA00 Safety Zone, Lights on the River Fireworks Display, Delaware River, New Hope, PA AGENCY: Coast... safety zone in during the ``Lights on the River'' fireworks shows. Assistance for Small Entities Under...

  3. Designing a Machinery Control System (MCS) Security Testbed

    DTIC Science & Technology

    2014-09-01

    IO LAB” button and verify the display looks as follows: 95 Figure F22 . “Ready State” (and start state)of the DIOL as displayed at the HMI...After verification that the HMI screen looks like Figure F22 , click on the “Back to Home Screen” button and return to the HMI “Home” screen as seen

  4. 78 FR 60220 - Safety Zone; Fireworks Display, Willamette River, Oregon City, OR

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-01

    ... small business. If you wish to comment on actions by employees of the Coast Guard, call 1-888-REG-FAIR... Security FR Federal Register NPRM Notice of Proposed Rulemaking A. Regulatory History and Information The... 1.05-1(f) for safety and environmental purposes as described in 33 CFR part 165. Fireworks displays...

  5. 77 FR 26811 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... display is consistent with traditional market making on the floor of an exchange as well as existing rules... market making to identify itself as the party willing to buy or sell securities on the Exchange. \\3\\ See... be displayed in Exchange data feeds with such User's market participant identifiers or ``MPIDs...

  6. 48 CFR 203.1004 - Contract clauses.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., use the clause at 252.203-7004, Display of Fraud Hotline Poster(s), in lieu of the clause at FAR 52.203-14, Display of Hotline Poster(s). If the Department of Homeland Security (DHS) provides disaster... hotline poster. [73 FR 46815, Aug. 12, 2008, as amended at 74 FR 53413, Oct. 19, 2009; 75 FR 59101, Sept...

  7. 48 CFR 203.1004 - Contract clauses.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., use the clause at 252.203-7004, Display of Fraud Hotline Poster(s), in lieu of the clause at FAR 52.203-14, Display of Hotline Poster(s). If the Department of Homeland Security (DHS) provides disaster... hotline poster. [73 FR 46815, Aug. 12, 2008, as amended at 74 FR 53413, Oct. 19, 2009; 75 FR 59101, Sept...

  8. Beacon data acquisition and display system

    DOEpatents

    Skogmo, D.G.; Black, B.D.

    1991-12-17

    A system for transmitting aircraft beacon information received by a secondary surveillance radar through telephone lines to a remote display includes a digitizer connected to the radar for preparing a serial file of data records containing position and identification information of the beacons detected by each sweep of the radar. This information is transmitted through the telephone lines to a remote computer where it is displayed. 6 figures.

  9. Beacon data acquisition and display system

    DOEpatents

    Skogmo, David G.; Black, Billy D.

    1991-01-01

    A system for transmitting aircraft beacon information received by a secondary surveillance radar through telephone lines to a remote display includes a digitizer connected to the radar for preparing a serial file of data records containing position and identification information of the beacons detected by each sweep of the radar. This information is transmitted through the telephone lines to a remote computer where it is displayed.

  10. Secure fingerprint identification based on structural and microangiographic optical coherence tomography.

    PubMed

    Liu, Xuan; Zaki, Farzana; Wang, Yahui; Huang, Qiongdan; Mei, Xin; Wang, Jiangjun

    2017-03-10

    Optical coherence tomography (OCT) allows noncontact acquisition of fingerprints and hence is a highly promising technology in the field of biometrics. OCT can be used to acquire both structural and microangiographic images of fingerprints. Microangiographic OCT derives its contrast from the blood flow in the vasculature of viable skin tissue, and microangiographic fingerprint imaging is inherently immune to fake fingerprint attack. Therefore, dual-modality (structural and microangiographic) OCT imaging of fingerprints will enable more secure acquisition of biometric data, which has not been investigated before. Our study on fingerprint identification based on structural and microangiographic OCT imaging is, we believe, highly innovative. In this study, we performed OCT imaging study for fingerprint acquisition, and demonstrated the capability of dual-modality OCT imaging for the identification of fake fingerprints.

  11. Large-Scale Interaction Profiling of Protein Domains Through Proteomic Peptide-Phage Display Using Custom Peptidomes.

    PubMed

    Seo, Moon-Hyeong; Nim, Satra; Jeon, Jouhyun; Kim, Philip M

    2017-01-01

    Protein-protein interactions are essential to cellular functions and signaling pathways. We recently combined bioinformatics and custom oligonucleotide arrays to construct custom-made peptide-phage libraries for screening peptide-protein interactions, an approach we call proteomic peptide-phage display (ProP-PD). In this chapter, we describe protocols for phage display for the identification of natural peptide binders for a given protein. We finally describe deep sequencing for the analysis of the proteomic peptide-phage display.

  12. A Web-based, secure, light weight clinical multimedia data capture and display system.

    PubMed

    Wang, S S; Starren, J

    2000-01-01

    Computer-based patient records are traditionally composed of textual data. Integration of multimedia data has been historically slow. Multimedia data such as image, audio, and video have been traditionally more difficult to handle. An implementation of a clinical system for multimedia data is discussed. The system implementation uses Java, Secure Socket Layer (SSL), and Oracle 8i. The system is on top of the Internet so it is architectural independent, cross-platform, cross-vendor, and secure. Design and implementations issues are discussed.

  13. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Security program. 326.3 Section 326.3 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY MINIMUM... banking office; and (iii) Using identification devices, such as prerecorded serial-numbered bills, or...

  14. 45 CFR 164.312 - Technical safeguards.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... persons or software programs that have been granted access rights as specified in § 164.308(a)(4). (2) Implementation specifications: (i) Unique user identification (Required). Assign a unique name and/or number for...

  15. 19 CFR 24.26 - Automated Clearinghouse credit.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...; payer identification number (importer number or Social Security number or Customs assigned number); and...; payer identifier (importer number or Social Security number or Customs assigned number or filer code if... or warehouse withdrawal number for a deferred tax payment, or bill number); payment type code...

  16. Constructing a safety and security system by medical applications of a fast face recognition optical parallel correlator

    NASA Astrophysics Data System (ADS)

    Watanabe, Eriko; Ishikawa, Mami; Ohta, Maiko; Murakami, Yasuo; Kodate, Kashiko

    2006-01-01

    Medical errors and patient safety have always received a great deal of attention, as they can be critically life-threatening and significant matters. Hospitals and medical personnel are trying their utmost to avoid these errors. Currently in the medical field, patients' record is identified through their PIN numbers and ID cards. However, for patients who cannot speak or move, or who suffer from memory disturbances, alternative methods would be more desirable, and necessary in some cases. The authors previously proposed and fabricated a specially-designed correlator called FARCO (Fast Face Recognition Optical Correlator) based on the Vanderlugt Correlator1, which operates at the speed of 1000 faces/s 2,3,4. Combined with high-speed display devices, the four-channel processing could achieve such high operational speed as 4000 faces/s. Running trial experiments on a 1-to-N identification basis using the optical parallel correlator, we succeeded in acquiring low error rates of 1 % FMR and 2.3 % FNMR. In this paper, we propose a robust face recognition system using the FARCO for focusing on the safety and security of the medical field. We apply our face recognition system to registration of inpatients, in particular children and infants, before and after medical treatments or operations. The proposed system has recorded a higher recognition rate by multiplexing both input and database facial images from moving images. The system was also tested and evaluated for further practical use, leaving excellent results. Hence, our face recognition system could function effectively as an integral part of medical system, meeting these essential requirements of safety, security and privacy.

  17. An enhanced MMW and SMMW/THz imaging system performance prediction and analysis tool for concealed weapon detection and pilotage obstacle avoidance

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Jacobs, Eddie L.; Franck, Charmaine C.; Petkie, Douglas T.; De Lucia, Frank C.

    2015-10-01

    The U.S. Army Research Laboratory (ARL) has continued to develop and enhance a millimeter-wave (MMW) and submillimeter- wave (SMMW)/terahertz (THz)-band imaging system performance prediction and analysis tool for both the detection and identification of concealed weaponry, and for pilotage obstacle avoidance. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security and Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). Further development of this tool that includes a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures was reported on at the 2011 SPIE Europe Security and Defence Symposium (Prague). This paper provides a comprehensive review of a newly enhanced MMW and SMMW/THz imaging system analysis and design tool that now includes an improved noise sub-model for more accurate and reliable performance predictions, the capability to account for postcapture image contrast enhancement, and the capability to account for concealment material backscatter with active-illumination- based systems. Present plans for additional expansion of the model's predictive capabilities are also outlined.

  18. 49 CFR 390.19 - Motor carrier, hazardous material shipper, and intermodal equipment provider identification reports.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... display the number on each self-propelled CMV, as defined in § 390.5, along with the additional... display the USDOT Number on each self-propelled CMV, as defined in § 390.5, along with the additional...

  19. 49 CFR 390.19 - Motor carrier, hazardous material shipper, and intermodal equipment provider identification reports.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... display the number on each self-propelled CMV, as defined in § 390.5, along with the additional... display the USDOT Number on each self-propelled CMV, as defined in § 390.5, along with the additional...

  20. 27 CFR 555.122 - Records maintained by licensed importers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... quantity units, such as pounds of explosives, number of detonators, number of display fireworks, etc.). (5) Description (dynamite (dyn), blasting agents (ba), detonators (det), display fireworks (df), etc.) and size... identification. (4) Quantity (applicable quantity units, such as pounds of explosives, number of detonators...

  1. 27 CFR 555.122 - Records maintained by licensed importers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... quantity units, such as pounds of explosives, number of detonators, number of display fireworks, etc.). (5) Description (dynamite (dyn), blasting agents (ba), detonators (det), display fireworks (df), etc.) and size... identification. (4) Quantity (applicable quantity units, such as pounds of explosives, number of detonators...

  2. Influence of colour on acquisition and generalisation of graphic symbols.

    PubMed

    Hetzroni, O E; Ne'eman, A

    2013-07-01

    Children with autism may benefit from using graphic symbols for their communication, language and literacy development. The purpose of this study was to investigate the influence of colour versus grey-scale displays on the identification of graphic symbols using a computer-based intervention. An alternating treatment design was employed to examine the learning and generalisation of 58 colour and grey-scale symbols by four preschool children with autism. The graphic symbols were taught via a meaning-based intervention using stories and educational games. Results demonstrate that all of the children were able to learn and maintain symbol identification over time for both symbol displays with no apparent differences. Differences were apparent for two of the children who exhibited better generalisation when learning grey-scale symbols first. The other two showed no noticeable difference, between displays when generalising from one display to the other. Implications and further research are discussed. © 2012 The Authors. Journal of Intellectual Disability Research © 2012 John Wiley & Sons Ltd, MENCAP & IASSID.

  3. Construction of naïve camelids VHH repertoire in phage display-based library.

    PubMed

    Sabir, Jamal S M; Atef, Ahmed; El-Domyati, Fotouh M; Edris, Sherif; Hajrah, Nahid; Alzohairy, Ahmed M; Bahieldin, Ahmed

    2014-04-01

    Camelids have unique antibodies, namely HCAbs (VHH) or commercially named Nanobodies(®) (Nb) that are composed only of a heavy-chain homodimer. As libraries based on immunized camelids are time-consuming, costly and likely redundant for certain antigens, we describe the construction of a naïve camelid VHHs library from blood serum of non-immunized camelids with affinity in the subnanomolar range and suitable for standard immune applications. This approach is rapid and recovers VHH repertoire with the advantages of being more diverse, non-specific and devoid of subpopulations of specific antibodies, which allows the identification of binders for any potential antigen (or pathogen). RNAs from a number of camelids from Saudi Arabia were isolated and cDNAs of the diverse vhh gene were amplified; the resulting amplicons were cloned in the phage display pSEX81 vector. The size of the library was found to be within the required range (10(7)) suitable for subsequent applications in disease diagnosis and treatment. Two hundred clones were randomly selected and the inserted gene library was either estimated for redundancy or sequenced and aligned to the reference camelid vhh gene (acc. No. ADE99145). Results indicated complete non-specificity of this small library in which no single event of redundancy was detected. These results indicate the efficacy of following this approach in order to yield a large and diverse enough gene library to secure the presence of the required version encoding the required antibodies for any target antigen. This work is a first step towards the construction of phage display-based biosensors useful in disease (e.g., TB or tuberculosis) diagnosis and treatment. Copyright © 2014 Académie des sciences. Published by Elsevier SAS. All rights reserved.

  4. Identification of pleasant, neutral, and unpleasant odors in schizophrenia.

    PubMed

    Kamath, Vidyulata; Turetsky, Bruce I; Moberg, Paul J

    2011-05-15

    Recent work on odor hedonics in schizophrenia has indicated that patients display abnormalities in hedonic judgments of odors in comparison to healthy comparison participants. In the current study, identification accuracy for pleasant, neutral, and unpleasant odors in individuals with schizophrenia and healthy controls was examined. Thirty-three schizophrenia patients (63% male) and thirty-one healthy volunteers (65% male) were recruited. The groups were well matched on age, sex, and smoking status. Participants were administered the University of Pennsylvania Smell Identification Test, which was subsequently divided into 16 pleasant, 15 neutral, and 9 unpleasant items. Analysis of identification z-scores for pleasant, neutral, and unpleasant odors revealed a significant diagnosis by valence interaction. Post-hoc analysis revealed that schizophrenia participants made more identification errors on pleasant and neutral odors compared to healthy controls, with no differences observed for unpleasant odors. No effect was seen for sex. The findings from the current investigation suggest that odor identification accuracy in patients is influenced by odor valence. This pattern of results parallels a growing body of literature indicating that patients display aberrant pleasantness ratings for pleasant odors and highlights the need for additional research on the influence of odor valence on olfactory identification performance in individuals with schizophrenia. Copyright © 2010 Elsevier Ltd. All rights reserved.

  5. The role of national identity representation in the relation between in-group identification and out-group derogation: ethnic versus civic representation.

    PubMed

    Meeus, Joke; Duriez, Bart; Vanbeselaere, Norbert; Boen, Filip

    2010-06-01

    Two studies investigated whether the content of in-group identity affects the relation between in-group identification and ethnic prejudice. The first study among university students, tested whether national identity representations (i.e., ethnic vs. civic) moderate or mediate the relation between Flemish in-group identification and ethnic prejudice. A moderation hypothesis is supported when those higher in identification who subscribe to a more ethnic representation display higher ethnic prejudice levels than those higher in identification who subscribe to a more civic representation. A mediation hypothesis is supported when those higher in identification tend towards one specific representation, which in turn, should predict ethnic prejudice. Results supported a mediation hypothesis and showed that the more respondents identified with the Flemish in-group, the more ethnic their identity representation, and the more they were inclined to display ethnic prejudice. The second study tested this mediation from a longitudinal perspective in a two-wave study among high school students. In-group identification at Time 1 predicted over-time changes in identity representation, which in turn, predicted changes in ethnic prejudice. In addition to this, changes in identity representation were predicted by initial ethnic prejudice levels. The implications of these findings are discussed.

  6. Origins, Spectral Interpretation, Resource Identification, Security, Regolith Explorer Planning (OSIRIS-REx)

    NASA Technical Reports Server (NTRS)

    Nakamura-Messenger, Keiko; Messenger, Scott; Keller, Lindsay; Righter, Kevin

    2014-01-01

    Scientists at ARES are preparing to curate and analyze samples from the first U.S. mission to return samples from an asteroid. The Origins-Spectral Interpretation- Resource Identification-Security-Regolith Explorer, or OSIRIS-REx, was selected by NASA as the third mission in its New Frontiers Program. The robotic spacecraft will launch in 2016 and rendezvous with the near-Earth asteroid Bennu, in 2020. A robotic arm will collect at least 60 grams of material from the surface of the asteroid to be returned to Earth in 2023 for worldwide distribution by the NASA Astromaterials Curation Facility at ARES.

  7. Comparison of organic electroluminescence and liquid crystal displays for clinical utility in orthopedic endoscopic surgery.

    PubMed

    Dezawa, Akira; Sairyo, Koichi

    2014-05-01

    Organic electroluminescence displays (OELD) use organic materials that self-emit light with the passage of an electric current. OELD provide high contrast, excellent color reproducibility at low brightness, excellent video images, and less restricted viewing angles. OELD are thus promising for medical use. This study compared the utility of an OELD with conventional liquid crystal displays (LCD) for imaging in orthopedic endoscopic surgery. One OELD and two conventional LCD that were indistinguishable in external appearance were used in this study. Images from 18 patients were displayed simultaneously on three monitors and evaluated by six orthopedic surgeons with extensive surgical experience. Images were shown for 2 min, repeated twice, and viewed from the front and side (diagonally). Surgeon rated both clinical utility (12 parameters) and image quality (11 parameters) for each image on a 5-point scale: 1, very good; 2, good; 3, average; 4, poor; and 5, very poor. For clinical utility in 16 percutaneous endoscopic discectomy cases, mean scores for all 12 parameters were significantly better on the OELD than on the LCD, including organ distinguishability (2.1 vs 3.2, respectively), lesion identification (2.2 vs 3.1), and overall viewing impression (2.1 vs 3.1). For image quality, all 11 parameters were better on the OELD than on LCD. Significant differences were identified in six parameters, including contrast (1.8 vs 2.9), color reproducibility in dark areas (1.8 vs 2.9), and viewing angle (2.2 vs 2.9). The high contrast and excellent color reproducibility of the OELD reduced the constraints of imaging under endoscopy, in which securing a field of view may be difficult. Distinguishability of organs was good, including ligaments, dura mater, nerves, and adipose tissue, contributing to good stereoscopic images of the surgical field. These findings suggest the utility of OELD for excellent display of surgical images and for enabling safe and highly accurate endoscopic surgery. © 2014 Japan Society for Endoscopic Surgery, Asia Endosurgery Task Force and Wiley Publishing Asia Pty Ltd.

  8. 49 CFR 228.203 - Program components.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Program components. (a) System security. The integrity of the program and database must be protected by a security system that utilizes an employee identification number and password, or a comparable method, to... system to pre-populate fields of the hours of service record provided that— (A) The recordkeeping system...

  9. 7 CFR 400.408 - Safeguards and storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 6 2013-01-01 2013-01-01 false Safeguards and storage. 400.408 Section 400.408... and Storage of Social Security Account Numbers and Employer Identification Numbers § 400.408 Safeguards and storage. Records must be maintained in secured storage with proper safeguards sufficient to...

  10. 7 CFR 400.408 - Safeguards and storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 6 2011-01-01 2011-01-01 false Safeguards and storage. 400.408 Section 400.408... and Storage of Social Security Account Numbers and Employer Identification Numbers § 400.408 Safeguards and storage. Records must be maintained in secured storage with proper safeguards sufficient to...

  11. 7 CFR 400.408 - Safeguards and storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 6 2012-01-01 2012-01-01 false Safeguards and storage. 400.408 Section 400.408... and Storage of Social Security Account Numbers and Employer Identification Numbers § 400.408 Safeguards and storage. Records must be maintained in secured storage with proper safeguards sufficient to...

  12. Sparse Matrix for ECG Identification with Two-Lead Features.

    PubMed

    Tseng, Kuo-Kun; Luo, Jiao; Hegarty, Robert; Wang, Wenmin; Haiting, Dong

    2015-01-01

    Electrocardiograph (ECG) human identification has the potential to improve biometric security. However, improvements in ECG identification and feature extraction are required. Previous work has focused on single lead ECG signals. Our work proposes a new algorithm for human identification by mapping two-lead ECG signals onto a two-dimensional matrix then employing a sparse matrix method to process the matrix. And that is the first application of sparse matrix techniques for ECG identification. Moreover, the results of our experiments demonstrate the benefits of our approach over existing methods.

  13. Pilot identification of symbols and an exploration of symbol design issues for electronic displays of aeronautical charting information

    DOT National Transportation Integrated Search

    2007-06-01

    This report describes a study designed to address four research questions about symbology for electronic displays of charting information. The main research question was whether pilots could identify a set of test symbols. Three other research questi...

  14. Neurobehavioral Mutants Identified in an ENU Mutagenesis Project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cook, Melloni N.; Dunning, Jonathan P; Wiley, Ronald G

    2007-01-01

    We report on a behavioral screening test battery that successfully identified several neurobehavioral mutants among a large-scale ENU-mutagenized mouse population. Large numbers of ENU mutagenized mice were screened for abnormalities in central nervous system function based on abnormal performance in a series of behavior tasks. We developed and employed a high-throughput screen of behavioral tasks to detect behavioral outliers. Twelve mutant pedigrees, representing a broad range of behavioral phenotypes, have been identified. Specifically, we have identified two open field mutants (one displaying hyper-locomotion, the other hypo-locomotion), four tail suspension mutants (all displaying increased immobility), one nociception mutant (displaying abnormal responsivenessmore » to thermal pain), two prepulse inhibition mutants (displaying poor inhibition of the startle response), one anxiety-related mutant (displaying decreased anxiety in the light/dark test), and one learning and memory mutant (displaying reduced response to the conditioned stimulus) These findings highlight the utility of a set of behavioral tasks used in a high throughput screen to identify neurobehavioral mutants. Further analysis (i.e., behavioral and genetic mapping studies) of mutants is in progress with the ultimate goal of identification of novel genes and mouse models relevant to human disorders as well as the identification of novel therapeutic targets.« less

  15. 49 CFR 172.328 - Cargo tanks.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 2 2014-10-01 2014-10-01 false Cargo tanks. 172.328 Section 172.328... SECURITY PLANS Marking § 172.328 Cargo tanks. (a) Providing and affixing identification numbers. Unless a cargo tank is already marked with the identification numbers required by this subpart, the...

  16. 49 CFR 172.328 - Cargo tanks.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 2 2013-10-01 2013-10-01 false Cargo tanks. 172.328 Section 172.328... SECURITY PLANS Marking § 172.328 Cargo tanks. (a) Providing and affixing identification numbers. Unless a cargo tank is already marked with the identification numbers required by this subpart, the...

  17. 49 CFR 172.328 - Cargo tanks.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 2 2012-10-01 2012-10-01 false Cargo tanks. 172.328 Section 172.328... SECURITY PLANS Marking § 172.328 Cargo tanks. (a) Providing and affixing identification numbers. Unless a cargo tank is already marked with the identification numbers required by this subpart, the...

  18. 49 CFR 172.328 - Cargo tanks.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 2 2011-10-01 2011-10-01 false Cargo tanks. 172.328 Section 172.328... SECURITY PLANS Marking § 172.328 Cargo tanks. (a) Providing and affixing identification numbers. Unless a cargo tank is already marked with the identification numbers required by this subpart, the...

  19. 18 CFR 1314.8 - Identification of accounts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... accounts. 1314.8 Section 1314.8 Conservation of Power and Water Resources TENNESSEE VALLEY AUTHORITY BOOK... Identification of accounts. Book-entry accounts may be established in such form or forms as customarily permitted by the entity (e.g., Depository Institution, Securities Intermediary, etc.) maintaining them, except...

  20. Origins of Ethnic Strife.

    ERIC Educational Resources Information Center

    Firestone, Robert W.

    Group identification is a major cause of religious, racial, and international conflict. Many forms of group identification are fantasy bonds, imagined connections with others offering security at the expense of individual self-realization. The fantasy bond forms in childhood in response to inadequate parenting. Human beings are not inherently…

  1. 75 FR 28839 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing of a Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-24

    ... imbalance at the end of a trading pause, Nasdaq may delay the re-opening of a security. Nasdaq will issue a notification if it cannot resume trading for a reason other than a significant imbalance. Price moves under... Period, Nasdaq detects an [liquidity] order imbalance in the security, Nasdaq will extend the Display...

  2. 75 FR 6423 - Self-Regulatory Organizations; National Stock Exchange, Inc.; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-09

    ... Orders of Securities Priced Under One Dollar in the Auto Execution Mode of Order Interaction to 0.25% of... for liquidity adding displayed orders of securities priced under one dollar in the Auto Execution mode of order interaction (``AutoEx'') \\3\\ to 0.25% of trade value. \\3\\ The Exchange's two modes of order...

  3. Standardized access, display, and retrieval of medical video

    NASA Astrophysics Data System (ADS)

    Bellaire, Gunter; Steines, Daniel; Graschew, Georgi; Thiel, Andreas; Bernarding, Johannes; Tolxdorff, Thomas; Schlag, Peter M.

    1999-05-01

    The system presented here enhances documentation and data- secured, second-opinion facilities by integrating video sequences into DICOM 3.0. We present an implementation for a medical video server extended by a DICOM interface. Security mechanisms conforming with DICOM are integrated to enable secure internet access. Digital video documents of diagnostic and therapeutic procedures should be examined regarding the clip length and size necessary for second opinion and manageable with today's hardware. Image sources relevant for this paper include 3D laparoscope, 3D surgical microscope, 3D open surgery camera, synthetic video, and monoscopic endoscopes, etc. The global DICOM video concept and three special workplaces of distinct applications are described. Additionally, an approach is presented to analyze the motion of the endoscopic camera for future automatic video-cutting. Digital stereoscopic video sequences are especially in demand for surgery . Therefore DSVS are also integrated into the DICOM video concept. Results are presented describing the suitability of stereoscopic display techniques for the operating room.

  4. 78 FR 14867 - Self-Regulatory Organizations; National Stock Exchange, Inc.; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-07

    ... how the NSX System may execute certain types of Zero Display Reserve Orders \\4\\ that are pegged to the midpoint between the Protected BBO in subpennies. NSX Rule 11.3(c) provides that a Zero Display Reserve... the System rounds executions in securities priced less than $1.00 per share resulting from a Zero...

  5. Development of Bacterial Display Peptides for use in Biosensing Applications

    DTIC Science & Technology

    2012-09-01

    performance. Specific results on peptides binders to Protective Antigen (PA) protein of Bacillus anthracis and Staphylococcal Enterotoxin B (SEB...reagent, affinity reagent, bacterial display, multi-scale modeling, docking, protective antigen , SEB, biosensing 16. SECURITY CLASSIFICATION OF: 17...performance. Specific results on peptides binders to Protective Antigen (PA) protein of Bacillus anthracis and Staphylococcal Enterotoxin B (SEB) will be

  6. 33 CFR 100.T05-0443 - Safety Zone; Fireworks Display, Delaware River, New Hope, PA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., Delaware River, New Hope, PA. 100.T05-0443 Section 100.T05-0443 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY REGATTAS AND MARINE PARADES SAFETY OF LIFE ON NAVIGABLE WATERS § 100.T05-0443 Safety Zone; Fireworks Display, Delaware River, New Hope, PA. (a) Location. The safety zone will restrict...

  7. 76 FR 9550 - Proposed Information Collection; Comment Request; Northeast Region Vessel Identification Collection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration Proposed Information Collection; Comment Request; Northeast Region Vessel Identification Collection AGENCY: National Oceanic and... in the Northeast Region display the vessel's name and official number. The name and number must be of...

  8. Secure method for biometric-based recognition with integrated cryptographic functions.

    PubMed

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  9. 78 FR 45949 - Privacy Act of 1974, as Amended; Notice of a New System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-30

    ...: Social Security numbers, drivers license numbers, vehicle identification numbers, license plate numbers... or retention of an employee or contractor, or the issuance of a security clearance, license, contract..., tribal or foreign) for the purpose of providing background search information on individuals for legally...

  10. 20 CFR 404.630 - Use of date of written statement as filing date.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... contacts us through the Internet by completing and transmitting the Personal Identification Information data on the Internet Social Security Benefit Application to us, we will use the date of the... date. 404.630 Section 404.630 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...

  11. 20 CFR 404.630 - Use of date of written statement as filing date.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... contacts us through the Internet by completing and transmitting the Personal Identification Information data on the Internet Social Security Benefit Application to us, we will use the date of the... date. 404.630 Section 404.630 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...

  12. 20 CFR 404.630 - Use of date of written statement as filing date.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... contacts us through the Internet by completing and transmitting the Personal Identification Information data on the Internet Social Security Benefit Application to us, we will use the date of the... date. 404.630 Section 404.630 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...

  13. 20 CFR 404.630 - Use of date of written statement as filing date.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... contacts us through the Internet by completing and transmitting the Personal Identification Information data on the Internet Social Security Benefit Application to us, we will use the date of the... date. 404.630 Section 404.630 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...

  14. 75 FR 36642 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ... relating to the issue, return, and accountability of keys to secure areas. Records may contain name, Social... disposing of records in the system: Storage: Paper records in file folders and electronic storage media. Retrievability: By name, Social Security Number (SSN), key number, personal identification number (PIN), Magnetic...

  15. 78 FR 22526 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-16

    ...); (4) United States Social Security Number (SSN), (if any), United States Immigration and Naturalization Service (INS) Identification or similar number(s), (if any), and any equivalent social security or...) spouse; (c) children; (d) brothers; (e) sisters; (f) others; (9) team name; (10) place of insertion; (11...

  16. 31 CFR 315.39 - Surrender for payment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... establish his or her identity in accordance with Treasury instructions and identification guidelines. The... presenter must record his or her social security number on the face of the security, provided it does not... appear before an officer authorized to certify requests for payment, establish his or her identity, sign...

  17. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    NASA Technical Reports Server (NTRS)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the primary pattern [1-3]. We have demonstrated experimentally an optical processor for security verification of objects, products, and persons. This demonstration is very important to encourage industries to consider the proposed system for research and development.

  18. Creation of hybrid optoelectronic systems for document identification

    NASA Astrophysics Data System (ADS)

    Muravsky, Leonid I.; Voronyak, Taras I.; Kulynych, Yaroslav P.; Maksymenko, Olexander P.; Pogan, Ignat Y.

    2001-06-01

    Use of security devices based on a joint transform correlator (JTC) architecture for identification of credit cards and other products is very promising. The experimental demonstration of the random phase encoding technique for security verification shows that hybrid JTCs can be successfully utilized. The random phase encoding technique provides a very high protection level of products and things to be identified. However, the realization of this technique is connected with overcoming of the certain practical problems. To solve some of these problems and simultaneously to improve the security of documents and other products, we propose to use a transformed phase mask (TPM) as an input object in an optical correlator. This mask is synthesized from a random binary pattern (RBP), which is directly used to fabricate a reference phase mask (RPM). To obtain the TPM, we previously separate the RBP on a several parts (for example, K parts) of an arbitrary shape and further fabricate the TPM from this transformed RBP. The fabricated TPM can be bonded as the optical mark to any product or thing to be identified. If the RPM and the TPM are placed on the optical correlator input, the first diffracted order of the output correlation signal is containing the K narrow autocorrelation peaks. The distances between the peaks and the peak's intensities can be treated as the terms of the identification feature vector (FV) for the TPM identification.

  19. Laser-scanning techniques for rapid ballistics identification

    NASA Technical Reports Server (NTRS)

    Woodburgy, R. C.; Nakich, R. B.

    1974-01-01

    Two different laser-scanning methods may be utilized. In each case scanned cylindrical bullet surface is displayed ""unwrapped'' on oscilloscope screen. Bullets are compared by photographing each display and superimposing negatives of two images. With some modifications bullets can be scanned and compared by superimposing images on screen of dual-beam oscilloscope.

  20. 22 CFR 9.7 - Identification and marking.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Foreign Relations DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.7 Identification and marking. (a) Classified information shall be marked pursuant to the standards set forth in section 1.6 of... guidance in 12 Foreign Affairs Manual (FAM). (b) Foreign government information shall retain its original...

  1. 22 CFR 9.7 - Identification and marking.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Foreign Relations DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.7 Identification and marking. (a) Classified information shall be marked pursuant to the standards set forth in section 1.6 of... guidance in 12 Foreign Affairs Manual (FAM). (b) Foreign government information shall retain its original...

  2. 18 CFR 1314.8 - Identification of accounts.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 18 Conservation of Power and Water Resources 2 2011-04-01 2011-04-01 false Identification of accounts. 1314.8 Section 1314.8 Conservation of Power and Water Resources TENNESSEE VALLEY AUTHORITY BOOK-ENTRY PROCEDURES FOR TVA POWER SECURITIES ISSUED THROUGH THE FEDERAL RESERVE BANKS § 1314.8...

  3. 27 CFR 19.189 - Identification of structures, areas, apparatus, and equipment.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... structures, areas, apparatus, and equipment. 19.189 Section 19.189 Alcohol, Tobacco Products and Firearms... Construction, Equipment, and Security Requirements Other Plant Requirements § 19.189 Identification of structures, areas, apparatus, and equipment. (a) Buildings. The proprietor must mark each building at a...

  4. Gender identification of Grasshopper Sparrows comparing behavioral, morphological, and molecular techniques

    USGS Publications Warehouse

    Ammer, F.K.; Wood, P.B.; McPherson, R.J.

    2008-01-01

    Correct gender identification in monomorphic species is often difficult especially if males and females do not display obvious behavioral and breeding differences. We compared gender specific morphology and behavior with recently developed DNA techniques for gender identification in the monomorphic Grasshopper Sparrow (Ammodramus savannarum). Gender was ascertained with DNA in 213 individuals using the 2550F/2718R primer set and 3% agarose gel electrophoresis. Field observations using behavior and breeding characteristics to identify gender matched DNA analyses with 100% accuracy for adult males and females. Gender was identified with DNA for all captured juveniles that did not display gender specific traits or behaviors in the field. The molecular techniques used offered a high level of accuracy and may be useful in studies of dispersal mechanisms and winter assemblage composition in monomorphic species.

  5. An Infrastructure for Multi-Level Secure Service-Oriented Architecture (MLS-SOA) Using the Multiple Single-Level Approach

    DTIC Science & Technology

    2009-12-17

    IEEE TDKE, 1996. 8( 1). 14. Garvey, T.D., The inference Problem for Computer Security. 1992, SRI International. 15. Chaum , D ., Blind Signatures for...Pervasive Computing Environments. IEEE Transactions on Vehicular Technology, 2006. 55(4). 17. Chaum , D ., Security without Identification: Transaction...Systems to make Big Brother Obsolete. Communications of the ACM 1985. 28(10). 18. Chaum , D ., Untraceable Electronic Mail, Return Addresses, and Digital

  6. A Web-based, secure, light weight clinical multimedia data capture and display system.

    PubMed Central

    Wang, S. S.; Starren, J.

    2000-01-01

    Computer-based patient records are traditionally composed of textual data. Integration of multimedia data has been historically slow. Multimedia data such as image, audio, and video have been traditionally more difficult to handle. An implementation of a clinical system for multimedia data is discussed. The system implementation uses Java, Secure Socket Layer (SSL), and Oracle 8i. The system is on top of the Internet so it is architectural independent, cross-platform, cross-vendor, and secure. Design and implementations issues are discussed. Images Figure 2 Figure 3 PMID:11080014

  7. Molecular Identification of the Schwannomatosis Locus

    DTIC Science & Technology

    2005-07-01

    AD Award Number: DAMD17-03-1-0445 TITLE: Molecular Identification of the Schwannomatosis Locus PRINCIPAL INVESTIGATOR: Mia M. MacCollin, M.D...NUMBER Molecular Identification of the Schwannomatosis Locus 5b. GRANT NUMBER DAMD17-03-1-0445 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER...can be found on next page. 15. SUBJECT TERMS schwannomatosis , tumor suppressor gene, NF2, molecular genetics 16. SECURITY CLASSIFICATION OF: 17

  8. Behavioral biometrics for verification and recognition of malicious software agents

    NASA Astrophysics Data System (ADS)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2008-04-01

    Homeland security requires technologies capable of positive and reliable identification of humans for law enforcement, government, and commercial applications. As artificially intelligent agents improve in their abilities and become a part of our everyday life, the possibility of using such programs for undermining homeland security increases. Virtual assistants, shopping bots, and game playing programs are used daily by millions of people. We propose applying statistical behavior modeling techniques developed by us for recognition of humans to the identification and verification of intelligent and potentially malicious software agents. Our experimental results demonstrate feasibility of such methods for both artificial agent verification and even for recognition purposes.

  9. Triboelectric-Based Transparent Secret Code.

    PubMed

    Yuan, Zuqing; Du, Xinyu; Li, Nianwu; Yin, Yingying; Cao, Ran; Zhang, Xiuling; Zhao, Shuyu; Niu, Huidan; Jiang, Tao; Xu, Weihua; Wang, Zhong Lin; Li, Congju

    2018-04-01

    Private and security information for personal identification requires an encrypted tool to extend communication channels between human and machine through a convenient and secure method. Here, a triboelectric-based transparent secret code (TSC) that enables self-powered sensing and information identification simultaneously in a rapid process method is reported. The transparent and hydrophobic TSC can be conformed to any cambered surface due to its high flexibility, which extends the application scenarios greatly. Independent of the power source, the TSC can induce obvious electric signals only by surface contact. This TSC is velocity-dependent and capable of achieving a peak voltage of ≈4 V at a resistance load of 10 MΩ and a sliding speed of 0.1 m s -1 , according to a 2 mm × 20 mm rectangular stripe. The fabricated TSC can maintain its performance after reciprocating rolling for about 5000 times. The applications of TSC as a self-powered code device are demonstrated, and the ordered signals can be recognized through the height of the electric peaks, which can be further transferred into specific information by the processing program. The designed TSC has great potential in personal identification, commodity circulation, valuables management, and security defense applications.

  10. 49 CFR 1549.3 - TSA inspection authority.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... transportation facilities; (vi) Review security plans; and (vii) Carry out such other duties, and exercise such... access media or identification media issued or approved by a certified cargo screening facility or other person, except that the TSA and DHS officials will have identification media issued by TSA or DHS. ...

  11. 48 CFR 2152.204-70 - Taxpayer Identification Number.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... basis, and of which the Contractor is a member. Taxpayer Identification Number (TIN), as used in this... reporting income tax and other returns. The TIN is the Contractor's Social Security Number. (b) The... information will result in payment being withheld until the TIN is provided. (c) The Government may use the...

  12. 48 CFR 2152.204-70 - Taxpayer Identification Number.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... basis, and of which the Contractor is a member. Taxpayer Identification Number (TIN), as used in this... reporting income tax and other returns. The TIN is the Contractor's Social Security Number. (b) The... information will result in payment being withheld until the TIN is provided. (c) The Government may use the...

  13. 48 CFR 2152.204-70 - Taxpayer Identification Number.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... basis, and of which the Contractor is a member. Taxpayer Identification Number (TIN), as used in this... reporting income tax and other returns. The TIN is the Contractor's Social Security Number. (b) The... information will result in payment being withheld until the TIN is provided. (c) The Government may use the...

  14. 48 CFR 2152.204-70 - Taxpayer Identification Number.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... basis, and of which the Contractor is a member. Taxpayer Identification Number (TIN), as used in this... reporting income tax and other returns. The TIN is the Contractor's Social Security Number. (b) The... information will result in payment being withheld until the TIN is provided. (c) The Government may use the...

  15. 48 CFR 2152.204-70 - Taxpayer Identification Number.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... basis, and of which the Contractor is a member. Taxpayer Identification Number (TIN), as used in this... reporting income tax and other returns. The TIN is the Contractor's Social Security Number. (b) The... information will result in payment being withheld until the TIN is provided. (c) The Government may use the...

  16. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational...

  17. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational...

  18. Security Procedures for Golden Laboratories and Administration Offices |

    Science.gov Websites

    photo identification (for example driver's license, passport, or military ID). Upon arrival to NREL's and should park in the Research Support Facility (RSF) Visitor Parking Lot. Visitors will then enter ) window. Visitors need to be prepared to show government-issued photo identification (for example driver's

  19. Signal Identification and Isolation Utilizing Radio Frequency Photonics

    DTIC Science & Technology

    2017-09-01

    analyzers can measure the frequency of signals and filters can be used to separate the signals apart from one another. This report will review...different techniques for spectrum analysis and isolation. 15. SUBJECT TERMS radio frequency, photonics, spectrum analyzer, filters 16. SECURITY CLASSIFICATION...Analyzers .......................................................................................... 3 3.2 Frequency Identification using Filters

  20. 6 CFR 37.33 - DMV databases.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false DMV databases. 37.33 Section 37.33 Domestic... IDENTIFICATION CARDS Other Requirements § 37.33 DMV databases. (a) States must maintain a State motor vehicle database that contains, at a minimum— (1) All data fields printed on driver's licenses and identification...

Top